Cybernetic Telecommunications Piracy, The Boeing
Company, & the Missing Malaysia Airlines Flight MH370 Stephen M. St. John Metatron, United States of America, stephen@show-the-house.com ________________________________________ Abstract This document identifies two kinds of cybernetic telecommunications
piracy; namely, telephonic impersonation by real-time digital voice morphing and hijacking or sabotage by remote control piloting
of aerial vehicles. A list of past incidents wherein cybernetic telecommunications piracy offers the best explanation
of what actually happened follows. Then a brief survey of the Realpolitik behind the use of cybernetic telecommunications
piracy shows a close correspondence to the Zionist-Neoconservative agenda to dominate the world through the military strength
of the USA. This leads to the conclusion, which is an action plan to confront what is a clear and present danger to
global security and peace.
Keywords cybernetic telecommunications piracy, remote control piloting, real-time digital voice
morphing, system planning corporation, defense advanced research projects agency, the boeing company, brigadier general robert
e. chapman, usaf ec-135n, twa flight 800, kristina borjesson, egyptair flight 990, united airlines flight 175, American airlines
flight 77, united airlines flight 93, edward felt, pilots for 911 truth, donn de grand pré, us attorney general eric
h. holder, open letters on 911 to the attorney general of the united states eric h. holder, a. kee dewdney, zionism, neoconservatism,
talmudic law of the moser, ________________________________________ 1. Introduction
I write out of deep concern
for and sympathy with the people and government of Malaysia among others who must endure with great anxiety the mysterious
loss of Malaysia Airlines Flight MH370 on 8 March 2014. I am also compelled to confront a combination of dishonesty,
ignorance, stupidity and cowardice within certain agencies of my government of the United States of America and the controlled
news media; their collective failure to mention - let alone discuss - cybernetic telecommunications piracy as a possible explanation
for the disappearance of this Boeing 777 jet is but part of a longstanding pattern to cover-up certain matters and perpetrate
fraud. Two kinds of cybernetic telecommunications piracy are described; namely, sabotage and hijacking by remote control
piloting of jets and telephonic impersonation by real-time digital voice-morphing. Past instances of suspected cybernetic
telecommunications piracy are listed and briefly explored as modern, high tech means to fabricate provocations as pretexts
for state actions in support of geopolitical strategies. Steering a Boeing jet and co-opting its communications system
can be done by remote control, which does not require the hijacker’s physical presence inside the targeted aircraft.
Cybernetic telecommunications piracy is inherently deniable and unattributable; therefore, a kind of retrograde analysis must
be made whereby logic points to what must have happened after what could not possibly have happened is eliminated from consideration.
As the secrecy surrounding cybernetic telecommunications piracy recedes and the level of awareness of governments and the
general public increases, the need to take countermeasures against this hidden danger becomes more and more apparent.
These are matters concerning business ethics, public relations, public choice and public responsibility and ethics.
I will be most gratified if this paper spearheads a global movement to effect necessary change.
2. Two Kinds
of Electronic Piracy
There are at least two kinds of cybernetic telecommunications piracy: telephonic impersonation by real-time
digital voice-morphing and sabotage or hijacking by remote-control piloting. Both are discussed below.
2.1.
Deception by Real-time Digital Voice-Morphing Real-time digital voice-morphing is a brilliant technology that makes possible
a very highly accurate duplication of any human being’s voice. [1] By recording the subject person’s voice, his or her digital voice characteristics can then be loaded into a software
device that, when connected to a telephone or radio, will enable another person to speak into the telephone or radio and sound
exactly like the subject person. In practical terms, the only vulnerability of this stealth technology is the limited
knowledge of the impersonator, whose interlocutor will become suspicious if any lack of knowledge normally expected from the
target person becomes apparent. As an imaginary but technically possible example of real-time digital voice-morphing,
the famous Lebanese female singer Farouz could, with adequate preparation, pick up the telephone and sound exactly like Syrian
President Bashar al Assad. In this way she could fool all of her interlocutors some of the time, and even some of them
all of the time, but sooner or later her impersonation would be discovered. Generally, the shorter the conversation,
the less likely discovery of the impersonation will be. Whatever the case, it is difficult to imagine any legitimate
use for this technology, which is a tool for police to entrap people and for war criminals and intelligence agencies to deceive
people in pursuit of their goals. Clearly, real-time digital voice-morphing is the new peril of the 21st Century.
2.2. Sabotage and Hijacking by Remote-Control Piloting Remote-control piloting in 2014 is so commonplace that
one finds many examples of this technology in toy and sporting goods stores worldwide. But the origins of remote-control
piloting are not as obvious as they lie hidden in the research and development conducted in the national security interests
of the USA and other states. The Defence Advanced Research Projects Agency (DARPA) [2] and System Planning Corporation (SPC) [3] are two organizations known to have designed and produced and distributed this technology for military or commercial use.
