Can you prevent identity theft by creating a new identity online?

Creating a new identity online will help prevent identity theft. And identity theft prevention begins when you buy your new computer.

Anonymous Registration

Can you avoid identity theft by practicing computer and internet privacy? Of course.

Computer privacy and internet privacy are best accomplished when you start right once you buy that new computer.

Create a new identity for online use to avoid identity theft. Too many identities are stolen when fraudsters track and trace their identity theft victims who use their true names during online communication. Go against the grain and create a new identity for non-official purposes. These include; e-mail communication, online purchases (gift cards registered anonymously), and forum registrations.

Break the paper trail to you when you purchase your computer

The American work force is made up of many unstable, part-timers who are underemployed. Certain employees have been convicted of identity theft. Keep your purchases anonymous and prevent identity theft by lugging in the cash necessary to buy your new computer.

Credit cards, debit cards tied to bank accounts, and personal checks provide the sophisticated identity thief with foundational information necessary to find your source of funds or credit lines.

How to surf the web anonymously with a pseudo name

Use a new identity when communicating by e-mail. If you market your services, use a company name until contact is made with the potential customer. Register your business anonymously as per the book, Privacy Crisis.

Anonymous Internet Service

It’s truly amazing to watch the masses kowtow to corporate providers of internet services. They give their true name, home address, home and business telephone number, credit bureau information, and Social Security numbers to part-time clerks who process applications for internet service. Think. Why is it necessary to provide an open book to your life to obtain internet service? It isn’t. Use a nominee or hold the account anonymously in a company name or create a new identity for this service. Sometimes, a deposit is required when you buy the service without a contract. And this extra deposit can protect your identity as you use the internet as you cannot be traced by identity thieves and other criminals when your alternate identity is the holder of the ISP account.

Grant Hall

Do you question the Obama files and his personal privacy?

Do you question the Obama files and his personal privacy? I do. Where are the files?

Nonsense, not common sense is the order of today. When a basic question arises on something so simple as eligibility for the office of president of the United States, and it goes to unsettled status, something is terribly wrong in America.

And what about the highest court in the land, the supreme court? How about their decision to not hear Phil Berg’s case because he doesn’t have “standing?” How “supreme” is that?

Where are Obama’s college transcripts, law school records, long form birth certification, medical records? Why is everything so “hush, hush” when it comes to talking about the guy who holds the office of president?

Attorney, Taitz has also failed to have her case against Obama heard by a court. Why?

Are the courts “in bed” with the Wall Street gang who pushed Obama into the presidency?

Why do the mainstream media stations-radio and TV fail to talk about Obama’s eligibility? Sadly, if you want to hear that song played, you’ve got to turn the dial off, and fire up the old computer and search for one of the guys or gals who don’t make money from broadcasting to listen to the Obama eligibility debate.

I sit here after two years into the presidency without an opinion on whether the president is qualified. Honestly, I don’t know. I reflect back and wonder. If Ronald Reagan had been asked to reveal anything of relevancy about himself being eligibile, would there have been whispers and silence, or would we get an answer to the question? A real answer?

Grant Hall

money 101 and why you have no banking privacy part 2

Imagine your money being printed as any paper printing operation. Remember from article 1 in this series that paper money only serves as receipts for a store of value-in a real monetary system that is properly backed by commodity assets. See the first article here: http://www.privacycrisis.com/blog/?p=941

The Federal Reserve System is for the most part, a non-asset backed monetary system. How much gold backs the money? No one knows. With the speed and intensity of the money printing operation since the 2008 Wall Street and corporation bail out fiasco, it is irrelevant anyhow as there has been so much money printed or created in digital form that dollars are naturally worth less.

