Metatron

Cybernetic Telecommunications Piracy, The Boeing Company, & the Missing Malaysia Airlines Flight 370

Home
A Cyborg Burger for King Charles: An E-meal fit for an Emperor & his digital Nomads
REAL JOURNALISM: Something BIG is missing from John Durham's Russiagate Probe
Something BIG is missing from John Durham's Russiagate Report
11 September 2021: A Day of Remembrance & Resolve
A Call to put Trump before an International 9/11 Nuremberg Tribunal
Slam the BREXIT Door shut on the Warmongers with an International 9/11 Nuremberg Tribunal
Lifting the Burdens of Falsehood & Deceit: Open Letters on 9/11 to the Attorneys General of the USA
Trump-Mueller-Giuliani 9/11 Conflicts of Interest
Mueller-Trump Conflict of Interest: An Opening for a 9/11 Nuremberg Tribunal
Trump-Mueller Conflict of Interest
Preventing WWIII with a 9/11 Nuremberg Tribunal
CONTACT
Hierosolyma: An Eight Part Peace Proposal for Greater Jerusalem
Beth El Is the Correct, Prophesied Location for the Real Israel's Next Temple
Constitution of the USA Offers Model Legal Mechanism for Conflict Resolution Among Nations
An Eight Part Peace Proposal for Greater Jerusalem Copyrights
SUBMISSION TO THE LAST SAVIOUR FESTIVAL BEING HELD IN TEHRAN, IRAN
ERSATZ ISRAEL: On those who say they are Jews, but are not.
KHAZARS from the Encyclopedia Britannica, 11th edition
TALMUD AWARENESS
The Talmudic Law of the Moser
Julius Rosenberg & the Talmudic Law of the Moser (Informer)
FAX BROADCASTS 2009
Fax Broadcasts 2005 & Before
Fax Broadcasts 2006
Fax Broadcasts 2007
Fax Broadcasts 2008
Letter to Chief Justice Rehnquist on George H. W. Bush & the JFK Assassination, 31 January 2005
Primary Documentary Evidence Showing Bush in Dallas & helping Jack Ruby spin Oswald's public Persona
USS Liberty Survivor fights for Truth, Justice & End of Cover-up
USS Liberty Incident: "The Missing Piece of the Middle East Peace Puzzle"
USS Liberty Documentary
US Army Intelligence Officer reveals Suppression of Analysts' Findings on USS Liberty Incident
FLASHBACK: Peled statement that 1967 Six Day War was in effect Dayan's "private venture"!
Arabic Numerals
Complaint of Judicial Misconduct against U.S. Bankruptcy Court Judge A. Jay Cristol
Petition for Review of Chief Judge's Dismissal of Complaint
Letter of advice to the clerk of the court:
Letter of request to clerk of the court for permission to donate case file
Reply to court's request for inventory of documents to be donated.
Follow up to edit court's summary of inventory of documents to be donated.
Letter to Rush Limbaugh on the 15th Anniversary of 9/11
A 9/11 Timeline within a 9/11 Timeline
Submission to the House of Lords Select Committee on Communications
The Praxis of Evil's Other Form of Telecommunications Hacking
The extraordinarily strange Odyssey of Professor Peter Bowal
Eyewitness Account of Judicial Conference on morning of 11 September 2001
9/11: Another Look
A Dissenting Critique of the 9/11 Commission Report
The Mastermind Behind 9/11?
Complaint to FCC on CNN's Bias Against "9/11 Truthers"
8 June 2012 Letter to District Attorney in San Jose, California
Open Letters on 9/11 to Attorney General of the USA Michael B. Mukasey
Certified Letter to US Attorney General Michael B. Mukasey
Open Letters on 9/11 to the Attorney General of the USA Eric Holder
Highly Recommended Documentary Films on 9/11
Alex Jones's Interview with Colonel Donn de Grand Pre
Barbarians Inside the Gates
Schlock & Awe on Top of Shock & Awe: NIST Report on WTC 7
President Bush twice said he saw the first jet hit the north tower World Trade Center 1
9/11 Dutch Treat?
Was 9/11 an Inside Job?
Citizen Investigation Team