Anecdotal information and rumour suggest that remote-control piloting quietly ended the spate of airliner hijackings of the
1960’s and 1970’s by giving authorities on the ground the ability to hijack the hijackers. This explanation,
however, begs the question, why wasn’t this technology used to thwart the alleged hijackers of 9/11? The answer
may very well be that such legitimate use of remote-control piloting gradually became susceptible to cybernetic telecommunications
piracy whereby unauthorized use of the remote-control technology could be achieved by criminals or intelligence agencies acting
in support of a state’s military, economic and political objectives. Such unauthorized use of this technology
is another weapon for war criminals. Sabotage and hijacking by unauthorized use of remote-control piloting are clear
and present dangers to global security and peace.
3. Examples of Electronic Piracy Here follow some
examples of cybernetic telecommunications piracy where remote-control piloting technology and/or real-time digital voice-morphing
were very likely employed by as yet unknown agents acting in support of a state’s military, economic and political objectives.
3.1. US Air Force EC-135N, 6 May 1981 A USAF EC-135N jet (a modified Boeing 707) entered into a mysterious, unexplained
and catastrophic nosedive near Frederick Maryland on 6 May 1981. An anomalous transponder beacon return signal immediately
before the jet’s plunge to earth began suggests electromagnetic interference in the flight control system. An
unexplained explosion inside the fuselage at a point when recovery from the nosedive was no longer possible suggests sabotage
with no room for error. Brigadier General Robert E. Chapman’s USAF Aircraft Accident Investigation Report [4] failed to refer the matter for criminal investigation. The national security interests of the Zionist state indicate
motive, means and opportunity to sabotage this flight by remote control piloting as a strong measure of opposition to the
Reagan Administration’s proposed sale of armaments to Saudi Ara-bia; when the sale was finally approved, the USA, in
an apparent quid pro quo, stopped calling Zionist settlements in the occupied territories “illegal” and
instead began using the ambiguous and Zionist-appeasing term “obstacles to peace.”
3.2. TWA Flight
800, 17 July 1996 TWA Flight 800, a Boeing 747 jet, plunged into the Atlantic Ocean south of Moriches Inlet on Long Island
after a short series of explosions on 17 July 1996. Hundreds of competent eyewitness testimonies, as well as photographic
evidence, indicated a missile attack as the true cause of the initial explosions. [5] But the National Transportation Safety Board and the Federal Bureau of Investigation relied instead on a ridiculous video
from the Central Intelligence Agency to distort the truth with an aerodynamically impossible flight path describing the demise
of the aircraft. Kristina Bor-jesson very effectively exposed the criminality of the CIA, FBI and NTSB in her excellent
documentary film “TWA Flight 800.” [6] The shoot-down of TWA Flight 800 happened during military exercises in the immediate vicinity of the crash site, and the
NTSB’s far-fetched conclusion of an accidental explosion inside the jet led many to believe the deception was concocted
to cover up an accident involving a missile fired during military exercises. But the possibility of deliberate cybernetic
hijacking of a remote-controlled missile during military exercises was never articulated by the government agencies involved
in the investigation or by the news media. The motive, means and opportunity to perpetrate such a crime are reflected
in the Zionist-Neoconservative ideology of dominating the world through the military might of the USA. A clandestine
false flag attack on a commercial jet, which would have been attributed to radical Islamic groups as a pretext for starting
a war against them, presents a logical scenario for what must have happened. However, a chance photo of a missile which
was taken minutes before the explosions occurred [7] very likely compromised the conspirators’ intended explanation of what supposedly happened and ruined their plot.
3.3. EgyptAir Flight 990, 31 October 1999 EgyptAir Flight 990, a Boeing 767 jet, entered into a mysterious, unexplained
and catastrophic nosedive into the Atlantic Ocean south of Nantucket Island on 31 October 1999. The National Transportation
Safety Board presented a ridiculous graphic, purportedly produced by the US Air Force, to demonstrate an aerodynamically impossible
roller coaster flight path that led to the demise of the aircraft. Additionally, a playback from the cockpit voice recorder
was used to suggest co-pilot suicide and mass homicide; however, lessons later learned from 9/11 gave a much more plausible
explanation of impersonation of pilot and co-pilot by real-time digital voice morphing. As with the case of the EC-135N,
the national security interests of the Zionist state indicate motive, means and opportunity to sabotage this flight by remote
control piloting. Many high ranking Egyptian military officers were killed in the crash of EgyptAir Flight 990.
