|
Saturday, November 30, 2013
ZORRA'S CALL SATURDAY MORNING! TOMORROW!
Government Opening Free Gas Stations in Poor Black Neighborhoods
Subject: Government Opening Free Gas Stations
in Poor Black Neighborhoods
Subject:
Fwd: Government Opening Free Gas Stations in Poor Black Neighborhoods
|
A BLACK MAN'S TROJAN HORSE
A BLACK MAN'S TROJAN HORSE
This is one of the most profound messages that can be put out to the public. My respect for Lloyd Marcus is great. He is truly an American Patriot!! If a white person would have said what he says here, I would expect a backlash from the media and others. I agree with his sentiments and statements. I would ask you to read it and forward it; unless you don't agree with his analysis. And if you don't agree, then may you be blessed with no consequences from it.
|
Amen!!!!
THE PARROT...
THE
PARROT...
A young man named Harold received a parrot as a gift. The parrot
had a bad attitude and an even worse vocabulary. Every word out of the bird’s mouth
was rude, obnoxious and laced with profanity.
Harold
tried to change the bird’s attitude by consistently saying only polite words,
playing soft music and anything else he could think of to “clean up” the bird’s
vocabulary.
Finally,
Harold was fed up and he yelled at the parrot. The parrot yelled back. Harold
shook the parrot and the parrot got angrier and even ruder.
In
desperation, Harold threw up his hands, grabbed the bird and put him in the
freezer.
For
a few minutes the parrot squawked and kicked and screamed. Then suddenly there
was total quiet. Not a peep was heard for over a minute.
Fearing
that he’d hurt the parrot, Harold quickly opened the door to the freezer. The
parrot calmly stepped out onto Harold's outstretched arms and said, “I believe
I may have offended you with my rude language and actions.
I’m
sincerely remorseful for my inappropriate transgressions and I fully intend to
do everything I can to correct my rude and unforgivable behavior.”
Harold was stunned at the change in
the bird’s attitude. As he was about to ask the parrot what had made such a
dramatic change in his behavior, and the bird continued… “May I ask what the
turkey did?”
COMING SOON .. OBAMAFLOWERS
(Receptionist) Hello, Welcome to
ObamaFlowers, My name is Trina. How can I help you?
(Customer) Hello, I received an email from Professional Flowers
stating that my flower order has been canceled and I should go to your exchange
to reorder it. I tried your website, but it seems like it is not working. So I
am calling the 800 number.
(Receptionist) Yes, I am sorry about the website. It should be
fixed by the end of November. But I can help you.
(Customer) Thanks, I ordered a "Spring Bouquet" for our
anniversary, and wanted it delivered to my wife's work..
(Receptionist Interrupting) Sir, "Spring Bouquets" do
not meet our minimum standards, I will be happy to provide you with Red Roses.
(Customer) But I have always ordered "Spring Bouquets",
done it for years, my wife likes them.
(Receptionist) Roses are better, sir, I am sure your wife will
love them.
(Customer) Well, how much are they?
(Receptionist) It depends sir, do you want our Bronze, Silver,
Gold or Platinum package.
(Customer) What's the difference?
(Receptionist) 6, 12,18 or 24 Red Roses.
(Customer) The Silver package may be okay, how much is it?
(Receptionist) It depends sir, what is your monthly income?
(Customer) What does that have to do with anything?
(Receptionist) I need that to determine your government flower
subsidy, then I can determine how much your out of pocket cost will be. But if
your income is below our minimums for a subsidy, then I can refer you to our
FlowerAid department.
(Customer) FlowerAid?
(Receptionist) Yes, Flowers are a Right, everyone has a right to
flowers. So, if you can't afford them, then the government will supply them
free of charge.
(Customer) Who said they were a Right?
(Receptionist) Congress passed it, the President signed it and the
Supreme Court found it Constitutional.