About Bank Secrecy and why you need it for personal privacy and business privacy:

Recognize the nonsense of not having the banking privacy you may want. Who earned the money-and paid a hefty tax bill after these earnings? You did. Why, then are you not given the freedom to store it as you wish-anonymously, if you please to do so? Because, as explained in the first part of this series, the pseudo government agents, the banks provide an accounting of your money and you to your government when they ask for it. These kinds of “audits” occur when any agency with clout provides a second agency or a court with your bank account holdings If they choose to freeze your funds or confiscate your assets. Read about the NORFED Corporation company seizure here:

http://www.lewrockwell.com/orig10/hall-g2.1.1.html

After reading this documented company closure and asset seizure by force, certain business managers, high net worth individuals, and all who earn a living and store money in traditional bank accounts, may recognize that their assets and bank accounts-corporate and personal, could be at risk of being attacked and seized. With the possibility of an asset  seizure looming  managers and individuals may choose to implement a bank secrecy program and include the added costs of this business privacy principle as a necessary cost of doing business.

Is offshore banking the best financial privacy idea for you?

Businesses may need a bank account in their homeland to effectively manage their business finances. Certain companies may require a U.S. bank in order to process ACH payments received and offshore banks may hold checks in excess of thirty days. These reasons alone make banking offshore for business  and personal accounts impractical and unreasonable.

In lieu of an offshore bank secrecy program-which are no longer secret based on my extensive research and in my experienced opinion, businesses and individuals who require banking secrecy will be better served to use the services of a U.S. bank account that is properly set up as a personal and confidential bank account. Can a bank secrecy plan be implemented in the U.S.? Yes.

Check cashing stores

Certain check cashing stores are taking market share from U.S. commercial banks by taking any and all “banking” customers-without restrictions. These retail operations provide services that are similar to banks.

Business privacy and personal privacy can be best accomplished through the use of check cashing stores, not commercial bank accounts. A business manger or an individual can accomplish asset protection with the starting point being the immediate control of his or her cash. Simply open an “account” with a check cashing store, present your business check, personal check, bank draft, or other negotiable instrument, and receive cash in your hands-minus the 1.9 % to 2.9% (average fees) charged for this service, of course. Now, your “bank account” with its $0.00 balance cannot be liened, frozen, attacked, or confiscated.

Bank Secrecy in the U.S.A. can be accomplished when the account is properly opened and maintained.

Back to the check cashing stores.

These operations sell a prepaid debit card with the MasterCard or Visa logo that is a handy jewel to have. These cards are sold by the check cashing store, sent to you by a financial services company, in most cases, and sponsored by a U.S. bank that is usually based far away from where the customer purchased the card.

Several check cashing stores sell these prepaid debit cards with their online bank account that has a routing number and an account number-just like a commercial bank account. And these accounts can sometimes be opened without Social Security numbers or Employer Identification numbers. It gets better: In addition to not providing a tax payer identification number to the institution, there have been business customers who have opened these accounts in their business name while using variations of their company and personal documents to open these accounts instead of the banks’ cherished, tracking and tracing information and numbers; the Social Security numbers, Employer Identification numbers, and mothers’ maiden names.

Negotiations for personal privacy and business privacy

Personal privacy and business banking privacy is best accomplished through negotiations with reasonable managers at check cashing stores. Through your excellent communication skills, you can get what you want to prevent bank identity theft and keep your bank account private. Remember these accounts are for holding funds temporarily, much like a current account, a non-interest bearing account. And they can be kept totally private when you handle the account correctly.

Investments will be the subject of a future article and may be held in U.S. entities protected by private registration and/or Offshore Asset Protection Trusts.

You may be interested in my upcoming book tentatively titled: Privacy Crisis Banking

The new book will be offered as an e-book and as a hardcover book and will be available for purchase from the website and from bookstores everywhere.

My current e-book, Privacy Crisis: Identity Theft Prevention Plan and Guide to Anonymous Living provides information on business identity theft prevention, personal privacy living tactics, and may be purchased and downloaded within five minutes from now.

Thanks for reading.

Grant Hall

What is the single most effective way to protect identity and prevent identity theft?

Identity theft prevention may be the most important consumer personal privacy task individuals face today. How can one protect identity and prevent identity theft as this fraud crime leads all other crimes?

