Friday, January 28, 2011

SOS Children's Villages - Connection to Maurice Strong? - Procured Patented Onion Router - Pedophile Hacker Network - Gunns of Tasmania

Strong's SOS Assange and Onion Router hackers in HSBC, Pentagon and Gunns

To whom it may concern
January 28, 2011

Abel Danger is researching Maurice Strong and founders/partners of an SOS Children's Villages base set up in 1950 in New York (see notes); they appear to have joint ventured with Crown Agents' Sisters (see link) in the procurement of the patented Onion Router encryption devices allegedly used by Julian Assange to spoliate evidence of a pedophile hackers' network inside HSBC's HQ offices in Philadelphia, Vancouver and Canary Wharf; the Pentagon's U.S. Navy Command Center (destroyed on 9/11) and various extorted borrowers, including Gunns of Tasmania.

http://www.abeldanger.net/2011/01/sos-pedophile-oaths-learned-espionage.html
http://www.sos-usa.org/ways-to-give/corporate-partnerships/Pages/default.aspx
Link
In the excerpted notes, we remind our readers of the concepts of 'spoliation of evidence' and `misprision of treason' as they apply to many common law jurisdictions in the English-speaking world and also the offence and penalties related to `murder-for-hire' (contract killing) as recognized in the U.S. Criminal Code.

Yours sincerely,

Notes:

"In law, spoliation of evidence is the intentional or negligent withholding, hiding, altering, or destroying of evidence relevant to a legal proceeding. Spoliation has two consequences: the act is criminal by statute and may result in fines and incarceration for the parties who engaged in the spoliation; also, case law has established that proceedings that might have been altered by the spoliation may be interpreted under a spoliation inference. The spoliation inference is a negative evidentiary inference that a finder of fact can draw from a party's destruction of a document or thing that is relevant to an ongoing or reasonably foreseeable civil or criminal proceeding: the finder of fact can review all evidence uncovered in as strong a light as possible against the spoliator and in favor of the opposing party. The theory of the spoliation inference is that when a party destroys evidence, it may be reasonable to infer that the party had "consciousness of guilt" or other motivation to avoid the evidence. Therefore, the factfinder may conclude that the evidence would have been unfavorable to the spoliator. Some jurisdictions have recognized a spoliation tort action, which allows the victim of destruction of evidence to file a separate tort action against a spoliator" ... "Misprision of treason is an offence found in many common law jurisdictions around the world, having been inherited from English law. It is committed by someone who knows a treason is being or is about to be committed but does not report it to a proper authority. It is therefore unusual in that it is a criminal offence which may be committed through inaction .. Procedure The procedure on trials for misprision of treason is the same as that on trials for murder. It is classified as an indictable-only offence. Limitation A person may not be indicted for misprision of treason committed within the United Kingdom unless the indictment is signed within three years of the commission of that offence. Scottish Parliament Misprision of treason is a reserved matter on which the Scottish Parliament cannot legislate .. United States In the United States, misprision of treason is a federal offense, committed where someone who has knowledge of the commission of any treason against the United States, conceals such knowledge and does not inform the President, a federal judge or State Governor or State judge (18 U.S.C. § 2382). It is punishable by a fine and up to 7 years in federal prison. It is also a crime punishable under the criminal laws of many states." .. "The "murder-for-hire" statute, 18 U.S.C. § 1958, was enacted as part of the Comprehensive Crime Control Act of 1984, Pub.L. 98-473, Ch. X, Part A (Oct. 12, 1984). Section 1958(a) provides: Whoever travels in or causes another (including the intended victim) to travel in interstate or foreign commerce, or uses or causes another (including the intended victim) to use the mail or any facility in interstate or foreign commerce, with intent that a murder be committed in violation of the laws of any State or the United States as consideration for the receipt of, or as consideration for a promise or agreement to pay anything of pecuniary value, or who conspires to do so [violates this statute] .. According to the legislative history, § 1958 covers both the "hit man" and the contractor under the theory that the contractor causes the hit man to travel or use facilities in interstate commerce. S. Rep. 225 at 306. The maximum penalty for violating § 1958 varies with the severity of the conduct: a fine and/or ten years for any violation; a fine and/or twenty years if personal injury results; and a fine of not more than $250,000 and/or death or life imprisonment if death results. If the death penalty might be applicable, the United States Attorney's Office must comply with the guidelines at USAM 9-10.000".