They were returning home from the USA where they had been taking part in armaments training programs that David Bar Ilan,
the Director of Communications for Zionist Prime Minister Benjamin Netanyahu, had called “a dire threat to the State
of Israel.” [8]
3.4. Alaska Airlines Flight 261, 31 January 2000 Alaska Airlines Flight 261, a McDonnell Douglas MD-83 jet,
entered into a mysterious, unexplained and catastrophic nosedive into the Pacific Ocean off Point Mugu, California on 31 January
2000. The NTSB concluded that the cause of this crash was due to a runaway pitch trim resulting from improper maintenance
of the pitch trim jackscrew. The Boeing Company, having merged with McDonnell Douglas in 1997, assumed liability.
This crash occurred precisely when this author conducted a fax broadcast to the international community from New York City
concerning the motive, means and opportunity of the Zionist state in the mysterious demises of the USAF EC-135N on 6 May 1981
and EgyptAir Flight 990 on 31 October 1999, as mentioned above. [8] Up until the Alaska Airlines Flight 261 crash, there had been only two mysterious and unexplained nosedives of heavy jets
on record, and both had been described by this author as acts of sabotage in the national security interests of the Zionist
state. This extraordinary charge made by fax broadcast coincided with yet another extremely rare instance of a mysterious
nosedive of a heavy jet – albeit one that apparently was not in the national security interests of the Zionist state,
unless one considers the 2 of 3 linkage (66%) better for Zionist public relations than the 2 of 2 linkage (100%).
3.5. United Airlines Flight 175, 11 September 2001 On 11 September 2001, a Boeing 767 jet, alleged to have been United
Airlines Flight 175, crashed into the south Twin Tower, World Trade Center 2. The unerring high-speed descending arc
of flight into the target was deemed by experts such as Donn de Grand Pré [9] and, later, Pilots for 9/11 Truth, [10] to be beyond the capabilities of seasoned pilots, let alone flight students on their maiden voyage. Remote-control
piloting gives the only rational explanation for what happened. Additionally, this author, as a material witness in
a new and real investigation of 9/11, can attest that the aerial vehicle that hit the south Twin Tower, World Trade Center
2, appeared to have been homing in on the New York Regional Office of the United States Air Force on the 37th Floor of 26
Federal Plaza at Broadway and Duane Street in Manhattan, just four-tenths of a mile from Ground Zero, which is where he stood
and beheld the immediate aftermath of that crash. This circumstance was described in Open Letter # 3 on 9/11 to the
Attorney General of the United States Eric H. Holder, dated 19 February 2009. [11] This remote-controlled flight appears to have been one component of a false flag intelligence operation designed to create
a pretext for putting American muscle on Mesopotamian patrol according to the Zionist-Neoconservative goal of world domination
by full spectrum fraud and force.
3.6. American Airlines Flight 77, 11 September 2001 Also on 11 September
2001, a Boeing 757 jet alleged to have been American Airlines Flight 77 allegedly crashed into the Pentagon. As with
the case of United Airlines Flight 175 hitting the south Twin Tower of the World Trade Center, this aerial vehicle’s
unerring high-speed descending arc of flight toward the Pentagon was deemed by experts such as Donn de Grand Pré [9] and Pilots for 9/11 Truth [10] to be beyond the capabilities of seasoned pilots, let alone flight students on their maiden voyage. Here too remote-control
piloting gives the only rational explanation for what happened. Zionist Neoconservative designs were well served by
the ruse. Again this author notes a significant similarity between the end-stages of the flights of the aerial vehicles
that hit the south Twin Tower, World Trade Center 2, and the Pentagon. Both flights were homing in on buildings that
housed offices of the United States Air Force; namely, the Pentagon in the District of Columbia and the Federal Building at
26 Federal Plaza, 37th Floor, New York, New York 10278, at Broadway and Duane Street in Manhattan, four tenths of a mile from
Ground Zero. (As a potential material witness in a new and a real investigation of 9/11, this author reiterates that
he saw the immediate aftermath of the hit on the south Twin Tower, World Trade Center 2, from the 37th Floor of the Federal
Building, next to the New York Regional Office of the United States Air Force, where the attacking jet appeared to be heading.
[11])
3.7. United Airlines Flight 93, 11 September 2001 Also on 11 September 2001, a Boeing 757 jet, alleged
to have been United Airlines Flight 93, allegedly crashed into a field near Shanksville, Pennsylvania. Right before
the crash, a passenger named Edward Felt allegedly called an emergency dispatcher to report the ongoing hijacking. The
dispatcher, John Shaw, said Felt told him he was using his cell phone to make the call from inside a lavatory where he had
locked himself to escape the terrorists on board the jet. Later, Felt’s family confirmed Felt’s voice when
the FBI played for them a recording of his call. But, according to research conducted by A. K. Dewdney, such a sustained
cell phone call from a speeding jet at high altitude was technically impossible to make. [12] The very same conclusion was also drawn by a USAF Public Affairs Officer in 2003 at Rockefeller Center in New York City
at The Boeing Company’s outdoor Centennial Exhibit to mark the first flight of the Wright Brothers; the young man responded
to this author’s question by telling how he and his colleagues had conducted their own informal experiments with cell
phones aboard military and commercial jets and found that cell phone calls cannot be made from speeding jets at high altitude.