Identity theft protection privacy living principle

The use of a new identity for all non-official uses can assist you in preventing identity theft. Though many will balk at this idea, privacy advocates who have adopted this high-level privacy principle, endorse the use of an alternate identity as a certain way to break the identity trail  from data bases that normally collect the real identity of consumers.

Why does the butcher, the baker, and the candle stick maker need to know your true name? He/She does not. And in fact, it may be dangerous if you provide your real name, and especially your personal and confidential identification documents to businessses and agencies as you do business.

How does one create a new identity?

First, recognize the limitations of using an alternate identity for personal privacy. The details are spelled out in the personal privacy book, the big red, white, and blue book pictured to the right of this column.

Do not use fake identification when asked by law enforcement for identity information.

Personal privacy is essential to prevent identity theft and the use of an alternate identity for privacy living will break the paper trail from certain data bases to the real you. This privacy living principle helps you avoid identity theft as the identity thief will have no idea how to find you or your assets when you travel, bank, work, and live anonymously.

Grant Hall

Divorced Fathers; a white collar crime mystery-thriller short story by Grant Hall

Divorced Fathers is a short story fiction tale by Grant Hall.

Names, places and events are entirely fictional, and the story is intended for entertainment purposes only.

DIVORCED FATHERS

They were divorced, tired and broke. They didn’t care anymore.

Divorced dads, battered and burned, they longed to beat the system; the unfair child support collection agency-filled with agency henchwomen, whose job satisfaction came from cornering divorced dads and raping their finances; emasculating them, and turning them into neutered, whining, stray dogs. Revenge is a strong force.

Cott had not paid the child collection agency in four years. He had learned how to create a new identity, had banking privacy, traveled anonymously, and had work privacy in place-all learned from the big, red, white, and blue book.

His ex-wife had tried to haul him into court, but his identity protection plan, complete with fake i.d., a home rented in a new identity, and his work privacy plan, with a privately registered Limited Liability Company had been the best identity protection plan possible, and this privacy crisis plan had worked-at least for the last four years. He was now fifty-two.

His work was accomplished without public appearances for the most part, and most of his business appointments were phone conferences or handled with e-mail communication. On occasion, his job as a self-employed website developer/Search Engine Optimization expert required a face to face meeting, but these meetings occurred infrequently.

Cott’s buddy, Bartel had come on hard times and opted for privacy living, too. He owed child support and alimony, and had been in arrears for three years. Together, they had talked and talked about how to create a new identity. And learning how to get a new identity had not been easy, not until they came upon the big red, white, and blue, personal privacy book, that is.  They learned how creating a new identity had successfully been accomplished by others who faced their plight; financial imprisonment and “pauper hell,” until their ex’s unleashed the alimony collars and untied the kid ransom knots, and released them from the debtor prison cells in which they would always be confined-at least for the best and most productive years of their lives. Both had loudly proclaimed their freedom, and vowed to each other that they would beat the system-forever, and live as fugitives rather than be enslaved by the whores who donned the black robes, and the guards of whores who sought them now and who would hunt them forever. And they drank whisky and smoked to ease their pain.

Bonding

Bartel was unemployed and near-broke after twenty-five years as a high-level paper pusher for several fortune 500 companies. At six feet-two, he was the taller of the two, and he liked expensive cigars, rare steak, beautiful women, and rye whisky-all before noon when he could get them. An ex-footballer, he appeared gifted on several fronts; intelligence, a muscular physique, handsome features, and a  photographic memory.

His penchant for perfection was well known among colleagues, and he had graduated number six in his law school class-at Michigan. And though he never practiced law, he was often consulted during management meetings while rising up the corporate ladder, and his advice was well respected-both as a strategic manager and as an in-house lawyer-unofficially. He never stayed longer than three years at a position and claimed “boredom” as the reason for his departure on his resume. And he gambled.