911 Index
ARTICLE RETRACTED: "Dulles Airport" Shadow casts Doubt on US Government's 9/11 Conspiracy Theory
Letter to Chief Judge William B. Traxler, Jr., U. S. Court of Appeals, 4th Circuit, Richmond, VA
ARTICLE RETRACTED: "Dulles Airport" Shadow disproves US Government's 9/11 Conspiracy Theory
Complaint against US Department of Justice et al. for 9/11 Fraud UPDATED 24 MAY 2010
USCA, 2nd Circuit, 10-3022
St. John v US DoJ et al. Plaintiff-Appellant Brief
Petition for Rehearing En Banc
St. John v. Attorney General of the USA
Double Crossing Liberty
Lebanon's Cedar of Truth
US President Barack Obama's True Citizenship Status and Eligibility to be President Still Unresolved
Letters to the Ambassadors of Kenya & Indonesia on Barack Obama's Qualifications to be US President
USAF EC-135N & EGYPTAIR Flight 990: Precursors of Remote Controlled Flights of 9/11?
USAF EC-135N ACCIDENT INVESTIGATION REPORT
In Memoriam: Yitzhak Rabin, Peacemaker
Eidelberg Column in The Jewish Press argues for the Overthrow of the Rabin Government
Incitement for Assassination of President Asad is in Violation of the Law!
Letter on Newt Gingrich's Law of the Jungle
TWA Flight 800 Ten Years On
Photo of Cruise Missile that shot down TWA Flight 800
Cybernetic Telecommunications Piracy, The Boeing Company, & the Missing Malaysia Airlines Flight 370
Letter to Putin
Letters to the Dutch Government on the 2014 Shoot-down of Malaysia Airlines Flight MH17 over Ukraine
Virginia Tech Massacre: Any Lessons Learned?
Mughniyah Assassination coincides with Brzezinski/Rand Corporation Visit with Asad in Damascus!
Hear, oh Muslims! Hear!
In Memoriam: Helen Thomas, an honest, fair, accurate and courageous journalist
Alex Odeh Assassination File
Alex Odeh Assassination File: The Cartoon
New Olympic Event: Georgian Tie Eating
Hollywood Black Bag Job on the Iranians
FLASHBACK! Letter to Warren Christopher on NY Times Golan maps & Golan wine, dated December 29,1992
Editors of The Jewish Press compared President of the USA with Pharaoh back in 1998!
Stephen M. St. John for President of USA 2012
Governors Island in New York Harbor: Site of UN Military Staff Committee Headquarters?
Corporate Advertising on Legal Tender. Mind over Matter. Mind over Money. Mind over Deficit!
Magi Blowout Sale! Xmas Jingle, Middle East Peace & Security for Ersatz Israel!
Historic Schlesinger Letter points to Angleton/Eliot Same Man Theory!
Letter from Arthur Schlesinger Jr.
Letter to Arthur M. Schlesinger, Jr.
E-mail to BBC's Rowena Thursby concerning Dr. David Kelly, Princess Diana & CIA's Angleton/Eliot
Broadsheet protesting "Shock & Awe" Attack on Iraq
March 2001 Fax on Angleton/Eliot Same Man Theory
BLOODY BUSH CABAL BROUGHT US DALLAS 1963; WATERGATE 1972; BEIRUT 1982; BAGHDAD 1991 & 2003
2 February 1989 Reply from Princess Diana's Lady-in-Waiting Anne Beckwith-Smith
Letter to Mary Jo White on Jonathan Pollard & Marc Rich
Correspondence from the British Royal Family and British Government regarding my peace proposal.
British Bombers dressed as Arabs and caught in the Act!
Judith Miller on Joseph M. Demarest, Jr.
Will? Is that you, Will?
Red Heifer Sighted?
Jesus: Don't be called "Rabbi"! Call no man "Father" on this earth!
Is Harry Potter hawking the British Coronation Throne?
Bowl of Stupid
Why doesn't the City of San Jose fly the national flag according to the law?
Resumes
Letter of Recommendation from Dr. Frank Przetacznik
1993 Letter from Government of Lebanon
CONTACT
To be announced!
To be announced soon!
US Rewards for Justice: An International 9/11 Nuremberg Tribunal
Rewards for Justice & an International 9/11 Nuremberg Tribunal