"Maurice Strong: The new guy in your future! By Henry Lamb January, 1997 Shortly after his selection as U.N. Secretary General, Kofi Annan told the Lehrer News Hour that Ingvar Carlsson and Shirdath Ramphal, co-chairs of the U.N.-funded Commission on Global Governance, would be among those asked to help him reform the sprawling, world-wide U.N. bureaucracy. His first choice, however, announced in the Washington Post on January 17, 1997, was none other than Maurice Strong, also a member of the Commission on Global Governance. Strong's first exposure to the U.N. came in 1947 when, at 18, he went to New York to take a job as assistant pass officer in the Identification Unit of the Security Section. Helived with Noah Monod, then treasurer of the U.N. Here, he first met David Rockefeller and learned that the U.N.'s funds were handled by Rockefeller's Chase Bank. He also met the other Rockefeller brothers and other influential people as well" .... "Strong, Maurice F., 1929- . Papers, 1948-2000: Guide Environmental Science and Public Policy Archives. Harvard College Library. Harvard University 30 May 2003 © 2001 The President and Fellows of Harvard College .. Last update on 2009 December 4 .. Series II. Writings: 1954; n.d. Box [*] [Speech on] Mau Mau: c. 1954 History and structure of United Nations and how it works: presented by M.F. Strong: n.d.Best places to see game [re: Africa]: ... n.d. (Includes 2 different copies on same topic; description of Mau Mau [allegedly SOS Children's Villages' pedophile] oath ceremonies)" .. "Maurice Strong: Another Hidden Ruler .. man is a super-connected multi-billionaire with global power .. Let’s take a look at the world Maurice Strong is building for us .. “It is clear that current lifestyles and consumption patterns of the affluent middle-class… involving high meat intake, consumption of large amounts of frozen and convenience foods, ownership of motor vehicles, small electric appliances, home and work place air-conditioning, and suburban housing are not sustainable… A shift is necessary toward lifestyles less geared to environmental damaging consumption patterns.” .. Observe the following riff from a 1990 interview with a Canadian magazine: “Each year the World Economic Forum convenes in Davos, Switzerland. Over a thousand CEOs, prime ministers, finance ministers and leading academics gather in February to attend meetings and set the economic agendas for the year ahead. What if a small group of these word leaders were to conclude that the principle risk to the earth comes from the actions of the rich countries? And if the world is to survive, those rich countries would have to sign an agreement reducing their impact on the environment. Will they do it? Will the rich countries agree to reduce their impact on the environment? Will they agree to save the earth? The group’s conclusion is ‘no.’ The rich countries won’t do it. They won’t change. So, in order to save the planet, the group decides: isn’t the only hope for the planet that the industrialized civilizations collapse? Isn’t it our responsibility to bring that about? This group of world leaders form a secret society to bring about a world collapse. It’s February. They’re all at Davos. These aren’t terrorists - they’re world leaders. They have positioned themselves in the world’s commodity and stock markets. They’ve engineered, using their access to stock exchanges, and computers, and gold supplies, a panic. Then they prevent the markets from closing. They jam the gears. They have mercenaries who hold the rest of the world leaders at Davros as hostage. The markets can’t close. The rich countries...?” and Strong makes a slight motion with his fingers as if he were flicking a cigarette butt out of the window. .. This interlocking...is the new reality of the century, with profound implications for the shape of our institutions of governance, national and international. By the year 2012, these changes must be fully integrated into our economic and political life.""