Cott had taken Bartel into his home following a friendship built during divorced fathers’ support group meetings both had attended over a period of a year. And while both fit in with the group, it was a meeting each “outgrew,” while electing to chat over coffee and drinks themselves on meeting nights rather than attend the scheduled gatherings at the Methodist church.

On this day, Cott had little to do; the recession-turned depression was curbing managers’ taste for expensive SEO and many were trying to rank high in the search engines rankings by sprucing up their sites themselves or by hiring website designer flunkies who promised first page rankings at a cheap price in record time, and they never delivered. Garden variety website building work had slowed to a crawl, too. He had time on his hands, only three or four thousand saved, but he had a generous nature. He didn’t mind helping Bartel with room and board. He liked him.

“I wonder what percentage of guys are in arrears with the recession in full swing?” Bartel had asked the question to himself while thinking out loud as much as to Cott.

“Revenues have slowed. No doubt about that,” Cott answered.

“And to think that my ole lady is shacking up with a guy from my own outfit. Sonofabitch. Course there’s nothing I can do about her. My walking out completely burned her ass though. The boy and girl won’t go hungry or anything. Her folks own Crawford and Jiles.” Bartel’s words were clear and without emotion as the two men’s eyes met. He felt no guilt. Cott listened and thought.

Cott checked his e-mail and was unexpectedly surprised. The inquiry had been answered. His proposal, a bid to reconstruct and optimize the website of the state agency was being considered. He had bid competitively, but not too low. The LLC and his pseudo name were well known in certain state government circles as his work had been recommended by the trouble shooter-type manager for the governor-the right hand man to the ex-muscle man himself. He smiled to himself. The proposal being considered was for the reconstruction of the website for the state child support collection agency.

Cott’s banking privacy was taken care of through the diligence of careful planning. He had been a stock broker for twenty years prior to his career change after the dot com bubble had burst, and he, like many others in the business had been forced out the door. He knew his way around the banking and brokerage industry, and his abilities had enabled him to transfer his skills for the purposes of his own financial privacy. And the big red, white, and blue book had taught him how to bank anonymously, and how to be invisible.  A real jewel, he thought.

He had learned how to disappear and never be found by reading. Both he and Bartel had discussed their options and conversed about their lifestyles of living under the radar. Finally, they had adjusted to living the fugitive lifestyle.

Monday brought more pleasant surprises as Cott met with the director in charge of hiring the website developer for the state job. For this personal appearance, he wore a wig, glasses not normally worn, and pulled his native Boston accent out of hibernation to disguise himself further.

The director of agency public operations for the state, Henry Boterzo was also from Boston. A second generation Italian, Berterzo had atttended Yankten College following his transferring from a community college in Oklahoma-the only school that he found that would admit him with his D-ridden high school transcript. But after seven years total of bouncing around the country, he had obtained a bachelor of arts degree in Sociology and went West to seek his fortune, landing with the department of corrections as an entry level manager first and then to a series of mid-level management type positions prior to his current appointment. His promotion was a fluke of sorts, brought about by his publicity campaign and popularity. He was cultured and considered himself an aristocrat of sorts. He knew the right people. Always.

 Round faced, balding, towering, and with a gift for conversation, everybody seemed to like Henry, and his career climbing abilities astonished his more qualified colleagues, but they too liked him. He confessed to being “lazy,” and cared more for pasta dishes, imported ice creams, and fine wines served in the best Italian restaurants and gab than his work, and he often left in the early afternoon to secure a seat at a favorite watering hole while beating the five o’clock rush hour traffic.

“Miss Ramone over at Child Support Collection got your name from Davis, the supervisor at Employment Development. He liked your work. So did Dal Kass over at Motor Vehicles. Are state government contracts your preference, Mr. Baily?”

“I have leaned toward state contracts as each assignment has led to the next due to referrals. And I like providing a service that benefits the people of the state in one way or another. I’m certain we caan make the agency site fully functional in view of your new requirments, ” Cott answered.

Henry glanced at his watch and thought about the files on his desk. And about his growling stomach.