The Boeing Company owes the nations and peoples of the Earth a thorough explanation of the risks involved in flying on Boeing jets from sabotage by remote control piloting and high-tech impersonations of flight crews.  Some letters warning of these hidden dangers to mankind appear at the end of this article.

Cybernetic Telecommunications Piracy,
The Boeing Company, & the Missing
Malaysia Airlines Flight MH370

Stephen M. St. John
Metatron, United States of America,

stephen@show-the-house.com
________________________________________
Abstract This document identifies two kinds of cybernetic telecommunications piracy; namely, telephonic impersonation by real-time digital voice morphing and hijacking or sabotage by remote control piloting of aerial vehicles.  A list of past incidents wherein cybernetic telecommunications piracy offers the best explanation of what actually happened follows.  Then a brief survey of the Realpolitik behind the use of cybernetic telecommunications piracy shows a close correspondence to the Zionist-Neoconservative agenda to dominate the world through the military strength of the USA.  This leads to the conclusion, which is an action plan to confront what is a clear and present danger to global security and peace.

Keywords cybernetic telecommunications piracy, remote control piloting, real-time digital voice morphing, system planning corporation, defense advanced research projects agency, the boeing company, brigadier general robert e. chapman, usaf ec-135n, twa flight 800, kristina borjesson, egyptair flight 990, united airlines flight 175, American airlines flight 77, united airlines flight 93, edward felt, pilots for 911 truth, donn de grand pré, us attorney general eric h. holder, open letters on 911 to the attorney general of the united states eric h. holder, a. kee dewdney, zionism, neoconservatism, talmudic law of the moser,
________________________________________
1. Introduction

I write out of deep concern for and sympathy with the people and government of Malaysia among others who must endure with great anxiety the mysterious loss of Malaysia Airlines Flight MH370 on 8 March 2014.  I am also compelled to confront a combination of dishonesty, ignorance, stupidity and cowardice within certain agencies of my government of the United States of America and the controlled news media; their collective failure to mention - let alone discuss - cybernetic telecommunications piracy as a possible explanation for the disappearance of this Boeing 777 jet is but part of a longstanding pattern to cover-up certain matters and perpetrate fraud.  Two kinds of cybernetic telecommunications piracy are described; namely, sabotage and hijacking by remote control piloting of jets and telephonic impersonation by real-time digital voice-morphing.  Past instances of suspected cybernetic telecommunications piracy are listed and briefly explored as modern, high tech means to fabricate provocations as pretexts for state actions in support of geopolitical strategies.  Steering a Boeing jet and co-opting its communications system can be done by remote control, which does not require the hijacker’s physical presence inside the targeted aircraft.  Cybernetic telecommunications piracy is inherently deniable and unattributable; therefore, a kind of retrograde analysis must be made whereby logic points to what must have happened after what could not possibly have happened is eliminated from consideration.  As the secrecy surrounding cybernetic telecommunications piracy recedes and the level of awareness of governments and the general public increases, the need to take countermeasures against this hidden danger becomes more and more apparent.  These are matters concerning business ethics, public relations, public choice and public responsibility and ethics.  I will be most gratified if this paper spearheads a global movement to effect necessary change.


2. Two Kinds of Electronic Piracy

There are at least two kinds of cybernetic telecommunications piracy:  telephonic impersonation by real-time digital voice-morphing and sabotage or hijacking by remote-control piloting.  Both are discussed below.

2.1. Deception by Real-time Digital Voice-Morphing
Real-time digital voice-morphing is a brilliant technology that makes possible a very highly accurate duplication of any human being’s voice. [1] By recording the subject person’s voice, his or her digital voice characteristics can then be loaded into a software device that, when connected to a telephone or radio, will enable another person to speak into the telephone or radio and sound exactly like the subject person.  In practical terms, the only vulnerability of this stealth technology is the limited knowledge of the impersonator, whose interlocutor will become suspicious if any lack of knowledge normally expected from the target person becomes apparent.  As an imaginary but technically possible example of real-time digital voice-morphing, the famous Lebanese female singer Farouz could, with adequate preparation, pick up the telephone and sound exactly like Syrian President Bashar al Assad.  In this way she could fool all of her interlocutors some of the time, and even some of them all of the time, but sooner or later her impersonation would be discovered.  Generally, the shorter the conversation, the less likely discovery of the impersonation will be.  Whatever the case, it is difficult to imagine any legitimate use for this technology, which is a tool for police to entrap people and for war criminals and intelligence agencies to deceive people in pursuit of their goals.  Clearly, real-time digital voice-morphing is the new peril of the 21st Century.

2.2. Sabotage and Hijacking by Remote-Control Piloting
Remote-control piloting in 2014 is so commonplace that one finds many examples of this technology in toy and sporting goods stores worldwide.  But the origins of remote-control piloting are not as obvious as they lie hidden in the research and development conducted in the national security interests of the USA and other states.  The Defence Advanced Research Projects Agency (DARPA) [2] and System Planning Corporation (SPC) [3] are two organizations known to have designed and produced and distributed this technology for military or commercial use.  Anecdotal information and rumour suggest that remote-control piloting quietly ended the spate of airliner hijackings of the 1960’s and 1970’s by giving authorities on the ground the ability to hijack the hijackers.  This explanation, however, begs the question, why wasn’t this technology used to thwart the alleged hijackers of 9/11?  The answer may very well be that such legitimate use of remote-control piloting gradually became susceptible to cybernetic telecommunications piracy whereby unauthorized use of the remote-control technology could be achieved by criminals or intelligence agencies acting in support of a state’s military, economic and political objectives.  Such unauthorized use of this technology is another weapon for war criminals.  Sabotage and hijacking by unauthorized use of remote-control piloting are clear and present dangers to global security and peace.