So how then was it possible for Edward Felt’s family to confirm his voice in a call that he could not possibly have
made from a lavatory on board United Flight 93? The only logical answer is that Felt’s voice was an impersonation
made possible by real-time digital voice-morphing. [1] Again, Zionist Neoconservative designs were well served by this ruse, which helped to set the USA on the desired course
of action; namely, perpetual war in the Middle East and beyond.
3.8. Lebanon, 2005 - 2014 The telecommunications
network of Lebanon has long been the target of Zionist infiltration. The bitter truth that demonstrates the absence
of security, safety and freedom of the Lebanese people was finally acknowledged on 24 November 2010 when the International
Telecommunications Union condemned Zionist violations of Lebanon’s telecommunications infrastructure. These violations
include monitoring and surveillance as well as more aggressive forms of telecommunications piracy such as data manipulation.
[13] Lebanon has shown the Zionist state to be highly advanced and at the cutting edge of innovation in cybernetic telecommunications
technologies.
3.9. USAF RQ170 Sentinel, 4 December 2011 Iranian defence forces electronically hijacked and
safely landed an unmanned remote-controlled robotic aircraft, a Lockheed Martin RQ170 Sentinel, which had intruded into the
airspace of Iran on 4 December 2011. This remarkable event was a turning point, for Iran’s successful interception
and capture of a US surveillance drone finally put the idea of remote control piloting by cybernetic telecommunications piracy
into the open, albeit in a way not to the liking of the United States government. Acute lack of introspection, not to
mention duplicity and blunt threats, characterized the response from the United States. Still, Iran’s triumph
presents a golden opportunity for serious consideration of the crime of cybernetic telecommunications piracy where the principle
of legitimate self-defence does not apply.
3.10. Malaysia Airlines Flight MH370, 8 March 2014 Malaysia Airlines
Flight MH370, a Boeing 777 jet, mysteriously went off course and then disappeared on 8 March 2014. Governments and news
media continue to avoid mention of cybernetic telecommunications piracy as a possible cause of what actually happened.
Breaking the taboo on this subject opens the door to questions about previous instances of cybernetic telecommunications piracy
such as 9/11 and EgyptAir 990 and TWA Flight 800 as outlined above. Truth telling about the Malaysia Airlines incident
invites truth telling about all the others. Resistance to this line of inquiry is therefore very strong. An unending
search of a seemingly bottomless ocean is apparently preferable to a comparatively quick check at the exact location of what
appears to be a jet on the sea bed in the Bay of Bengal according to Georesonance [14], whose impressive technology is grounded in quantum physics science. The US Government’s “Asian pivot,”
which entails sowing distrust and rivalry among Asian nations according to the old colonial formula of “divide and conquer,”
certainly adds motive to its impressive array of means and opportunities.
4. Considerations of Realpolitik Considerations of the Realpolitik underlying cybernetic telecommunications piracy must include the psychopathic
Zionist-Neoconservative ideology and its Talmudic origins, where fraud and force are applied to achieve the desired goal of
world dominance no matter what. With the advent of cybernetic telecommunications technology and its inherently anonymous,
deniable, untraceable and unattributable applications, the perfect crime was finally invented. Despite claims to the
contrary, the Talmudic orientation is different from the Torah way. The Talmudic orientation teaches superiority and
separation and license to kill non-Jews and to steal from them, or to use them in various ways. [15] It is no surprise, therefore, that a mountain of strong circumstantial evidence points toward Zionist interventions in the
affairs of men, including aggressive intrusions by means of cybernetic telecommunications piracy. As London and Rome
vie for leadership of “the West,” the Zionist-Neoconservatives egg them on toward perpetual warfare to secure,
in their view, their own realm. Nations and peoples have been destroyed in the process without any real justification.
Indeed, all these wars have been based on lies, and cybernetic telecommunications piracy has been a strong component of the
fraud and force making headlines around the world. A particular aspect of the Talmudic orientation is the Talmudic Law
of the Moser (informer), which prohibits a Jew from informing on another Jew to a non-Jew. [16] This law, which is not unlike the Mafioso Code of Omertà, undermines the adversarial process of the legal
system of the USA and creates an impediment to the proper functioning of the intelligence and law enforcement communities
in the USA. The dominance of Jews of this Talmudic orientation in the affairs of the US Government as well as the news
media makes sure the smooth functioning of their unique apparatus. A monopolistic two-party system richly rewards conformist
views. The federal judicial system prevents real discovery of the Shock and Awe crimes of 9/11. The controlled
news media retains employees some of whom simply cannot believe their own lying eyes. The 21 May 2014 official opening
of the National September 11 Memorial Museum in New York City was a consecration of the Big Lie!