“I’m prepared to hire you today. Contracts are the same in all departments. What say? Shall we wrap this up?”

They both signed the contract and Cott was given the authorization password to the central office computer network, and he promised to begin the reconstruction job of the agency website the following week.

Henry Berterzo slipped out the back door and drove his Lexus toward Zizcotto’s and day dreamed of their veal and lamb meatballs.

Thoughts of Plans

They laughed until tears came to their eyes over Cott’s new contract with the Child Support Collection agency-the very department that had them both listed on their “most delinquent” list-the list fathers feared most, the one with warrants and rewards beneath their names on posters in government offices, and the very same website Cott would be reconstructing within a few days.

When the beer ran out, they went to whisky shots. After a while, both began to speak of grandiose-like ideas, the kind that are not  fantasy entirley, but the talk that comes from real desires, and surfaces from thoughts to words only when liquor lossens inhibitions and begs a supportive ear-if for no other reason that to escape the temporary boredom of ordinary existence. Dreaming can be fun with a willing conversation partner.

“Say Cott, if I was in your shoes, I’d repair that state website alright. Ever think of monkeying with the data? How about diverting some of those monthly child support garnishments into your company account? Or better yet, mine. I think I have about three hundred bucks to my name. How’s that for an editor of the Michigan Law Review?”

He had thought about it. As a matter of fact, compulsively over the last number of hours.

“It’s temporary. You’ll come back. Any responses to the feelers.” Cott knew the answer to his own question as soon as he had blurted out the words.

“No.”

Both men were silent for a time. Bartel took a drag on the half smoked cigarette, inhaled deeply, slouched in the easy chair, then sat straight up. Their eyes met. Both were serious now.

“My undergrad work was computer science. PC’s were nothing compared to today. I’ve kept up though. Plus I go to the hacker forums all the time. With that central computer and network passcodes, the whole system could be changed to pay whatever bank accounts you choose-with a few days of hacking work, that is.” Bartel appeared to mean every word though he was clearly feeling the booze.

“What does your law degree tell you about the crime when you get caught, Cott replied?”

“Penalties would be stiff. We’d both die in prison.”

“We? The hell you say. Not me. I’d never go to their cages and become “Bubba’s” punk.”

After each had another drink, Cott strolled toward the stairway. He was tired. Lying in bed minutes later, he day dreamed when he could not get interested in the paper back novel at his bed side. He stayed up thinking about their conversation until the wee morning hours.

In the bedroom next door, Bartel slept like a baby.

The “Job” Description

Though he was unemployed, broke, and homeless, Bartel was the leader of the two. Over a period of a few days, he convinced Cott to think seriously about using his front contract job to pave the way for a real score, the state “job.”

As Cott’s conscience bothered him initially, Bartel appeared to have no reservations about stealing from the state. Perhaps he sought revenge. He had no criminal record-except his current child suppport arrearage, and the crime itself may have appealed to him because of the source of the funds to be robbed. Or maybe, criminal tendencies within him had remained latent, awaiting the proper spark to fuel his fire, whether for revenge or to feed an ego-self absorbed, starved, and awaiting the stimulation the heist could provide. The state “job” offered Bartel the opportunity to prove himself again-to himself.

He read compulsively, bought e-books on all aspects of code, programming, and hacking- everything he imagined would be necessary to know, in order to tap into the giant bank account he intended to highjack-with or without the man who provided him with a roof over his head. His compulsion continued as Cott readied himself to begin the state website project any day now-as soon as the loose ends were tied on two jobs near completion.

They spoke of the mass potential the theft offered each evening after dinner as they drank beer, whisky or brandy. And sometimes all three. Cott was coming around-at least when he had the liquor to help influence his thoughts and judgment.