3. Examples of Electronic Piracy
Here follow some examples of cybernetic telecommunications piracy where remote-control piloting technology and/or real-time digital voice-morphing were very likely employed by as yet unknown agents acting in support of a state’s military, economic and political objectives.

3.1. US Air Force EC-135N, 6 May 1981
A USAF EC-135N jet (a modified Boeing 707) entered into a mysterious, unexplained and catastrophic nosedive near Frederick Maryland on 6 May 1981.  An anomalous transponder beacon return signal immediately before the jet’s plunge to earth began suggests electromagnetic interference in the flight control system.  An unexplained explosion inside the fuselage at a point when recovery from the nosedive was no longer possible suggests sabotage with no room for error.  Brigadier General Robert E. Chapman’s USAF Aircraft Accident Investigation Report [4] failed to refer the matter for criminal investigation.  The national security interests of the Zionist state indicate motive, means and opportunity to sabotage this flight by remote control piloting as a strong measure of opposition to the Reagan Administration’s proposed sale of armaments to Saudi Ara-bia; when the sale was finally approved, the USA, in an apparent quid pro quo, stopped calling Zionist settlements in the occupied territories “illegal” and instead began using the ambiguous and Zionist-appeasing term “obstacles to peace.”

3.2. TWA Flight 800, 17 July 1996
TWA Flight 800, a Boeing 747 jet, plunged into the Atlantic Ocean south of Moriches Inlet on Long Island after a short series of explosions on 17 July 1996.  Hundreds of competent eyewitness testimonies, as well as photographic evidence, indicated a missile attack as the true cause of the initial explosions. [5] But the National Transportation Safety Board and the Federal Bureau of Investigation relied instead on a ridiculous video from the Central Intelligence Agency to distort the truth with an aerodynamically impossible flight path describing the demise of the aircraft.  Kristina Bor-jesson very effectively exposed the criminality of the CIA, FBI and NTSB in her excellent documentary film “TWA Flight 800.” [6] The shoot-down of TWA Flight 800 happened during military exercises in the immediate vicinity of the crash site, and the NTSB’s far-fetched conclusion of an accidental explosion inside the jet led many to believe the deception was concocted to cover up an accident involving a missile fired during military exercises.  But the possibility of deliberate cybernetic hijacking of a remote-controlled missile during military exercises was never articulated by the government agencies involved in the investigation or by the news media.  The motive, means and opportunity to perpetrate such a crime are reflected in the Zionist-Neoconservative ideology of dominating the world through the military might of the USA.  A clandestine false flag attack on a commercial jet, which would have been attributed to radical Islamic groups as a pretext for starting a war against them, presents a logical scenario for what must have happened.  However, a chance photo of a missile which was taken minutes before the explosions occurred [7] very likely compromised the conspirators’ intended explanation of what supposedly happened and ruined their plot.

3.3. EgyptAir Flight 990, 31 October 1999
EgyptAir Flight 990, a Boeing 767 jet, entered into a mysterious, unexplained and catastrophic nosedive into the Atlantic Ocean south of Nantucket Island on 31 October 1999.  The National Transportation Safety Board presented a ridiculous graphic, purportedly produced by the US Air Force, to demonstrate an aerodynamically impossible roller coaster flight path that led to the demise of the aircraft.  Additionally, a playback from the cockpit voice recorder was used to suggest co-pilot suicide and mass homicide; however, lessons later learned from 9/11 gave a much more plausible explanation of impersonation of pilot and co-pilot by real-time digital voice morphing.  As with the case of the EC-135N, the national security interests of the Zionist state indicate motive, means and opportunity to sabotage this flight by remote control piloting.  Many high ranking Egyptian military officers were killed in the crash of EgyptAir Flight 990.  They were returning home from the USA where they had been taking part in armaments training programs that David Bar Ilan, the Director of Communications for Zionist Prime Minister Benjamin Netanyahu, had called “a dire threat to the State of Israel.” [8]

3.4. Alaska Airlines Flight 261, 31 January 2000
Alaska Airlines Flight 261, a McDonnell Douglas MD-83 jet, entered into a mysterious, unexplained and catastrophic nosedive into the Pacific Ocean off Point Mugu, California on 31 January 2000.  The NTSB concluded that the cause of this crash was due to a runaway pitch trim resulting from improper maintenance of the pitch trim jackscrew.  The Boeing Company, having merged with McDonnell Douglas in 1997, assumed liability.  This crash occurred precisely when this author conducted a fax broadcast to the international community from New York City concerning the motive, means and opportunity of the Zionist state in the mysterious demises of the USAF EC-135N on 6 May 1981 and EgyptAir Flight 990 on 31 October 1999, as mentioned above. [8] Up until the Alaska Airlines Flight 261 crash, there had been only two mysterious and unexplained nosedives of heavy jets on record, and both had been described by this author as acts of sabotage in the national security interests of the Zionist state.  This extraordinary charge made by fax broadcast coincided with yet another extremely rare instance of a mysterious nosedive of a heavy jet – albeit one that apparently was not in the national security interests of the Zionist state, unless one considers the 2 of 3 linkage (66%) better for Zionist public relations than the 2 of 2 linkage (100%).