5. Conclusion Chronic lack of credibility ultimately results in a state’s lack of legitimacy. Arrogance of power does not
offer incentives for truth-telling, and very often displays hostility, ridicule and shunning toward those who seek the truth.
Meanwhile, the very real danger of cybernetic telecommunications piracy for the purpose of fabricating a provocation as a
pretext for state action in support of a geopolitical strategy confronts all of mankind. In an effort to reverse such
a negative national trend in the USA as exhibited in this document, and to help ward off the adverse consequences, a list
of recommended courses of action follows forthwith.
5.1. Full Disclosure of Remote-Control Piloting The Boeing
Company and its relevant contractors and subcontractors and their associates near and far are advised to address the nations
and peoples of this Earth and explain how steering a Boeing jet and co-opting its communications system can be done anonymously
by remote-control, which does not require the controller’s physical presence inside the targeted aircraft.
5.2. Full Disclosure of all Risks that Fliers Face The Boeing Company and its relevant contractors and subcontractors
and their associates near and far are advised to make perfectly clear the legitimate purposes of remote-control piloting technology
as well as the associated risks of nefarious use of remote control piloting by cybernetic telecommunications piracy or any
other means.
5.3. Accountability for Past Risk Exposures The Boeing Company and its relevant contractors and
subcontractors and their associates near and far are advised to show complete accountability for any and all risks stemming
from remote-control piloting and cybernetic telecommunications piracy which have already been undertaken by governments, airlines,
pilots and the flying public with or without their knowledge and consent.
5.4. Application of the Nuremberg Principles Nations are advised to define cybernetic telecommunications piracy as an act of aggression in and of itself and also a violation
of the Nuremberg Principles when the purpose of the deception is to create a pretext for aggressive war.
5.5. Uniform
Code for Cybernetic Telecommunications Piracy Nations are advised to adopt worldwide standards for dealing with cybernetic
telecommunications piracy according to the lessons to be learned from The Boeing Company and its relevant contractors and
subcontractors and their associates. ________________________________________ REFERENCES
[1] http://washingtonpost.com/wp-srv/national/dotmil/arkin020199.htm. [2] http://darpa.mil/. [3] http://sysplan.com. [4] http://show-the-house.com/id36.html. [5] http://show-the-house.com/id13.html. [6] http://flight800doc.com. [7] http://show-the-house.com/id87.html. [8] http://show-the-house.com/id9.html. [9] http://show-the-house.com/id70.html. [10] http://pilotsfor911truth.org. [11] http://show-the-house.com/id79.html. [12] http://physics911.net/projectachilles/. [13] http://show-the-house.com/id106.html. [14] http://georesonance.com. [15] http://come-and-hear.com. [16]
http://show-the-house.com/id10.html.
Letters:
His Excellency Dato’ Sri Mohammad Najib bin Tun Haji Abdur Razak Prime Minister of Malaysia 9 April 2014
Citizen of the United States of America Stephen M. St. John presents his compliments to His Excellency
the Prime Minister Dato' Sri Mohammad Najib bin Tun Haji Abdur Razak and renews his expression of deep concern and sympathy
with the government and people of Malaysia among others who must face with great anxiety the mystery of the loss of Malaysia
Airlines Flight MH370 on 8 March 2014.
Citizen St. John wishes to point out to His Excellency the Prime Minister
of Malaysia the very real danger of cybernetic telecommunications piracy for the purpose of fabricating a provocation as a
pretext for state action in support of a geopolitical strategy. Steering a Boeing jet and co-opting its communications
system can be done by remote control which does not require the hijacker’s physical presence inside the targeted aircraft.
Such high-tech hijackings by remote control explain the high speed descending arcs of aerial vehicles that hit with great
precision the south tower WTC 2 and the Pentagon on 11 September 2001, as well as mysterious nose-dives of a US Air Force
EC-135N jet on 6 May 1981 and EgyptAir Flight 990 on 31 October 1999. (In his open letters on 9/11 to the Attorneys
General of the United States Michael B. Mukasey and Eric H. Holder, Citizen St. John has, as a potential material witness
in a new and a real investigation of 9/11, shown how the aerial vehicle that hit the south tower WTC 2 appeared to have been
homing in on the United States Air Force New York Regional Office where he stood seconds after the attack; thus, in an extraordinarily
bizarre coincidence, the two Boeing jets that were flown like missiles on 9/11 were both headed toward buildings where the
USAF maintained offices.)