"When Assange was eight, Claire left her husband and began seeing a musician, with whom she had another child, a boy. The relationship was tempestuous; the musician became abusive, she says, and they separated. A fight ensued over the custody of Assange’s half brother, and Claire felt threatened, fearing that the musician would take away her son. Assange recalled her saying, “Now we need to disappear,” and he lived on the run with her from the age of eleven to sixteen. When I asked him about the experience, he told me that there was evidence that the man belonged to a powerful cult called the Family—its motto was “Unseen, Unknown, and Unheard.” Some members were doctors who persuaded mothers to give up their newborn children to the [pedophile] cult’s leader, Anne Hamilton-Byrne. The cult had moles in government, Assange suspected, who provided the musician with leads on Claire’s whereabouts. In fact, Claire often told friends where she had gone, or hid in places where she had lived before. While on the run, Claire rented a house across the street from an electronics shop. Assange would go there to write programs on a Commodore 64, until Claire bought it for him, moving to a cheaper place to raise the money. He was soon able to crack into well-known programs, where he found hidden messages left by their creators ... When Assange turned sixteen, he got a modem, and his computer was transformed into a portal. Web sites did not exist yet—this was 1987—but computer networks and telecom systems were sufficiently linked to form a hidden electronic landscape that teen-agers with the requisite technical savvy could traverse. Assange called himself Mendax—from Horace’s splendide mendax, or “nobly untruthful”—and he established a reputation as a sophisticated programmer who could break into the most secure networks. He joined with two hackers to form a group that became known as the International Subversives, and they broke into computer systems in Europe and North America, including networks belonging to the U.S. Department of Defense and to the Los Alamos National Laboratory. In a book called “Underground,” which he collaborated on with a writer named Suelette Dreyfus, he outlined the hacker subculture’s early Golden Rules: “Don’t damage computer systems you break into (including crashing them); don’t change the information in those systems (except for altering logs to cover your tracks [crime of spoliation of evidence which supports comon law inference of guilt]); and share information.” ... Around this time, Assange fell in love with a sixteen-year-old girl, and he briefly moved out of his mother’s home to stay with her. “A couple of days later, police turned up, and they carted off all my computer stuff,” he recalled. The raid, he said, was carried out by the state police, and “it involved some dodgy character who was alleging that we had stolen five hundred thousand dollars from Citibank.” Assange wasn’t charged, and his equipment was returned. “At that point, I decided that it might be wise to be a bit more discreet,” he said. Assange and the girl joined a squatters’ union in Melbourne, until they learned she was pregnant, and moved to be near Claire. When Assange was eighteen, the two got married in an unofficial ceremony, and soon afterward they had a son. Hacking remained a constant in his life, and the thrill of digital exploration was amplified by the growing knowledge, among the International Subversives, that the authorities were interested in their activities. The Australian Federal Police had set up an investigation into the group, called Operation Weather [networked to Weather Undergorund leaders in Chicago Bernardine Dohrn and Michelle Obama], which the hackers strove to monitor. In September, 1991, when Assange was twenty, he hacked into the master terminal that Nortel, the Canadian telecom company, maintained in Melbourne, and began to poke around [later accessed Nortel VoIP facility in Pentagon for stand down of US Air Force on 9/11]. The International Subversives had been visiting the master terminal frequently. Normally, Assange hacked into computer systems at night, when they were semi-dormant, but this time a Nortel administrator was signed on. Sensing that he might be caught, Assange approached him with humor. “I have taken control,” he wrote, without giving his name. “For years, I have been struggling in this grayness. But now I have finally seen the light.” The administrator did not reply, and Assange sent another message: “It’s been nice playing with your system. We didn’t do any damage and we even improved a few things. Please don’t call the Australian Federal Police.” The International Subversives’ incursions into Nortel turned out to be a critical development for Operation Weather. Federal investigators tapped phone lines to see which ones the hackers were using. “Julian was the most knowledgeable and the most secretive of the lot,” Ken Day, the lead investigator, told me. “He had some altruistic motive. I think he acted on the belief that everyone should have access to everything.” “Underground” describes Assange’s growing fear of arrest: “Mendax dreamed of police raids all the time. He dreamed of footsteps crunching on the driveway gravel, of shadows in the pre-dawn darkness, of a gun-toting police squad bursting through his backdoor at 5 am.” Assange could relax only when he hid his disks in an apiary that he kept. By October, he was in a terrible state. His wife had left him, taking with her their infant son. His home was a mess. He barely ate or slept. On the night the police came, the twenty-ninth, he wired his phone through his stereo and listened to the busy signal until eleven-thirty, when Ken Day knocked on his door, and told him, “I think you’ve been expecting me.” ... "As the criminal case was unfolding, Assange and his mother were also waging a campaign to gain full custody of Assange’s son—a legal fight that was, in many ways, far more wrenching than his criminal defense. They were convinced that the boy’s mother and her new boyfriend posed a danger to the child, and they sought to restrict her rights. The state’s child-protection agency, Health and Community Services, disagreed. The specifics of the allegations are unclear; family-court records in Australia are kept anonymous. But in 1995 a parliamentary committee found that the agency maintained an “underlying philosophy of deflecting as many cases away from itself as possible.” When the agency decided that a child was living in a safe household, there was no way to immediately appeal its decision. The custody battle evolved into a bitter fight with the state. “What we saw was a great bureaucracy that was squashing people,” Claire told me. She and Assange, along with another activist, formed an organization called Parent Inquiry Into Child Protection. “We used full-on activist methods,” Claire recalled. In meetings with Health and Community Services, “we would go in and tape-record them secretly.” The organization used the Australian Freedom of Information Act to obtain documents from Health and Community Services, and they distributed flyers to child-protection workers, encouraging them to come forward with inside information, for a “central databank” that they were creating. “You may remain anonymous if you wish,” one flyer stated. One protection worker leaked to the group an important internal manual. Assange told me, “We had moles who were inside dissidents [and alleged pedophiles.”