3.5. United Airlines Flight 175, 11 September 2001
On 11 September 2001, a Boeing 767 jet, alleged to have been United Airlines Flight 175, crashed into the south Twin Tower, World Trade Center 2.  The unerring high-speed descending arc of flight into the target was deemed by experts such as Donn de Grand Pré [9] and, later, Pilots for 9/11 Truth, [10] to be beyond the capabilities of seasoned pilots, let alone flight students on their maiden voyage.  Remote-control piloting gives the only rational explanation for what happened.  Additionally, this author, as a material witness in a new and real investigation of 9/11, can attest that the aerial vehicle that hit the south Twin Tower, World Trade Center 2, appeared to have been homing in on the New York Regional Office of the United States Air Force on the 37th Floor of 26 Federal Plaza at Broadway and Duane Street in Manhattan, just four-tenths of a mile from Ground Zero, which is where he stood and beheld the immediate aftermath of that crash.  This circumstance was described in Open Letter # 3 on 9/11 to the Attorney General of the United States Eric H. Holder, dated 19 February 2009. [11] This remote-controlled flight appears to have been one component of a false flag intelligence operation designed to create a pretext for putting American muscle on Mesopotamian patrol according to the Zionist-Neoconservative goal of world domination by full spectrum fraud and force.

3.6. American Airlines Flight 77, 11 September 2001
Also on 11 September 2001, a Boeing 757 jet alleged to have been American Airlines Flight 77 allegedly crashed into the Pentagon.  As with the case of United Airlines Flight 175 hitting the south Twin Tower of the World Trade Center, this aerial vehicle’s unerring high-speed descending arc of flight toward the Pentagon was deemed by experts such as Donn de Grand Pré [9] and Pilots for 9/11 Truth [10] to be beyond the capabilities of seasoned pilots, let alone flight students on their maiden voyage.  Here too remote-control piloting gives the only rational explanation for what happened.  Zionist Neoconservative designs were well served by the ruse.  Again this author notes a significant similarity between the end-stages of the flights of the aerial vehicles that hit the south Twin Tower, World Trade Center 2, and the Pentagon.  Both flights were homing in on buildings that housed offices of the United States Air Force; namely, the Pentagon in the District of Columbia and the Federal Building at 26 Federal Plaza, 37th Floor, New York, New York 10278, at Broadway and Duane Street in Manhattan, four tenths of a mile from Ground Zero.  (As a potential material witness in a new and a real investigation of 9/11, this author reiterates that he saw the immediate aftermath of the hit on the south Twin Tower, World Trade Center 2, from the 37th Floor of the Federal Building, next to the New York Regional Office of the United States Air Force, where the attacking jet appeared to be heading. [11])

3.7. United Airlines Flight 93, 11 September 2001
Also on 11 September 2001, a Boeing 757 jet, alleged to have been United Airlines Flight 93, allegedly crashed into a field near Shanksville, Pennsylvania.  Right before the crash, a passenger named Edward Felt allegedly called an emergency dispatcher to report the ongoing hijacking.  The dispatcher, John Shaw, said Felt told him he was using his cell phone to make the call from inside a lavatory where he had locked himself to escape the terrorists on board the jet.  Later, Felt’s family confirmed Felt’s voice when the FBI played for them a recording of his call.  But, according to research conducted by A. K. Dewdney, such a sustained cell phone call from a speeding jet at high altitude was technically impossible to make. [12] The very same conclusion was also drawn by a USAF Public Affairs Officer in 2003 at Rockefeller Center in New York City at The Boeing Company’s outdoor Centennial Exhibit to mark the first flight of the Wright Brothers; the young man responded to this author’s question by telling how he and his colleagues had conducted their own informal experiments with cell phones aboard military and commercial jets and found that cell phone calls cannot be made from speeding jets at high altitude.  So how then was it possible for Edward Felt’s family to confirm his voice in a call that he could not possibly have made from a lavatory on board United Flight 93?  The only logical answer is that Felt’s voice was an impersonation made possible by real-time digital voice-morphing. [1] Again, Zionist Neoconservative designs were well served by this ruse, which helped to set the USA on the desired course of action; namely, perpetual war in the Middle East and beyond. 