(Customer) Whoa.....I don't remember seeing anything in the
Constitution regarding Flowers as a Right.
(Receptionist) It is not really a Right in the Constitution, but
ObamaFlowers is Constitutional because the Supreme Court Ruled it a
"Tax". Taxes are Constitutional. But we feel it is a Right.
(Customer) I don't believe this....
(Receptionist) It's the law of the land sir. Now, we anticipated
most people would go for the Silver Package, so what is your monthly income sir?
(Customer) Forget it, I think I will forego the flowers this
year...
(Receptionist) In that case sir, I will still need your monthly
income.
(Customer) Why?
(Receptionist) To determine what your 'non-participation' cost
would be.
(Customer) WHAT???? You can't charge me for NOT buying flowers!!!
(Receptionist) It's the law of the land, sir, approved by the
Supreme Court. It's $9.50 or 1% of your monthly income...
(Customer)interrupting) This is ridiculous, I'll pay the $9.50.
(Receptionist) Sir, it is the $9.50 or 1% of your monthly income,
whichever is greater.
(Customer) ARE YOU KIDDING ME??? What a ripoff!!
(Receptionist) Actually sir, it is a good deal. Next year it will
be 2%.
(Customer) Look, I'm going to call my Congressmember to find out
what's going on here. This is ridiculous. I'm not going to pay it.
(Receptionist) Sorry to hear that sir, that's why I had the NSA
track this call and obtain the make and model of the cell phone you are using.
(Customer) Why does the NSA need to know what kind of CELL PHONE I
AM USING??
(Receptionist) So they get your GPS coordinates sir.
(Door Bell rings followed immediately by a loud knock on the door).
(Receptionist) That would be the IRS sir. Thanks for calling
ObamaFlowers, have a nice day... and God Bless America.
EPA preparing to unleash....... a deluge of new regulations
EPA preparing to unleash.......
a deluge of new regulations
Happy holidays from the Obama
administration. Federal agencies are currently
working on rolling out hundreds of environmental regulations, including
major regulations that would limit emissions from power plants and expand the agency’s authority to bodies of water on
private property.On Tuesday, the White House released its regulatory agenda for the fall of 2013. It lists hundreds of pending energy and environmental regulations being crafting by executive branch agencies, including 134 regulations from the Environmental Protection Agency alone.
The EPA is currently crafting 134 major and minor regulations, according to the White House’s regulatory agenda. Seventy-six of the EPA’s pending regulations originate from the agency’s air and radiation office, including carbon-dioxide-emission limits on power plants.
Carbon-dioxide limits are a key part of President Barack Obama’s climate agenda. The EPA is set to set emissions limits that would effectively ban the construction of new coal-fired power plants unless they use carbon capture and sequestration technology. Next year, the agency will move to limit emissions from existing power plants — which could put more older coal plants out of commission.
“The proposed standards, if finalized, will establish achievable limits of carbon pollution per megawatt hour for all future units, moving the nation towards a cleaner and more efficient energy future,” the agency said in its agenda. “In 2014, EPA intends to propose standards of performance for greenhouse gas emissions from existing and modified power plant sources.”
Hundreds of coal plants that have been closed or slated for early retirement due to Environmental Protection Agency regulations, according to coal industry estimates.
“Already, EPA regulations have contributed to the closure of more than 300 coal units in 33 states,” said Laura Sheehan, spokeswoman for the American Coalition for Clean Coal Electricity.
However, the agency isn’t just working on limiting emissions from coal plants. The EPA is also working on a rule that would expand the definition of “waters of the U.S.” under the Clean Water Act to include water on private property.
Republicans have hammered the EPA’s draft water rule as the largest expansion of agency power in history.
“The EPA’s draft water rule is a massive power grab of private property across the U.S. This could be the largest expansion of EPA regulatory authority ever,” Texas Republican Rep. Lamar Smith. “If the draft rule is approved, it would allow the EPA to regulate virtually every body of water in the United States, including private and public lakes, ponds and streams.”