Decisions

They were a compatible team. Cott had the inside track with a bonifide contract that could pave the way for the biggest bank heist in the history of the country-maybe the world. Bartel had the background in both education and business savvy to provide resources to keep the cash safe once the robbery was completed; Nevada Limited Partnerships owned by offshore trusts and privately registered without a trace to either of them. He had connections for administrative trustees, and nominees. He could form a company-anonymously that would serve as the general partner, and this entity would take the hit, not them when stolen money was traced to the partnership. The problem would be retrieving the funds, because the general partner, Limited Liability Company would have no assets, and would be a mere shell designed to deceive and deliver the privacy necessary to pull off such a caper. He planned everything and recruited front men as needed to sign on the dotted line on his business entities’ forms, and these businesses would soon hold bank accounts that would receive the wire transfers of the diverted funds, decoy accounts that would be used as temporary homes for the child support collection’s bank account that wiould be filled to the brim on the first of the month as divorced dads-willing and unwilling, would be forced to supply their funds to the state bank account, through garnishments and voluntary checks. But this time, a sneak attack would take these monies and divert the funds, not to mom’s everywhere, but into the accounts of two ruthless men who sought wealth and revenge against big bureaucrat, their enemy now and forever.

They thought and decided.

Though Cott had been a hold out and wanted more time to decide, the event that sealed the deal was a letter forwarded to him by his offshore mail nominee. The letter was a court order and within the document, a private investigative firm’s employee had sworn to have served “one Cott Baily” in person making the court order adjudicating more than three hundred dollars more each month his new obligation.

He swore for days, made threatening promises to kill the sonofabitch who had purgered himself in an attempt to bury him deeper in his hole of arrearage-debt he promised himself, and his friend that he would never pay-even if he had to dig himself a hole in the desert and live like a ground hog, by God, those devils would never see a nickel of his money. And he drank every night and became increasingly more angry.

“The thing that gets me is the way these arrogant private investigators prance around trying to push us around. That’s twice in two years they’ve claimed to have handed me a summons. Service has to be done in person. I could prove them wrong. With receipts documenting my location when they claimed to have served me. Bastards!”

Bartel empathized with his friend. Was this the ace in the hole needed to provide Cott with the motivation, the desire that had been lacking until this point? He believed so.

“Of course your testimony and documents, receipts, whatever , could be used to prove the whore for the fag in the black robe wrong,” Bartel said. Then he leaned back, crossed his feet at the ankles and studied Cott.

He’d never seen Cott so disturbed. He drank nightly, often becoming drunk-unusual behavior for his friend who was usually cool, matter of fact, business like, and emotionally stable. His normal “even keel” temperament now resembled the attitude and expressions of what had become familar to him. Cott’s behavior reminded him of his own.

To be continued.

Most important travel tip for preventing identity theft

What is the single most important travel tip for preventing identity theft? Using a car for travel that has no link to your personal identity will help avoid identity theft.

Sound too paranoid for your taste? Perhaps not when you consider that identity theft prevention is far cheaper than trying to fix a stolen identity disaster if it happens. In order to make certain that you protect identity when your car plates are “run” by a professional identity thief or an identity theft gang, register the automobile in the name of a trust, and learn to register the car properly for maximum identity protection.

How can you protect identity as you drive? I have found a trust-owned car to be the most practical for preventing identity theft when certain precautions are taken and proper due diligence is done during the automobile registration process.

Make certain the trust’s name has no relationship to your true name. Insist that the Department of Motor Vehicles, Department of Transportaiton or whatever agency registers cars in your state handles the process as per your personal privacy requirements.

Include the trust’s name only on the registration. Provide your name as trustee and use a U.S. passport as an identification, not a state issued driver license. Generally, the agency will try to associate your name as trustee on the car registration records. Avoid this by speaking with the highest level supervisor in the agency and make certain that only the trust’s name is on their records.

Once this is completed, your plates-if they are run will provide the trust’s name and address as the legal owner only, and your name as the driver will be hidden deep beneath the car agency registration files, and this information will not surface in the event an identity thief attempts to track and trace you as you drive.

Grant Hall

Do you believe in magic and Federal Reserve System?