3.8. Lebanon, 2005 - 2014
The telecommunications network of Lebanon has long been the target of Zionist infiltration.  The bitter truth that demonstrates the absence of security, safety and freedom of the Lebanese people was finally acknowledged on 24 November 2010 when the International Telecommunications Union condemned Zionist violations of Lebanon’s telecommunications infrastructure.  These violations include monitoring and surveillance as well as more aggressive forms of telecommunications piracy such as data manipulation. [13] Lebanon has shown the Zionist state to be highly advanced and at the cutting edge of innovation in cybernetic telecommunications technologies.

3.9. USAF RQ170 Sentinel, 4 December 2011
Iranian defence forces electronically hijacked and safely landed an unmanned remote-controlled robotic aircraft, a Lockheed Martin RQ170 Sentinel, which had intruded into the airspace of Iran on 4 December 2011.  This remarkable event was a turning point, for Iran’s successful interception and capture of a US surveillance drone finally put the idea of remote control piloting by cybernetic telecommunications piracy into the open, albeit in a way not to the liking of the United States government.  Acute lack of introspection, not to mention duplicity and blunt threats, characterized the response from the United States.  Still, Iran’s triumph presents a golden opportunity for serious consideration of the crime of cybernetic telecommunications piracy where the principle of legitimate self-defence does not apply.

3.10. Malaysia Airlines Flight MH370, 8 March 2014
Malaysia Airlines Flight MH370, a Boeing 777 jet, mysteriously went off course and then disappeared on 8 March 2014.  Governments and news media continue to avoid mention of cybernetic telecommunications piracy as a possible cause of what actually happened.  Breaking the taboo on this subject opens the door to questions about previous instances of cybernetic telecommunications piracy such as 9/11 and EgyptAir 990 and TWA Flight 800 as outlined above.  Truth telling about the Malaysia Airlines incident invites truth telling about all the others.  Resistance to this line of inquiry is therefore very strong.  An unending search of a seemingly bottomless ocean is apparently preferable to a comparatively quick check at the exact location of what appears to be a jet on the sea bed in the Bay of Bengal according to Georesonance [14], whose impressive technology is grounded in quantum physics science.  The US Government’s “Asian pivot,” which entails sowing distrust and rivalry among Asian nations according to the old colonial formula of “divide and conquer,” certainly adds motive to its impressive array of means and opportunities.


4. Considerations of Realpolitik
Considerations of the Realpolitik underlying cybernetic telecommunications piracy must include the psychopathic Zionist-Neoconservative ideology and its Talmudic origins, where fraud and force are applied to achieve the desired goal of world dominance no matter what.  With the advent of cybernetic telecommunications technology and its inherently anonymous, deniable, untraceable and unattributable applications, the perfect crime was finally invented.  Despite claims to the contrary, the Talmudic orientation is different from the Torah way.  The Talmudic orientation teaches superiority and separation and license to kill non-Jews and to steal from them, or to use them in various ways. [15] It is no surprise, therefore, that a mountain of strong circumstantial evidence points toward Zionist interventions in the affairs of men, including aggressive intrusions by means of cybernetic telecommunications piracy.  As London and Rome vie for leadership of “the West,” the Zionist-Neoconservatives egg them on toward perpetual warfare to secure, in their view, their own realm.  Nations and peoples have been destroyed in the process without any real justification.  Indeed, all these wars have been based on lies, and cybernetic telecommunications piracy has been a strong component of the fraud and force making headlines around the world.  A particular aspect of the Talmudic orientation is the Talmudic Law of the Moser (informer), which prohibits a Jew from informing on another Jew to a non-Jew. [16] This law, which is not unlike the Mafioso Code of Omertà, undermines the adversarial process of the legal system of the USA and creates an impediment to the proper functioning of the intelligence and law enforcement communities in the USA.  The dominance of Jews of this Talmudic orientation in the affairs of the US Government as well as the news media makes sure the smooth functioning of their unique apparatus.  A monopolistic two-party system richly rewards conformist views.  The federal judicial system prevents real discovery of the Shock and Awe crimes of 9/11.  The controlled news media retains employees some of whom simply cannot believe their own lying eyes.  The 21 May 2014 official opening of the National September 11 Memorial Museum in New York City was a consecration of the Big Lie!


5. Conclusion
Chronic lack of credibility ultimately results in a state’s lack of legitimacy.  Arrogance of power does not offer incentives for truth-telling, and very often displays hostility, ridicule and shunning toward those who seek the truth.  Meanwhile, the very real danger of cybernetic telecommunications piracy for the purpose of fabricating a provocation as a pretext for state action in support of a geopolitical strategy confronts all of mankind.  In an effort to reverse such a negative national trend in the USA as exhibited in this document, and to help ward off the adverse consequences, a list of recommended courses of action follows forthwith.