In conclusion, Citizen St. John urges His Excellency the Prime Minister of Malaysia to
call upon The Boeing Company to explain to the nations and the peoples of the Earth how Boeing jets can be flown by remote
control, the legitimate purposes of such remote control piloting and the risks of nefarious use of remote control piloting
by cybernetic telecommunications piracy or any other means.
Stephen M. St. John
Post Office Box 720274 San José, CA 95172 stephen@show-the-house.com stephen.m.st.john@gmail.com *******
(Emails sent individually to all members of the Deutscher Bundestag whose surnames begin with A & B.) Deutscher Bundestag Platz der Republik 1 11011 Berlin 14 July 2014 Mr. There are at least two kinds
of cybernetic telecommunications piracy which are much, much more aggressive than mere eavesdropping and surveillance.
After reading my article below you might want to consider a ban of all Boeing jets in German airspace until The Boeing Company
gives full accountability and an action plan to meet these new challenges to the 21st century. Very truly yours, Stephen
M. St. John
******* (Emails sent individually to all members of the Deutscher
Bundestag whose surnames begin with C & D.) Platz der Republik 1 11011 Berlin 16 July 2014 Mr. There are at least two kinds of cybernetic telecommunications
piracy which are much, much more aggressive than mere eavesdropping and surveillance. After reading my article below you and
your colleagues in the Deutscher Bundestag might want to consider a ban on all Boeing jets in German airspace until The Boeing
Company gives full accountability and an action plan to meet these new challenges to peace and security in the 21st century. Very truly yours, Stephen M. St. John
*******
Deutscher Bundestag Platz der Republik 1 11011 Berlin 18 July
2014, and again on 21 July Dear Mr. Geetings from San José, California, the heart of Silicon Valley! There are at least two kinds of cybernetic
telecommunications piracy which are much, much more aggressive than mere eavesdropping and surveillance. After reading my
article “Cybernetic Telecommunications Piracy, The Boeing Company, and the Missing Malaysia Airlines Flight MH370”
(below and in attachment) you and your colleagues in the Deutscher Bundestag might want to consider a ban on all Boeing jets
in German airspace until The Boeing Company gives full accountability and an action plan to meet these new challenges to peace
and security in the 21st century. With the sad news of yesterday’s yet-to-be-explained crash of Malaysia Airlines
Flight MH17 over eastern Ukraine, your urgent attention to act on this matter is now, more than ever, required. The
USA’s illegal $5 billion overthrow of the democratically elected government of Ukraine has indeed had dire consequences
going far beyond Ukraine’s borders. Very truly yours, Stephen M. St. John
*******
(Emails sent individually to all members of the Deutscher Bundestag whose
surnames begin with F & G.) Deutscher
Bundestag Platz der Republik 1 11011 Berlin * 23 July 2014 * Dear M, * Greetings from
San José, California, the heart of Silicon Valley! Please allow me to advise you along with other honorable and
esteemed members of the Deutscher Bundestag that there are at least two kinds of cybernetic telecommunications piracy which
are much, much more aggressive than mere eavesdropping and surveillance. * After reading my article “Cybernetic
Telecommunications Piracy, The Boeing Company, and the Missing Malaysia Airlines Flight MH370” (below and in attachment)
you and your colleagues might want to consider a ban on all Boeing jets in German airspace until The Boeing Company gives
full accountability and an action plan to meet these new challenges to peace and security in the 21st century. * With
the sad news of last Thursday’s yet-to-be-explained crash of Malaysia Airlines Flight MH17 over eastern Ukraine, your
urgent attention to act on this matter is now, more than ever, required. The USA’s illegal $5 billion overthrow
of the democratically elected government of Ukraine last February has indeed had dire consequences going far beyond Ukraine’s
borders. One needs to be cautious now so as not to react to a possible false flag provocation by the Breivik element
that dwells among us. * Very truly yours, Stephen M. St. John
*******
(Emails sent individually to all members of the Deutscher Bundestag whose
surnames begin with H, I & J.) Deutscher Bundestag Platz der Republik 1 11011 Berlin * 25 July 2014 * Dear M, * Greetings from San José, California, the heart of Silicon Valley! Please allow me to advise you along with
other honorable and esteemed members of the Deutscher Bundestag that there are at least two kinds of cybernetic telecommunications
