Saturday, October 27, 2007

Governor Christine Gregoire





http://www.governor.wa.gov/contact/form.asp

Thank you for contacting Governor Christine Gregoire. The Governor values your views and opinions. We want to assure you that the Governor's Office reads these messages and, when appropriate, refers them to relevant agencies, staff, or the Governor herself. Because of the volume of e-mail we receive daily, however, we are unable to respond to every message. Thank you again for contacting the Governor.










October 27, 2007

To: Governor Gregoire

From: Kerry W. Burgess (official United States federal undercover identity, an identity completely compromised by forces hostile to the United States of America)



Governor,

I have communicated most of these same details and more to the Office of the Inspector General, Department of Justice, and I wanted to also inform you of my observations.

I currently maintain an official United States federal undercover identity and I began that assignment on 12/7/1998 to investigate Microsoft Corporation sponsored terrorism. My deployment start date is recorded as 3/15/1998 and 3/16/1998 and I have been 100% deployed since then without even being able to visit with my family. I have not yet been granted permission to resume my true identity. And there is predictability to the terrorists attacks I have survived to this point.








----- Original Message ----
From: Kerry Burgess
To: inspector.general@usdoj.gov
Cc: hotline@dodig.mil; NAVIGHotlines@navy.mil
Sent: Saturday, October 27, 2007 12:32:36 AM
Subject: Breach (2007)

To: Office of the Inspector General, Department of Justice

From: Kerry W. Burgess (official United States federal undercover identity, an identity completely compromised by forces hostile to the United States of America)



The details and observations I note here are relevant to my official United States federal assignment, which includes describing my observations to you.




http://en.wikipedia.org/wiki/Ignorantia_juris_non_excusat

Ignorantia juris non excusat or Ignorantia legis neminem excusat (Latin for "ignorance of the law does not excuse" or "ignorance of the law excuses no one") is a public policy holding that a person who is unaware of a law may not escape liability for violating that law merely because he or she was unaware of its content; that is, persons have presumed knowledge of the law.

The rationale behind the doctrine is that if ignorance were an excuse, persons charged with criminal offenses or the subject of civil lawsuits would merely claim they were unaware of the law in question to avoid liability, whether criminal or civil. Thus, the law imputes knowledge of all laws to all persons within the jurisdiction no matter how transiently. Even though it would be impossible, even for someone with substantial legal training, to be aware of every law in operation in every aspect of a state's activities, this is the price paid to ensure that willful blindness cannot become the basis of exculpation. Thus, it is well settled that persons engaged in any undertakings outside what is common for a normal person, such as running a nuclear power plant, will make themselves aware of the laws necessary to engage in that undertaking. If they do not, they cannot complain if they incur liability.





http://en.wikipedia.org/wiki/Mens_Rea

The mens rea is the Latin term for "guilty mind" used in the criminal law. The standard common law test of criminal liability is usually expressed in the Latin phrase, actus non facit reum nisi mens sit rea, which means that "the act does not make a person guilty unless the mind is also guilty". Thus, in jurisdictions with due process, there must be an actus reus accompanied by some level of mens rea to constitute the crime with which the defendant is charged (see the technical requirement of concurrence). The exception is strict liability crimes (in the civil law, it is not usually necessary to prove a subjective mental element to establish liability, say for breach of contract or a tort, although if intentionally committed, this may increase the measure of damages payable to compensate the plaintiff).

Quite simply, therefore, mens rea refers to the mental element of the offence that accompanies the actus reus. In some jurisdictions, the terms mens rea and actus reus have been superseded by alternative terminology. In Australia, for example, the elements of all Federal offences are now designated as "Fault Elements" (mens rea) and "Physical Elements" (actus reus). This terminology was adopted in order to replace the obscurity of the Latin terms with simple and accurate phrasing.1

There are four general classes of mens rea (the words used may vary from one state to another and from one definition to another) but the substance is:

Intention; (purpose)

Knowledge;

Recklessness sometimes termed willful blindness which may have a different interpretation in the United States; or

Negligence.








From 9/11/2001 to 5/10/2002 (Hanssen sentenced) is: 3 days, 34 weeks

'33-34'

http://en.wikipedia.org/wiki/2002

May 10 - FBI agent Robert Hanssen is sentenced to life without the possibility of parole for selling American secrets






http://en.wikipedia.org/wiki/Robert_Hanssen

Robert Philip Hanssen (born April 18, 1944) is an American former FBI agent who engaged in spying for the Soviet Union and Russia against the United States for a period of at least 15 years.

Hanssen was arrested on February 18, 2001, at Foxstone Park near his home in Vienna, Virginia, charged with selling American secrets to Moscow for $1.4 million in cash and diamonds over a 15-year period. On July 6, 2001, he pled guilty to 15 counts of espionage.[1][2] He was subsequently sentenced to life in prison. His activities have been described as "possibly the worst intelligence disaster in US history".[3]

Hanssen's espionage became the subject of two movies: Master Spy: The Robert Hanssen Story, a made-for-television movie, in which Hanssen was portrayed by William Hurt, aired in 2002; and Breach, released February 16, 2007, in which Chris Cooper plays the role of Hanssen.