"HSBC and SOS Children's Villages partnership .. In November 2006 announced between SOS Children’s Villages UK and HSBC’s Future First programme will benefit thousands of orphaned, abandoned and destitute children in the 47 countries in which both organisations have a common presence. HSBC has pledged USD one million per year to SOS Children’s Villages UK for five years (2007 - 2011). These donations ..to support SOS education, community development and family strengthening programmes. Dame Mary Richardson, Chief Executive of the HSBC Global Education Trust, said of the partnership, “We think this is going to make a measurable difference in the lives of some of the most marginalised and impoverished members of society. HSBC believes financial institutions have a role to play in helping to integrate youth from disadvantaged backgrounds into the fabric of society, not only to improve the quality of their lives, but also so they can be fully active citizens who contribute to the economic prosperity of their local communities.” .. SOS Children’s Villages and HSBC have already been working together on a local level for a number of years. Countries where partnerships between the two organisations exist include: India [Mumbai Massacre], Jordan [al Qaeda plot to unleash deadly cloud of chemicals in capital, Amman, more deadly than 9/11], Lebanon [Crown Agents built Jenin camp for Palestinian refugees as al-Qaeda logistics base], Mauritius [recruitment of orphans from Chagossians families, expelled from Diego Garcia], Mexico [al Qaeda threat to smuggle a biological weapon into the United States via tunnels under the Mexico border], Pakistan [al-Qaeda recruiting in Quetta visited by Osama bin Laden and Barack Obama] and United States [Chicago / Illinois base for 9/11, Mumbai Massacre and Katrina sabotage]."