The EPA’s rule is heavily supported by environmentalists who argue that it’s necessary to protecting water quality. Smaller water sources, they argue, eventually affect larger water sources that people use for recreation or their livelihood.
“It’s taking the way the Clean Water Act works back, so that it works the way water works in the real world,” Bob Wendelgass, president and CEO of Clean Water Action, told Fox News.
The EPA says the rule is needed to clear up uncertainty left in the wake of U.S. Supreme Court decisions on the agency’s regulatory authority over bodies of water.
“The [Clean Water Act] does not distinguish among programs as to what constitutes ‘waters of the United States,’” the agency said. “As a result, these decisions affect the geographic scope of all [Clean Water Act] programs.”
Follow Michael on Twitter and Facebook
Content created by The Daily Caller News Foundation is available without charge to any eligible news publisher that can provide a large audience. For licensing opportunities of our original content, please contact licensing@dailycallernewsfoundation.org.
LET US UNLEASH ONE OF THEIR OWN LAWS BACK ON THEM...IT IS CALLED THE CLEAN AIR ACT......LETS TELL THE LAZY BASTARDS TO CLEAN UP ALL THE CHEMTRAIL AIR AND THE MESS THAT THEY LET HAPPEN....
Privacy World's November 2013 Newsletter Issue 5Nov
Subject: Privacy World's November 2013 Newsletter Issue
5Nov
> Privacy World - The WORLD'S SHREWDEST PRIVACY
NEWSLETTER
>
> N.S.A. Gathers Data on Social Connections of U.S.
Citizens
>
> WASHINGTON --- Since 2010, the National Security
Agency
> been exploiting its huge collections of data to
create sophisticated
> graphs of some Americans' social connections that
can identify their
> associates, their locations at certain times, their
traveling
> companions and other personal information, according
to newly
> disclosed documents and interviews with officials.
>
> The spy agency began allowing the analysis of phone
call and e-mail
> logs in November 2010 to examine Americans' networks
of associations
> for foreign intelligence purposes after N.S.A.
officials lifted
> restrictions on the practice, according to documents
provided by
> Edward J. Snowden, the former N.S.A. contractor.
>
> The policy shift was intended to help the agency
"discover and track"
> connections between intelligence targets overseas
and people in the
> United States, according to an N.S.A. memorandum
from January 2011.
> The agency was authorized to conduct
"large-scale graph analysis on
> very large sets of communications metadata without
having to check
> foreignness" of every e-mail address, phone
number or other
> identifier, the document said. Because of concerns
about infringing on
> the privacy of American citizens, the computer
analysis of such data
> had previously been permitted only for foreigners.
>
> The agency can augment the communications data with
material from
> public, commercial and other sources, including bank
codes, insurance
> information, Facebook profiles, passenger manifests,
voter
> registration rolls and GPS location information, as
well as property
> records and unspecified tax data, according to the
documents. They do
> not indicate any restrictions on the use of such
"enrichment" data,
> and several former senior Obama administration
officials said the
> agency drew on it for both Americans and foreigners.
>
> N.S.A. officials declined to say how many Americans
have been caught
> up in the effort, including people involved in no
wrongdoing. The
> documents do not describe what has resulted from the
scrutiny, which
> links phone numbers and e-mails in a "contact
chain" tied directly or
> indirectly to a person or organization overseas that
is of foreign
> intelligence interest.
>
> The new disclosures add to the growing body of
knowledge in recent
> months about the N.S.A.'s access to and use of
private information
> concerning Americans, prompting lawmakers in
Washington to call for
> reining in the agency and President Obama to order
an examination of
> its surveillance policies. Almost everything about
the agency's
> operations is hidden, and the decision to revise the
limits concerning
> Americans was made in secret, without review by the
nation's
> intelligence court or any public debate. As far back
as 2006, a
> Justice Department memo warned of the potential for
the "misuse" of
> such information without adequate safeguards.