5.1. Full Disclosure of Remote-Control Piloting
The Boeing Company and its relevant contractors and subcontractors and their associates near and far are advised to address the nations and peoples of this Earth and explain how steering a Boeing jet and co-opting its communications system can be done anonymously by remote-control, which does not require the controller’s physical presence inside the targeted aircraft.

5.2. Full Disclosure of all Risks that Fliers Face
The Boeing Company and its relevant contractors and subcontractors and their associates near and far are advised to make perfectly clear the legitimate purposes of remote-control piloting technology as well as the associated risks of nefarious use of remote control piloting by cybernetic telecommunications piracy or any other means.

5.3. Accountability for Past Risk Exposures
The Boeing Company and its relevant contractors and subcontractors and their associates near and far are advised to show complete accountability for any and all risks stemming from remote-control piloting and cybernetic telecommunications piracy which have already been undertaken by governments, airlines, pilots and the flying public with or without their knowledge and consent.

5.4. Application of the Nuremberg Principles
Nations are advised to define cybernetic telecommunications piracy as an act of aggression in and of itself and also a violation of the Nuremberg Principles when the purpose of the deception is to create a pretext for aggressive war.

5.5. Uniform Code for Cybernetic Telecommunications Piracy
Nations are advised to adopt worldwide standards for dealing with cybernetic telecommunications piracy according to the lessons to be learned from The Boeing Company and its relevant contractors and subcontractors and their associates.
 
________________________________________
REFERENCES

[1]  http://washingtonpost.com/wp-srv/national/dotmil/arkin020199.htm.
[2]  http://darpa.mil/.
[3]  http://sysplan.com.
[4]  http://show-the-house.com/id36.html.
[5]  http://show-the-house.com/id13.html.
[6]  http://flight800doc.com.
[7]  http://show-the-house.com/id87.html.
[8]  http://show-the-house.com/id9.html.
[9]  http://show-the-house.com/id70.html.
[10] http://pilotsfor911truth.org.
[11] http://show-the-house.com/id79.html.
[12] http://physics911.net/projectachilles/.
[13] http://show-the-house.com/id106.html.
[14] http://georesonance.com.
[15] http://come-and-hear.com.

[16] http://show-the-house.com/id10.html.

 

Letters:

 

His Excellency Dato’ Sri Mohammad Najib bin Tun Haji Abdur Razak
Prime Minister of Malaysia
9 April 2014

Citizen of the United States of America Stephen M. St. John presents his compliments to His Excellency the Prime Minister Dato' Sri Mohammad Najib bin Tun Haji Abdur Razak and renews his expression of deep concern and sympathy with the government and people of Malaysia among others who must face with great anxiety the mystery of the loss of Malaysia Airlines Flight MH370 on 8 March 2014.

Citizen St. John wishes to point out to His Excellency the Prime Minister of Malaysia the very real danger of cybernetic telecommunications piracy for the purpose of fabricating a provocation as a pretext for state action in support of a geopolitical strategy.  Steering a Boeing jet and co-opting its communications system can be done by remote control which does not require the hijacker’s physical presence inside the targeted aircraft.  Such high-tech hijackings by remote control explain the high speed descending arcs of aerial vehicles that hit with great precision the south tower WTC 2 and the Pentagon on 11 September 2001, as well as mysterious nose-dives of a US Air Force EC-135N jet on 6 May 1981 and EgyptAir Flight 990 on 31 October 1999.  (In his open letters on 9/11 to the Attorneys General of the United States Michael B. Mukasey and Eric H. Holder, Citizen St. John has, as a potential material witness in a new and a real investigation of 9/11, shown how the aerial vehicle that hit the south tower WTC 2 appeared to have been homing in on the United States Air Force New York Regional Office where he stood seconds after the attack; thus, in an extraordinarily bizarre coincidence, the two Boeing jets that were flown like missiles on 9/11 were both headed toward buildings where the USAF maintained offices.)

In conclusion, Citizen St. John urges His Excellency the Prime Minister of Malaysia to call upon The Boeing Company to explain to the nations and the peoples of the Earth how Boeing jets can be flown by remote control, the legitimate purposes of such remote control piloting and the risks of nefarious use of remote control piloting by cybernetic telecommunications piracy or any other means.