“Wikileaks [founder Julian Assange] claims to protect the identity of whistle-blowers that submit information to the website. Despite its anti-authoritarian stance on censorship, Wikileak's main strength comes from a piece of technology developed by the Pentagon ironically. A kind of network called The Onion Router – or Tor – enables users to post documents without fear of being traced. CNN recently reported - Since WikiLeaks is in the business of publishing information that governments and multinational corporations want kept secret, the site employs some technical tricks that aim to keep it from crashing or being hacked. The site keeps servers on multiple continents, and its sensitive information passes through countries -- such as Sweden, Iceland and Belgium -- that have offered WikiLeaks a degree of legal protection. "We use this state-of-the-art encryption to bounce stuff around the internet to hide trails -- pass it through legal jurisdictions like Sweden and Belgium to enact those legal protections," the site's controversial editor, Julian Assange, said in an onstage interview at the TED Global conference on July 20 ... United States Patent 6,266,704 Reed , et al. July 24, 2001 Onion routing network for securely moving data through communication networks Abstract The onion routing network is used to protect Internet initiators and responders against both eavesdropping and traffic analysis from other users of the Internet. In the onion routing of the invention, instead of making connections directly to a responding machine, users make connections through onion routers. The onion routing network allows the connection between the initiator and responder to remain anonymous. Anonymous connections hide who is connected to whom and for what purpose from outside eavesdroppers. Onion routing is a technique for anonymous communication over a computer network. Messages are repeatedly encrypted and then sent through several network nodes called onion routers. Each onion router removes a layer of encryption to uncover routing instructions, and sends the message to the next router where this is repeated. This prevents these intermediary nodes from knowing the origin, destination, and contents of the message. Onion routing was developed by Michael G. Reed, Paul F. Syverson, and David M. Goldschlag, and patented by the United States Navy in US Patent No. 6266704 (1998). As of 2009 [update], Tor is the predominant technology that employs onion routing.” .... "Onion Routing is not new. In fact, Onion Routing enabled environments have been around for more than a decade now and date back to the original intellectual property developed by Michael G. Reed, Paul F. Syverson, and David M. Goldschlag, and patented by the United States Navy in US Patent No. 6266704 (1998). Nowadays, several technologies and solutions utilize Onion Routing — some above scrutiny and others squarely positioned to be scrutinized .. The net effect is that no node (ideally), knows who the original source of the traffic was, what the intended destination is, or what the contents of the message traffic is thusly creating an inherently ’secure’ transmission environment which applies and affords “plausible deniability” to those using it. However, during the course of researching, tinkering and reading the research work of others, it became clear to me (as it had been to others as well), that Onion Routed environments are no more secure than any other environment if one takes the time to study and look for opportunities of exploitation. It is possible to monitor, intercept and observe data being sent and received (in motion and at rest), on a local host. Many consider this indisputable and I tend to agree with them. Here is a short list of weaknesses associated with Onion Routed environments: 1.Weak defense against timing analysis 2.Intersection attacks and predecessor attacks 3.Exit node issues (can be sniffed by the operator) So far it all sounds pretty cut and dry right? Then I began looking at what and why these solutions might be utilized outside of the public sector and for what purpose. There is a variety of reasons individuals and groups might gravitate towards utilizing these communications models. Some lay squarely in the realm of criminal activity. Others masquerade under the pretense of political discourse (hiding behind United States Supreme Court rulings on the rights to anonymity for citizens as part of political discourse activities — which by the way I think is fine so long as that is what is truly occurring), while in all actuality attempt to push subversive or counter culturally driven agendas (which, if they were exposed for what they truly represent I reckon would not garner the protection afforded to citizens by the Supreme Court decision). In this entry, I am going to avoid delving too deeply into scrutinizing the intentions of those who use this technology as a means of effectively promoting political discourse. I will say that I believe there are those who utilize the technology (like all technologies and media if given the chance — TV, radio, newspapers, magazines, blogs, podcasts etc.), for questionable purposes largely due to its ability to obfuscate source and destination in addition to its availability. Crypto-anarchism poses a threat to us all. Whether someone is leveraging ‘darknets’ to propagate information or ideologies (so of which is illegally obtained and deemed sensitive and / or classified), or giving presentations with no intention of obfuscating their intentions on subject matter deemed subversive. We as information security professionals must be alert and vigilant. In doing so, we can better defend those who cannot defend themselves while aiding in preventing criminal activity. There is a need to ‘watch the watchmen’. I believe it is the responsibility of us all to do so; not a minority. Especially a minority who believes they are above the law and entitled to disseminate information that they are not legally entitled. That is dangerous business and not for amateurs. Information, which is deemed ‘sensitive’ or ‘classified’ should be treated as such and tradition dictates, is disseminated on a ‘need to know basis’. Deviating from that practice, regardless of what one believes to be legitimate reasoning is dangerous, and criminal. I believe that technologies such as Onion Routed networks or ‘dark nets’ [operated by Assange's pedophile hackers with Nortel asset for example], can be utilized for good, however, they are and will likely continue to be corrupted and used for illegal, subversive and nefarious purposes as well."