From 3/15/1998 (Deployed) to 1/12/2001 ("Antitrust") is 33 months, 4 weeks

'33-34'

http://www.imdb.com/title/tt0218817/

Antitrust (2001)

Release Date: 12 January 2001 (USA)

Plot Outline: A computer programmer's dream job at a hot Portland-based firm turns nightmarish when he discovers his boss has a secret and ruthless means of dispatching anti-trust problems.

Ryan Phillippe ... Milo Hoffman










"sleeping tiger"




http://www.imdb.com/title/tt0401997/

Breach (2007)

Release Date: 16 February 2007 (USA)

Tagline: Inspired by the true story of the greatest security breach in U.S. history

Plot Outline: Based on the true story, FBI upstart Eric O'Neill enters into a power game with his boss, Robert Hanssen, an agent who was ultimately convicted of selling secrets to the Soviet Union.









From 11/25/1986 to 8/31/2007 ("Breach") is: 7584 days
7584 = 3792 + 3792
From 3/3/1959 to 7/20/1969 (Apollo 11 lunar landing) is: 3792 days

http://www.imdb.com/title/tt0401997/releaseinfo

Release dates for
Breach (2007)

UK 31 August 2007








From 2/5/1964 (Laura Linney) to 11/15/1966 (Gemini 12 splashdown) is: 6 days, 144 weeks

'6144'

From 3/3/1959 to 7/16/1963 is 6 days, 1 week, 4 months, 4 years

'6144'


http://www.imdb.com/name/nm0001473/

Laura Linney
Date of Birth: 5 February 1964
Breach (2007) .... Kate Burroughs










From 5/1/1967 to 9/10/1974 (Ryan Phillippe) is: 2689 days

2689 = 1 + 1344 + 1344

'1344'

From 3/3/1959 to 7/16/1963 is 13 days, 4 months, 4 years

'1344'

http://www.imdb.com/name/nm0000202/

Ryan Phillippe
Date of Birth: 10 September 1974

Breach (2007) .... Eric O'Neill
Antitrust (2001) .... Milo Hoffman








From 5/15/1978 (Caroline Dhavernas) to 4/14/1988 is: 3622 days

From 4/14/1988 to 3/15/1998 (Deployed) is: 3622 days

http://www.imdb.com/name/nm0223518/

Caroline Dhavernas
Date of Birth: 15 May 1978
Breach (2007) .... Juliana O'Neill







From 6/2/1954 (Dennis Haysbert) to 7/16/1969 (Apollo 11 launches for Moon) is 44 days, 15 years

'4415'

From 3/4/1959 to 7/16/1963 is 4 years, 4 months, 1 week, 5 days

'4415'

http://www.imdb.com/name/nm0371660/

Dennis Haysbert
Date of Birth: 2 June 1954

"Magnum, P.I." .... Lieutenant Jameson, USN (1 episode, 1985)
Navy Seals (1990) .... Chief Billy Graham
Breach (2007) .... Dan Plesac









http://www.presidency.ucsb.edu/ws/index.php?pid=34325&st=&st1=

Proclamation 5662—National Day of Mourning for the Victims of United States Ship Stark

May 23rd, 1987

Every year, in the beautiful springtime, the American people pause on a special day to pay the heartfelt tribute of love and remembrance to all the sons and daughters of our land who have laid down their lives on the altar of liberty. This year, our Memorial Day remembrance is tinged with fresh sorrow as we honor and mourn the brave men taken from us a short week ago.





From 9/26/1927 (Patrick O'Neal) to 5/18/1987 is 59 years, 33 weeks, 3 days

'59-33'

http://www.imdb.com/name/nm0641929/

Patrick O'Neal
Date of Birth: 26 September 1927
Under Siege (1992) .... Capt. Adams







From 4/10/1951 (Steven Seagal) to 5/13/1987 is 3 days, 433 months

'34-33'

http://www.imdb.com/name/nm0000219/

Steven Seagal
Date of Birth: 10 April 1951
Under Siege (1992) .... Casey Ryback






From 3/4/1959 to 10/8/1992 (Thursday) is 33 years, 218 days
218 / 365 = 0.59 year
From 3/4/1959 to 10/8/1992 (Thursday) is 33.59 years

'33-59'

From 10/8/1992 (Thursday) to 10/9/1992 ("Under Siege")(Friday) is: 1 day

http://www.imdb.com/title/tt0105690/

Under Siege (1992)

Release Date: 9 October 1992 (USA)

Plot Outline: A former SEAL, now cook, is the only person who can stop a gang of terrorists when they sieze control of a US Navy battleship.

Steven Seagal ... Casey Ryback









https://www.cia.gov/

Cracking the Code

How do you keep a secret? One way is esczfrs ncjaezrclasj.* If you understood that, you already may know a little about cryptography. For more than 3,000 years, people have encrypted messages to keep their communications secret. Today's encryption is much more sophisticated than the simple encryption from our past. And whether you know it or not, we deal with encryptions every day – every time we use our ATM card or type in our computer password.