>
> An agency spokeswoman, asked about the analyses of
Americans' data,
> said, "All data queries must include a foreign
intelligence
> justification, period."
>
> "All of N.S.A.'s work has a foreign
intelligence purpose," the
> spokeswoman added. "Our activities are centered
on counterterrorism,
> counterproliferation and cybersecurity."
>
> The legal underpinning of the policy change, she
said, was a 1979
> Supreme Court ruling that Americans could have no
expectation of
> privacy about what numbers they had called. Based on
that ruling, the
> Justice Department and the Pentagon decided that it
was permissible to
> create contact chains using Americans'
"metadata," which includes the
> timing, location and other details of calls and
e-mails, but not their
> content. The agency is not required to seek warrants
for the analyses
> from the Foreign Intelligence Surveillance Court.
>
> N.S.A. officials declined to identify which phone
and e-mail databases
> are used to create the social network diagrams, and
the documents
> provided by Mr. Snowden do not specify them. The
agency did say that
> the large database of Americans' domestic phone call
records, which
> was revealed by Mr. Snowden in June and caused
bipartisan alarm in
> Washington, was excluded. (N.S.A. officials have
previously
> acknowledged that the agency has done limited
analysis in that
> database, collected under provisions of thePatriot
Act
>
<http://topics.nytimes.com/top/reference/timestopics/subjects/u/usa_patriot_act/index.html?inline=nyt-classifier,
> exclusively for people who might be linked to
terrorism suspects.)
>
> But the agency has multiple collection programs and
databases, the
> former officials said, adding that the social
networking analyses
> relied on both domestic and international metadata.
They spoke only on
> the condition of anonymity because the information
was classified.
>
> The concerns in the United States since Mr.
Snowden's revelations have
> largely focused on the scope of the agency's
collection of the private
> data of Americans and the potential for abuse. But
the new documents
> provide a rare window into what the N.S.A. actually
does with the
> information it gathers.
>
> A series of agency PowerPoint presentations and
memos describe how the
> N.S.A. has been able to develop software and other
tools --- one
> document cited a new generation of programs that
"revolutionize" data
> collection and analysis --- to unlock as many
secrets about
> individuals as possible.
>
> The spy agency, led by Gen. Keith B. Alexander, an
unabashed advocate
> for more weapons in the hunt for information about
the nation's
> adversaries, clearly views its collections of
metadata as one of its
> most powerful resources. N.S.A. analysts can exploit
that information
> to develop a portrait of an individual, one that is
perhaps more
> complete and predictive of behavior than could be
obtained by
> listening to phone conversations or reading e-mails,
experts say.
>
> Phone and e-mail logs, for example, allow analysts
to identify
> people's friends and associates, detect where they
were at a certain
> time, acquire clues to religious or political
affiliations, and pick
> up sensitive information like regular calls to a
psychiatrist's
> office, late-night messages to an extramarital
partner or exchanges
> with a fellow plotter.
>
> "Metadata can be very revealing," said
Orin S. Kerr, a law professor
> at George Washington University. "Knowing
things like the number
> someone just dialed or the location of the person's
cellphone is going
> to allow them to assemble a picture of what someone
is up to. It's the
> digital equivalent of tailing a suspect."
>
> The N.S.A. had been pushing for more than a decade
to obtain the rule
> change allowing the analysis of Americans' phone and
e-mail data.
> Intelligence officials had been frustrated that they
had to stop when
> a contact chain hit a telephone number or e-mail
address believed to
> be used by an American, even though it might yield
valuable
> intelligence primarily concerning a foreigner who
was overseas,
> according to documents previously disclosed by Mr.
Snowden. N.S.A.
> officials also wanted to employ the agency's
advanced computer
> analysis tools to sift through its huge databases
with much greater
> efficiency.