"In 1996, as the British were in the process of unleashing the dogs of war in Africa, as the cutting edge of its final assault against the nation-state system worldwide, Crown Agents was ``privatized,'' under the new name, Crown Agents for Overseas Government and Administrations Ltd., with its own board of directors and management. Her Majesty's Murder, Inc. By now, it may have dawned on some readers that Crown Agents' range of ``services''--arms procurement, border controls, offshore banking--also nicely fit the ``administrative requirements'' of the world's organized crime cartels.In fact, a careful review of some of the more sordid aspects of the recent history of Crown Agents, suggests that the firm has been at the center of the British Crown's highly sensitive patronage of global organized crime--what EIR long ago dubbed Dope, Inc.Crown Agents' extensive links to international organized crime surfaced in the mid-1970s, when the firm's over-extended real estate portfolio, particularly its London real estate investments, blew sky high. At the time that the London commercial real estate market collapsed, Crown Agents was managing a portfolio of assets, loans, and other financial paper, totaling more than £4 billion. Despite the fact that Crown Agents held no banking charter, it owned a string of banks all over the world, including some unsavory outfits in some of the most notorious hot-money havens of the Commonwealth".

"HSBC was first established in Hong Kong in March, 1865. By the 1880s, the bank was acting as banker to the Hong Kong government under British rule [through Crown Agents]. Prior to diversifying its business into a worldwide financial institution as it is known today through a series of alliances and expensive building in the world for the usable floor area when it was built. HSBC is one of the three banks which issues banknotes for Hong Kong (the other two being the Bank of China (Hong Kong) and Standard Chartered Bank). HSBC acquired a controlling interest in the local Hang Seng Bank in 1965 during a crisis of the latter. The Hang Seng Index for stock prices in Hong Kong is named after the Hang Seng Bank." ... ""World’s Local Bank” HSBC Deploys Nortel [and therefore Strong SOS and Assange's Onion Router-hacked] Unified Communications Solution Nortel Agile Communication Environment Extends Global Communications Integration and Collaboration at London HQ October 2, 2008 LONDON - HSBC, one of the world's largest banking and financial services organizations, has selected a Nortel* [NYSE/TSX: NT ] unified communications solution for its global pilot within the HSBC London Headquarters at Canary Wharf. The solution aims to support HSBC's global collaboration, increasing the speed and efficiency of the bank's business; initially for some 1,000 executive staff in London and thereafter extending out to more than 50,000 users across HSBC's global operating areas in North America, Europe and Latin America. HSBC selected Nortel for the maturity of its unified communications products, its cross-platform voice and video integration, and ability to introduce unified communications capabilities into a range of existing HSBC application systems. Nortel will use this expertise to enhance existing HSBC business and support processes with dial-by-name, click to video, click to conference and other functionality accessible from desktops, laptops, Blackberry devices and mobile phones."

"HSBC Slammed For Abusing U.S. Military Home » HSBC Slammed For Abusing U.S. Military US soldiers’ families allege loan discrimination by HSBC. HSBC stands accused of “defrauding” US military personnel, some of whom are on duty in Iraq, by overcharging them on high interest loans, according to a study out today from a leading US-based human rights group. Inner City Press and its Fair Finance Watch, based in New York, has uncovered the potentially damaging evidence from documents obtained under the Freedom of Information Act. It reveals letters from soldiers, and their wives, which allege that HSBC subsidiaries in the US are flouting rules under the Servicemembers’ Civil Relief Act requiring them to cap interest payments on outstanding loans at a maximum of 6% per year “during any part of the period of military service”. However, one letter obtained by Fair Finance Watch, dated September 11, 2003, from the wife of a US Marine to the Comptroller of the Currency in Houston, Texas, and copied to Household, details a request for “relief from our creditors” under the act. She added: “Household Bank has not responded to my request and has closed the account. They have now turned it over to a collection company. “My husband joined the Marines to protect this country and is being punished for doing so by Household Bank.” HSBC bought US consumer credit group Household International for £8.2bn in November 2002. Documents uncovered by Fair Finance Watch show that HSBC has attempted to narrow the terms of the SCRA to only those serving “in a hostile zone”, rather than, as stated by the act, “during any part of the period of military service”. The study reveals one letter, dated May 20, 2004, to the Department of the Treasury in Washington outlining the case of one soldier who was deployed on September 23, 2003. His creditors were contacted informing them of his deployment and that he was seeking relief on his interest payments under the SCRA. It states: “Other creditors have lowered his APR to 6% and have credited back the difference along with any other charges from September 23, 2003 .. An e-mail obtained by the human rights group details the story of a soldier who was deployed on Operation Iraqi Freedom. He became so exasperated in his dealings with Household, he wrote an e-mail to his senator requesting assistance. On four occasions the soldier allegedly sent the bank his mobilisation orders, a letter from his commanding officer, plus other official documentation to prove he was mobilised on October 16, 2004. But, he said, the bank “continue to harass me via internet for payment” ... Congressman Calls It ‘Financial Friendly Fire’; Military Blames Payroll Errors By BRIAN ROSS April 26, 2006 — – Hundreds of soldiers wounded in battle in Iraq have found themselves fighting off bill collectors on the home front, according to a report to be released tomorrow. The draft report by the Government Accountability Office, which ABC News obtained, said that hundreds of wounded soldiers had military debts incurred through no fault of their own turned over to collection agencies. .. The Army said it moved wounded soldiers out of the battlefield so quickly its accounting office could not keep up, resulting in numerous payroll errors. “This is no way to win a war, I can tell you that,” said Davis. “You’d think after four years after fighting a war in Iraq, the government would have its act together.” But the Army said it is now trying to correct the problem. Since ABC News first reported on the plight of soldiers, featuring Johnson and Kelly in a “Primetime” investigation in October 2004, the Army has forgiven most of their debts .. Davis said there may be thousands more whose thanks for putting their lives on the line has been a knock on the door from a Pentagon [HSBC racketeering] debt collector."