piracy which are much, much more aggressive than mere eavesdropping and surveillance. * After reading my article
“Cybernetic Telecommunications Piracy, The Boeing Company, and the Missing Malaysia Airlines Flight MH370” (below
and in attachment) you and your colleagues might want to consider a ban on all Boeing jets in German airspace until The Boeing
Company gives full accountability and an action plan to meet these new challenges to peace and security in the 21st century. * With the sad news of last week’s yet-to-be-explained crash of Malaysia Airlines Flight MH17 over eastern Ukraine,
your urgent attention to act on this matter is now, more than ever, required. The USA’s illegal $5 billion overthrow
of the democratically elected government of Ukraine last February has indeed had dire consequences going far beyond Ukraine’s
borders. Yesterday Renée Montagne, co-host of National Public Radio’s Morning Edition, the most widely
heard radio news program in the USA, after mocking President Putin in a childish report on Russia’s reset time zones,
signed off with a slip of the tongue by calling herself “Renée Ukraine”! This psychologically revealing
utterance was followed within hours by the resignation of Arseniy Yatsenjuk, Victoria Nuland’s original choice to lead
Ukraine! The situation is bizarre indeed. One needs to be cautious now so as not to react to a possible false
flag provocation by the Breivik element that dwells among us. * Very truly yours, Stephen M. St. John *
*******
(Emails sent individually to all members of
the Deutscher Bundestag whose surnames begin with K & L.) Deutscher
Bundestag Platz der Republik 1 11011 Berlin * 28 July 2014 * Dear M, * Greetings
from San José, California, the heart of Silicon Valley! Please allow me to advise you along with
other honorable and esteemed members of the Deutscher Bundestag that there are at least two kinds of cybernetic telecommunications
piracy which are much, much more aggressive than mere eavesdropping and surveillance. * After reading my article
“Cybernetic Telecommunications Piracy, The Boeing Company, and the Missing Malaysia Airlines Flight MH370” (below
and in attachment) you and your colleagues might want to consider a ban on all Boeing jets in German airspace until The Boeing
Company gives full accountability and an action plan to meet these new challenges to peace and security in the 21st century. * With the sad news of the yet-to-be-explained crash of Malaysia Airlines Flight MH17 over eastern Ukraine on 17
July 2014, your urgent attention to act on this matter is now, more than ever, required. The USA’s
illegal $5 billion overthrow of the democratically elected government of Ukraine last February has indeed had dire consequences
going far beyond Ukraine’s borders. Last Thursday Renée Montagne, co-host of National Public
Radio’s Morning Edition, the most widely heard radio news program in the USA, after mocking President Putin
in a childish report on Russia’s reset time zones, signed off with a slip of the tongue by calling herself “Renée
Ukraine”! This psychologically revealing utterance was followed within hours by the resignation of
Arseniy Yatsenjuk, US Department of State official Victoria Nuland’s original choice to lead Ukraine! The
situation is bizarre indeed. One needs to be cautious now so as not to react to another possible false
flag provocation by the Breivik element that dwells among us. * Very truly yours, Stephen M. St.
John * *******
(Emails sent
individually to all members of the Deutscher Bundestag whose surnames begin with M, N, O & P.) Deutscher Bundestag Platz der Republik 1 11011 Berlin * 04 August 2014 * Dear M, * Greetings from San José,
California, the heart of Silicon Valley! Please allow me to advise you along with other honorable and esteemed members
of the Deutscher Bundestag that there are at least two kinds of cybernetic telecommunications piracy which are much, much
more aggressive than mere eavesdropping and surveillance. * After reading my article “Cybernetic Telecommunications
Piracy, The Boeing Company, and the Missing Malaysia Airlines Flight MH370” (below and in attachment) you and your colleagues
might want to consider a ban on all Boeing jets in German airspace until The Boeing Company gives full accountability and
an action plan to meet these new challenges to peace and security in the 21st century. * With the sad news of the
yet-to-be-explained crash of Malaysia Airlines Flight MH17 over eastern Ukraine on 17 July 2014, your urgent attention to
act on this matter is now, more than ever, required. The USA’s illegal $5 billion overthrow of the democratically
elected government of Ukraine last February has indeed had dire consequences going far beyond Ukraine’s borders.