>
> The agency had asked for the new power as early as
1999, the documents
> show, but had been initially rebuffed because it was
not permitted
> under rules of the Foreign Intelligence Surveillance
Court that were
> intended to protect the privacy of Americans.
>
> A 2009 draft of an N.S.A. inspector general's report
suggests that
> contact chaining and analysis may have been done on
Americans'
> communications data under the Bush administration's
program of
> wiretapping without warrants, which began after the
Sept. 11 attacks
> to detect terrorist activities and skirted the
existing laws governing
> electronic surveillance.
>
> In 2006, months after the wiretapping program was
disclosed by The New
> York Times
>
<http://www.nytimes.com/2005/12/16/politics/16program.html?pagewanted=all,
> the N.S.A.'s acting general counsel wrote a letter
to a senior Justice
> Department official, which was also leaked by Mr.
Snowden, formally
> asking for permission to perform the analysis on
American phone and
> e-mail data. A Justice Department memo to the
attorney general noted
> that the "misuse" of such information
"could raise serious concerns,"
> and said the N.S.A. promised to impose safeguards,
including regular
> audits, on the metadata program. In 2008, the Bush
administration gave
> its approval.
>
> A new policy that year, detailed in "Defense
Supplemental Procedures
> Governing Communications Metadata Analysis,"
authorized by Defense
> Secretary Robert M. Gates and Attorney General
Michael B. Mukasey,
> said that since the Supreme Court had ruled that
metadata was not
> constitutionally protected, N.S.A. analysts could
use such information
> "without regard to the nationality or location
of the communicants,"
> according to an internal N.S.A. description of the
policy.
>
> After that decision, which was previously reported
by The Guardian,
> the N.S.A. performed the social network graphing in
a pilot project
> for 1 ½ years "to great benefit,"
according to the 2011 memo. It was
> put in place in November 2010 in "Sigint
Management Directive 424"
> (sigint refers to signals intelligence).
>
> In the 2011 memo explaining the shift, N.S.A. analysts
were told that
> they could trace the contacts of Americans as long
as they cited a
> foreign intelligence justification. That could
include anything from
> ties to terrorism, weapons proliferation or
international drug
> smuggling to spying on conversations of foreign
politicians, business
> figures or activists.
>
> Analysts were warned to follow existing
"minimization rules," which
> prohibit the N.S.A. from sharing with other agencies
names and other
> details of Americans whose communications are
collected, unless they
> are necessary to understand foreign intelligence
reports or there is
> evidence of a crime. The agency is required to
obtain a warrant from
> the intelligence court to target a "U.S. person"
--- a citizen or
> legal resident --- for actual eavesdropping.
>
> The N.S.A. documents show that one of the main tools
used for chaining
> phone numbers and e-mail addresses has the code name
Mainway. It is a
> repository into which vast amounts of data flow
daily from the
> agency's fiber-optic cables, corporate partners and
foreign computer
> networks that have been hacked.
>
> The documents show that significant amounts of
information from the
> United States go into Mainway. An internal N.S.A.
bulletin, for
> example, noted that in 2011 Mainway was taking in
700 million phone
> records per day. In August 2011, it began receiving
an additional 1.1
> billion cellphone records daily from an unnamed
American service
> provider under Section 702 of the 2008 FISA
Amendments Act, which
> allows for the collection of the data of Americans
if at least one end
> of the communication is believed to be foreign.
>
> The overall volume of metadata collected by the
N.S.A. is reflected in
> the agency's secret 2013 budget request to Congress.
The budget
> document, disclosed by Mr. Snowden, shows that the
agency is pouring
> money and manpower into creating a metadata
repository capable of
> taking in 20 billion "record events" daily
and making them available
> to N.S.A. analysts within 60 minutes.