"Gunns Limited (GNS) is a Tasmanian based, fully integrated hardwood forest products company and is Australia's largest forestry company. Operations are based on state government owned hardwood forests and company and third party owned plantations. GNS is one of the largest suppliers of hardwood woodchip to Asian pulp mills with Japanese mills accounting for over 60% of all woodchip exports. Other activities include sawn timber, local hardware merchandising and construction and managed investment schemes involved in forestry and viticulture sectors. In September 2010 the company announced it would end the so-called 'Forestry Wars' by working with environmental groups and regulators to transition from native-logging to more sustainable plantation-based harvesting .. Major Customers & Competitors GNS supplies woodchips to four of the top five pulp mills in Japan. The top five customers account for approximately 70% of GNS's hardwood output. Local competitors include Carter Holt in NZ. Internationally, competition is coming from South Africa and several South American nations as they attempt to build a presence in the Japanese woodchip market. Substantial ShareholdersName % Holding ... National Nominees Limited 16.4100% J P Morgan Nominees Australia Limited 10.8400% HSBC Custody Nominees (Australia) Limited 7.4000% Citicorp Nominees (Australia) Limited 6.7000% ANZ Nominees Limited (Cash Income A/C> 6.4000%" .."Gunns unloaded George Lekakis From: Herald Sun May 24 2008 ..TASMANIAN timber company Gunns was yesterday trying to organise a banking syndicate to fund development of its controversial pulp mill in the Tamar Valley. It is believed ANZ Bank has told Gunns it is no longer prepared to participate in a funding syndicate for the proposed $2 billion pulp mill. It is a bold move by ANZ, which now risks losing its role as the company's transaction banker. Speculation surrounding the financing of the pulp mill yesterday crunched Gunns' shares, which closed 19 - or 6 per cent - down at $3.02. In the past Gunns has relied heavily on ANZ for working capital and other forms of funding.Westpac and Commonwealth Bank have also extended credit to Gunns, but the former is believed to have walked last year from a request to fund the pulp mill project. ANZ, Westpac and National Australia Bank are signatories to the Equator Principles, an international code that aims to ensure financial institutions provide project finance in an environmentally responsible manner. Commonwealth Bank is the only major Australian bank not to sign on to the principles.Most of the world's largest banks are signatories, including Citigroup, HSBC, Bank of America and Standard Chartered.Gunns is believed to be negotiating with the likes of Royal Bank of Scotland, Deutsche Bank and a swathe of Asian banking giants, which are not committed to the principles. BusinessDaily sought comment from Gunns last night, but phone calls were not returned."

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Looking into our circumstances...