Paper receipts provided for the convenience of trading valuables. That’s what “money” was intended to be. Asset-backed, paper is the only credible money source. Unless you’re the Federal Reserve, that is.

The “Fed” is neither federal nor do they have assets backing the currency printed for the U.S. treasury. Or do they?

How about human collateral? People who are forced to pay the debt created from thin air by the Fed, loaned to the government at interest may be considered the best form of loan collateral-as long as they continue to pay.

Think your tax dollars go for services such as roads, highways, bridges, city services? They don’t. Every dime paid to the Internal Revenue Service goes to one source; payment of debt and interest to the Federal Reserve System-the private corporation “hired” by congress in 1913 to control monetary policy as the privately-owned central bank of the United States of America.

Does any of this make any sense based on your educational background and those business and economics courses you struggled through? Never knew that the “Fed” was a private corporation, I’ll bet.

Check out these references to enhance your education on the subject-the controllers of your devalued dollars;

1. Secrets of the Federal Reserve by Eustace Mullins

2. The Creature from Jekyll Island by G. Edward Griffin

Once you’ve got the books, refer to the bibliography and footnotes. Check those often.

While Griffin’s book is a near-best seller over many years, the public at large generally remains ignorant of the source of their money, and seeming buy the inflation argument as an explanation of why so many wind up poor in their later years. In fact, this fiat money creation system, a pyramid scheme is the reason for devaluation of the currency, and your loss of purchasing power.

Grant Hall

Money 101 and why you have no banking privacy

Why are government agencies so concerned about citizens’ money and property holdings? Why do individuals and companies not have banking privacy and bank secrecy if they so desire it?

The reason the U.S. government monitors citizens’ bank accounts through their agents (banks) and keeps tabs on their property is because human collateral is all that backs the dollars in circulation. Banking privacy is a privacy right-as in constitutional right, and a God-given right. But, unless your government knows that the human taxpayers will pay income taxes, the ponzi scheme that is the Central Bank of the United States will come crashing down. So, citizens rights are taken and they have no bank secrecy, no financial privacy as the government agents (banks) steal these rights, share it with those who subscribe to data banks where customers’ banking information is kept, and all citizens who don’t know better, never question the system, and remain ignorant about how the money system works.

Centuries ago, Gold was hoarded as a store of value and used for trading for goods and services. Storage was sought by owners of Gold and the Goldsmiths who stored the precious metal issued paper reciepts to the owners. It was an easy system to tabulate. Receipts valued and marked based on the amount of Gold in storage. Easy, convenient, and fair acccounting practices.

What is money? Money is a receipt, a means of exchange based on property (currency) having value. In order to have value, intrinsic value must be established and there must be agreement in the market place. Commodities or property must be the real store of value in order for money (receipts) to be believed in. Thus, it matters not whether the store of value backing the receipts are oil in storage, rice and beans in the warehouse, Gold in the vault, rare shells, buckskins, or ivory. The concept of money remains the same; assets have to back the monetary receipts being exchanged to give this money credibility and to give those holding it confidence that its stability will remain constant-with acceptable valuation changes as per market place perception of the money, of course.

Do you understand your money? Did you know that U.S. dollars are created as debt? Know anything about the Federal Reserve? Once I interviewed ten bankers, some with thirty years of banking experiences, and not one could provide an accurate definition of the Federal Reserve. In fact, the Fed, they all believed, is a part of the Federal government. It is called, “the Fed,”  isn’t it? So, how can it not be a part of the government? Because the name, “Federal Reserve System” was planned as a name for the U.S. Central bank to delibertly deceive you.

The Federal Reserve System was planned by agents for the most wealthy men in the world in 1910 in an obscure place called Jekyll Island, Georgia. Three years later, the Federal Reserve Act was passed and the Fed, a private corporation, as per a contract with the U.S. Treasury, became responsible for regulating monetary policy in the United States of America.