>
> The spending includes support for the
"Enterprise Knowledge System,"
> which has a $394 million multiyear budget and is
designed to "rapidly
> discover and correlate complex relationships and
patterns across
> diverse data sources on a massive scale,"
according to a 2008
> document. The data is automatically computed to
speed queries and
> discover new targets for surveillance.
>
> A top-secret document titled "Better Person
Centric Analysis"
> describes how the agency looks for 94 "entity
types," including phone
> numbers, e-mail addresses and IP addresses. In
addition, the N.S.A.
> correlates 164 "relationship types" to
build social networks and what
> the agency calls "community of interest"
profiles, using queries like
> "travelsWith, hasFather, sentForumMessage,
employs."
>
> A 2009 PowerPoint presentation provided more
examples of data sources
> available in the "enrichment" process,
including location-based
> services like GPS and TomTom, online social networks,
billing records
> and bank codes for transactions in the United States
and overseas.
>
> At a Senate Intelligence Committee hearing on
Thursday, General
> Alexander was asked if the agency ever collected or
planned to collect
> bulk records about Americans' locations based on
cellphone tower data.
> He replied that it was not doing so as part of the
call log program
> authorized by the Patriot Act, but said a fuller
response would be
> classified.
>
> If the N.S.A. does not immediately use the phone and
e-mail logging
> data of an American, it can be stored for later use,
at least under
> certain circumstances, according to several
documents.
>
> One 2011 memo, for example, said that after a court
ruling narrowed
> the scope of the agency's collection, the data in
question was "being
> buffered for possible ingest" later. A year
earlier, an internal
> briefing paper from the N.S.A. Office of Legal
Counsel showed that the
> agency was allowed to collect and retain raw
traffic, which includes
> both metadata and content, about "U.S.
persons" for up to five years
> online and for an additional 10 years offline for
"historical searches."
>
> The above article by James Risen
>
> Until next issue, stay cool and remain low profile!
>
> Privacy World
>
> A Note from your publisher: Sick and tired of your
government
> tricking you? Then "Get Your Money Out of Your
Country Before
> Your Country gets Your Money Out of You!" For
less than the
> cost of a couple of soda's per day, you can obtain a
totally
> anonymous bank account with an ATM card. Just e-mail
for details
> and place "Anonymous" bank account in the
> subject heading!
>
>
-----------------------------------------------------------------------------
> To subscribe,
send a blank message to PrivacyWorld-on@mail-list.com
> To unsubscribe, send a blank message to PrivacyWorld-off@mail-list.com
> To change your email address, send a message to
> with your
old address in the Subject: line
> To contact the list owner, send your message to
>
> Privacy World, 502 Hotta-kata, 3-6-10 Hirusaido,
Kagurazaka, Shinjyuku-ku,
> Tokyo Japan
>
Sample CE Checklist
Sample
CE Checklist Posted by Beach at Get Chat Friday PM
11/29/2013
GET YOUR STUFF TOGETHER! Bring to CE
Appointment
[ ] Driver’s License
[ ] Power of attorney paperwork (if you have one for someone)
[ ] Second form of ID (a credit card or passport)
[ ] The currency!
[ ] Proof of reserves (in case you can lock the rate and come back with them later)
[ ] Know how much money you need immediately from this appointment (for reserves, pay bills, etc.)
[ ] A pad and a pen to take notes
[ ] All your invoices, any gift letters (to you) BUT DO NOT PRODUCE UNLESS ASKED. More than likely, these documents will only come into play for tax time.
....
Read More Link on Right
[ ] Driver’s License
[ ] Power of attorney paperwork (if you have one for someone)
[ ] Second form of ID (a credit card or passport)
[ ] The currency!
[ ] Proof of reserves (in case you can lock the rate and come back with them later)
[ ] Know how much money you need immediately from this appointment (for reserves, pay bills, etc.)
[ ] A pad and a pen to take notes
[ ] All your invoices, any gift letters (to you) BUT DO NOT PRODUCE UNLESS ASKED. More than likely, these documents will only come into play for tax time.