One needs to be vigilant and cautious now so as not to react to another possible false flag provocation by the Breivik element
that dwells among us. * Very truly yours, Stephen M. St. John *******
(Emails sent individually to all members of the Deutscher Bundestag whose surnames begin with Q, R & S.) Frank-Walter Steinmeier Deutscher Bundestag Platz der Republik 1 11011 Berlin * 05 August 2014 * Dear Mr. Steinmeier, * Greetings from San José, California, the heart of Silicon Valley! Please
allow me to advise you along with other honorable and esteemed members of the Deutscher Bundestag that there are at least
two kinds of cybernetic telecommunications piracy which are much, much more aggressive than mere eavesdropping and surveillance. * After reading my article “Cybernetic Telecommunications Piracy, The Boeing Company, and the Missing Malaysia
Airlines Flight MH370” (below and in attachment) you and your colleagues in the Deutscher Bundestag might want to consider
a ban on all Boeing jets in German airspace until The Boeing Company gives full accountability and an action plan to meet
these new challenges to peace and security in the 21st century. * With the sad news of the yet-to-be-explained crash
of Malaysia Airlines Flight MH17 over eastern Ukraine on 17 July 2014, your urgent attention to act on this matter is now,
more than ever, required. The USA’s illegal $5 billion overthrow of the democratically elected government of Ukraine
last February has indeed had dire consequences going far beyond Ukraine’s borders. One needs to be vigilant and cautious
now so as not to react to another possible false flag provocation by the Breivik element that dwells among us. * Very
truly yours, Stephen M. St. John
******* * (Emails sent individually
to all members of the Deutscher Bundestag whose surnames begin with T, U, V, W, X, Y & Z.) Deutscher
Bundestag Platz der Republik 1 11011 Berlin * 06 August 2014 * Dear Mr. * Greetings
from San José, California, the heart of Silicon Valley! Please allow me to advise you along with other honorable and
esteemed members of the Deutscher Bundestag that there are at least two kinds of cybernetic telecommunications piracy which
are much, much more aggressive than mere eavesdropping and surveillance. * After reading my article “Cybernetic
Telecommunications Piracy, The Boeing Company, and the Missing Malaysia Airlines Flight MH370” (below and in attachment)
you and your colleagues in the Deutscher Bundestag might want to consider a ban on all Boeing jets in German airspace until
The Boeing Company gives full accountability and an action plan to meet these new challenges to peace and security in the
21st century. * With the sad news of the yet-to-be-explained crash of Malaysia Airlines Flight MH17 over eastern
Ukraine on 17 July 2014, your urgent attention to act on this matter is now, more than ever, required. The USA’s illegal
$5 billion overthrow of the democratically elected government of Ukraine last February has indeed had dire consequences going
far beyond Ukraine’s borders. One needs to be vigilant and cautious now so as not to react to another possible false
flag provocation by the Breivik element that dwells among us. * Very truly yours, Stephen M. St. John *
*******
His
Excellency Vitaly Churkin Ambassador of the Russian Federation to the United Nations Mission of the Russian Federation
to the United Nations New York, New York, USA
* 19 September 2014 * Your Excellency, * Citizen of the United States of America Stephen M. St. John presents his compliments to His Excellency the Ambassador of
the Russian Federation to the United Nations in New York City and has the honor to bring to his attention his article “Cybernetic
Telecommunications Piracy, The Boeing Company, and the Missing Malaysia Airlines Flight 370,” which very likely has
direct bearing on the more recent case of Flight MH17. * Citizen St. John also wishes to advise His Excellency the
Ambassador that a United Nations International Independent Investigation of the shoot-down of Malaysia Airlines Flight MH17
is perhaps the only way to arrive at the truth with respect to examination of cybernetic telecommunications piracy as a possible
explanation of events leading up to the shoot-down of this Boeing 777 jet. In this regard, Citizen St. John brings to
the attention of His Excellency the Ambassador the Dutch preliminary report on MH17, section 2.1 History of the Flight, which
shows that the MH17 pilot, for reasons that are not clear, could not comply with air traffic control’s routine direction
to gain 2,000 feet in altitude according to the MH17 flight plan. This odd circumstance suggests a ruse to keep the
plane at the lower altitude where it was when the MH17 pilot declined to follow routine air traffic control directions not
long before the shoot-down. This odd circumstance presents a possible scenario involving cybernetic telecommunications
piracy where the communications system of the aircraft is co-opted with high tech impersonations of the pilots by real-time
digital voice morphing. Similarly, such possible scenario would also explain the slight deviation in course requested
by the MH17 pilot, in which case yet another type of cybernetic telecommunications piracy – co-opting the flight control
system of the aircraft and flying the jet by remote control – would also explain the maneuver to bring the jet into
a position that was advantageous for the perpetrators of this monstrous crime. * Finally, Citizen St. John notes
that when the MH17 shoot-down occurred, he was warning of the hidden dangers of cybernetic telecommunications piracy by individual
emails to each and every member of the Deutscher Bundestag with a copy of his article “Cybernetic Telecommunications
Piracy, The Boeing Company, and the Missing Malaysia Airlines Flight MH370.” A copy of this same article follows
in this email to His Excellency the Ambassador of the Russian Federation to the United Nations along with permission to use
it and share it on condition that proper attribution is given to the author. A sample copy of a cover letter to the
members of the Bundestag – in this case, one to Peter Tauber -- precedes the article, all of which is sent with hope
that this information will prove useful. * Very truly yours, Stephen M. St. John * Post Office Box
720274 San José, CA 95172 stephen@show-the-house.com stephen.m.st.john@gmail.com *******
|