Two reference books on the Federal Reserve System that I recommend are:

1. Secrets of The Federal Reserve by Eustace Mullins

2. The Creature From Jekyll Island by G. Edward Griffin

How does the Fed create money? They print it without any confidence-building assets backing it. That’s right, the private corporation, the Federal Reserve, prints money out of thin air. Sound unbelievable? It gets worse. Once they print it-or issue it in digital credits, they loan it back to the U.S. government and banks at interest.

The Federal Reserve System is the heart of the banking system. All banks in operation borrow from the Fed-the ones who create money they don’t have, and then “loan” it to U.S. banks. Now, of course, such a farse, a bastardized monetary system such as that will only stand for some time-it’s gone 97 years so far. You see, the market is very smart. It doesn’t matter if that market is for Stocks, Bonds, Gold, Silver, Soybeans, Rice, Wheat, Cattle, Houses, or Land, the market (people and facts) know what properties are worth at any given time based on what buyers are willing to pay sellers for that property.

Guess what has happened to your U.S. dollars over time? They have gone down in value, of course-in the currency markets and in the shopping markets-manifested by your loss of purchasing power to buy, or not having the ability to buy what dollars used to be exchanged for in like goods and services. That’s the result of printing money irresponsibly-without assets backing the money receipts; devaluation and a loss of the ability to purchase goods and services at the same rate over time.

Commonly called, “inflation,” the loss of purchasing power is an unnatural market condition. The reason devaluation, not inflation occurs and money loses value is because money is in oversupply-the result of adding more dollars dilutes their value, and the lack of scarcity causes the dollars to be worth less. And eventually, worthless.

Grant Hall

Bank account garnishment and no banking privacy?

Jim’s ATM card returned a $0.00 balance receipt as he was attempting to withdraw $200.00 from his checking account on his way to his new girl friend’s house for their third date. Frustrated, angry, confused, and puzzled over what could have gone wrong, Jim spent the next thirty minutes listening to broken-English speaking “representatives” of the money center bank, and going back and forth from music to voice mail and recorded promises of quick customer service, and finally gave up on resolving the bank account issue. Then he remembered. Had they screwed up and forgot to credit his payments when he moved?

Big Social Worker had wasted no time in taking his cash. No sooner than the ink was dry on the interstate transfer file, she had the file couried over to the agency’ inhouse private investigation office. With governement data bases, junior P.I.’s had located Jim’s personal bank account in record time that Friday afternoon. $1,323.45 was the balance and a quick phone call back to Big Sis’ office confirmed his child support was $780.00 and two months in arrears. So, they grabbed the whole account.

Jim had in fact paid all child support due, but had recently moved from one state to another. One state agency gal forgot to credit his new account for monies received the past couple of months. So, without owing a nickel to support his child, Jim has been branded as a “dead beat dad,” a horrible label to be forced to wear, and even worse when tagged by mistake, and all because of a social worker’s mistake. Or not.

Over the next few weeks, Jim took responsiblility for his plight and recognized that with fifteen more years of child support to pay, he had better get on the stick if he wanted to keep his cash. 

Jim never recovered his $1,300 which wasn’t really owed. Fifty phone calls and a trip to the Child Support Collection office provided zero results. Jim opted to establish his own banking privacy plan in order to survive-just in case another trigger happy group of G men and gals placed his money in their sights at some future date.

Calls to banks, credit unions and brokerage houses all yielded no results as he sought bank secrecy. Offshore accounts? He did not know where to begin. And then he discoverd the check cashing stores.

These retail outlets proved to offer Jim the best bank secrecy and financial privacy available. He provided name, date of birth, a copy of his passport and a cell telephone number. When asked for his “social,” Jim declined and the guy behind the plate glass window let the Social Security number “requirement” slide.

Now, Jim brings in his paychecks to the store bi-weekly, receives his cash minus the 1.9% check cashing fees and stores his excess cash in the anonymous safe deposit box that he discovered by reading the best privacy book in the world. Jim has established banking privacy and has a financial privacy crisis plan in place.

James Clark King, LLC