....
Read More Link on Right
At the EXCHANGE APPOINTMENT USE THIS
CHECKLIST
1.ARRIVE EARLY! Make sure you know where you are going. Do not loiter. If you are too early, stay SECURELY in the general area.
2.Be discrete, be professional, be alert and aware of your surroundings. BREATHE! Seriously consider hiring security to accompany you to your appointment or bring a trusted friend.
3.Collect business cards from everyone or take their name and phone numbers as well as the location of their regular branch office.
4.THE FIRST THING you will likely do is sign the NDA!
5. The second thing will be to learn the rates and make sure bank will not be charging a spread (reduction of the rate to you because bank takes a ‘fee’ for facilitating the transaction)
6.If you exchange multiple currencies, open separate accounts for each. DO NOT PUT FUNDS IN ANY EXISTING ACCOUNTS you may have with the bank. DO NOT CO-MINGLE FUNDS. This is a critical tax issue. Write down your account numbers here;
] IQN Routing number ______________________________________________
[ ] Check here you have it!
[ ] IQN Account number______________________________________________
[ ] Deposit slip .
[ ] VNN Routing number ______________________________________________
[ ] VNN Account number______________________________________________
[ ] Deposit slip
[ ] IDN Routing number_______________________________________________
[ ] IDN Account number_______________________________________________
[ ] Deposit slip
[ ] Other Routing number____________________________________________
[ ] Other Account number_____________________________________________
[ ] Deposit slip
[ ] Ask for Deposit Slips
[ ] Ask for all accounts to be NON – testing, Non – training and NOT available online (off internet)
[ ] Get a copy of your signed NDA (Non Disclosure Agreement)
[ ] Ask for a cashier’s check(s) for $_______________________ if you need immediate funds to deposit in some other current bank account to pay bills, etc. until you get your second appointment with your private banker
http://www.dinarrecaps.com/1/post/2013/11/sample-ce-checklist-posted-by-beach-at-get-chat-friday-pm.html
1.ARRIVE EARLY! Make sure you know where you are going. Do not loiter. If you are too early, stay SECURELY in the general area.
2.Be discrete, be professional, be alert and aware of your surroundings. BREATHE! Seriously consider hiring security to accompany you to your appointment or bring a trusted friend.
3.Collect business cards from everyone or take their name and phone numbers as well as the location of their regular branch office.
4.THE FIRST THING you will likely do is sign the NDA!
5. The second thing will be to learn the rates and make sure bank will not be charging a spread (reduction of the rate to you because bank takes a ‘fee’ for facilitating the transaction)
6.If you exchange multiple currencies, open separate accounts for each. DO NOT PUT FUNDS IN ANY EXISTING ACCOUNTS you may have with the bank. DO NOT CO-MINGLE FUNDS. This is a critical tax issue. Write down your account numbers here;
] IQN Routing number ______________________________________________
[ ] Check here you have it!
[ ] IQN Account number______________________________________________
[ ] Deposit slip .
[ ] VNN Routing number ______________________________________________
[ ] VNN Account number______________________________________________
[ ] Deposit slip
[ ] IDN Routing number_______________________________________________
[ ] IDN Account number_______________________________________________
[ ] Deposit slip
[ ] Other Routing number____________________________________________
[ ] Other Account number_____________________________________________
[ ] Deposit slip
[ ] Ask for Deposit Slips
[ ] Ask for all accounts to be NON – testing, Non – training and NOT available online (off internet)
[ ] Get a copy of your signed NDA (Non Disclosure Agreement)
[ ] Ask for a cashier’s check(s) for $_______________________ if you need immediate funds to deposit in some other current bank account to pay bills, etc. until you get your second appointment with your private banker
http://www.dinarrecaps.com/1/post/2013/11/sample-ce-checklist-posted-by-beach-at-get-chat-friday-pm.html
Subscribe to:
Posts (Atom)