Stephen M. St. John

Post Office Box 720274
San José, CA 95172
stephen@show-the-house.com
stephen.m.st.john@gmail.com

 


*******

(Emails sent individually to all members of the Deutscher Bundestag whose surnames begin with A & B.)
Deutscher Bundestag
Platz der Republik 1
11011 Berlin
14 July 2014
Mr.
There are at least two kinds of cybernetic telecommunications piracy which are much, much more aggressive than mere eavesdropping and surveillance.  After reading my article below you might want to consider a ban of all Boeing jets in German airspace until The Boeing Company gives full accountability and an action plan to meet these new challenges to the 21st century.
Very truly yours,
Stephen M. St. John

*******


(Emails sent individually to all members of the Deutscher Bundestag whose surnames begin with C & D.)
Platz
der Republik 1
11011 Berlin
16 July 2014
Mr.
There are at least two kinds of cybernetic telecommunications piracy which are much, much more aggressive than mere eavesdropping and surveillance. After reading my article below you and your colleagues in the Deutscher Bundestag might want to consider a ban on all Boeing jets in German airspace until The Boeing Company gives full accountability and an action plan to meet these new challenges to peace and security in the 21st century.
Very truly yours,
Stephen M. St. John

 

*******

 

 

Deutscher Bundestag
Platz der Republik 1
11011 Berlin
18 July 2014, and again on 21 July
Dear Mr.

Geetings from San José, California, the heart of Silicon Valley!
There are at least two kinds of cybernetic telecommunications piracy which are much, much more aggressive than mere eavesdropping and surveillance. After reading my article “Cybernetic Telecommunications Piracy, The Boeing Company, and the Missing Malaysia Airlines Flight MH370” (below and in attachment) you and your colleagues in the Deutscher Bundestag might want to consider a ban on all Boeing jets in German airspace until The Boeing Company gives full accountability and an action plan to meet these new challenges to peace and security in the 21st century.  With the sad news of yesterday’s yet-to-be-explained crash of Malaysia Airlines Flight MH17 over eastern Ukraine, your urgent attention to act on this matter is now, more than ever, required.  The USA’s illegal $5 billion overthrow of the democratically elected government of Ukraine has indeed had dire consequences going far beyond Ukraine’s borders. 
Very truly yours,
Stephen M. St. John

*******

 

(Emails sent individually to all members of the Deutscher Bundestag whose surnames begin with F & G.)

Deutscher Bundestag
Platz der Republik 1
11011 Berlin
*
23 July 2014
*
Dear M,
*
Greetings from San José, California, the heart of Silicon Valley!  Please allow me to advise you along with other honorable and esteemed members of the Deutscher Bundestag that there are at least two kinds of cybernetic telecommunications piracy which are much, much more aggressive than mere eavesdropping and surveillance.
*
After reading my article “Cybernetic Telecommunications Piracy, The Boeing Company, and the Missing Malaysia Airlines Flight MH370” (below and in attachment) you and your colleagues might want to consider a ban on all Boeing jets in German airspace until The Boeing Company gives full accountability and an action plan to meet these new challenges to peace and security in the 21st century.
*
With the sad news of last Thursday’s yet-to-be-explained crash of Malaysia Airlines Flight MH17 over eastern Ukraine, your urgent attention to act on this matter is now, more than ever, required.  The USA’s illegal $5 billion overthrow of the democratically elected government of Ukraine last February has indeed had dire consequences going far beyond Ukraine’s borders.  One needs to be cautious now so as not to react to a possible false flag provocation by the Breivik element that dwells among us.
*
Very truly yours,
Stephen M. St. John

*******

 

(Emails sent individually to all members of the Deutscher Bundestag whose surnames begin with H, I & J.)

Deutscher Bundestag
Platz der Republik 1
11011 Berlin
*
25 July 2014
*
Dear M,
*
Greetings from San José, California, the heart of Silicon Valley!  Please allow me to advise you along with other honorable and esteemed members of the Deutscher Bundestag that there are at least two kinds of cybernetic telecommunications piracy which are much, much more aggressive than mere eavesdropping and surveillance.
*
After reading my article “Cybernetic Telecommunications Piracy, The Boeing Company, and the Missing Malaysia Airlines Flight MH370” (below and in attachment) you and your colleagues might want to consider a ban on all Boeing jets in German airspace until The Boeing Company gives full accountability and an action plan to meet these new challenges to peace and security in the 21st century.
*
With the sad news of last week’s yet-to-be-explained crash of Malaysia Airlines Flight MH17 over eastern Ukraine, your urgent attention to act on this matter is now, more than ever, required.  The USA’s illegal $5 billion overthrow of the democratically elected government of Ukraine last February has indeed had dire consequences going far beyond Ukraine’s borders.  Yesterday Renée Montagne, co-host of National Public Radio’s Morning Edition, the most widely heard radio news program in the USA, after mocking President Putin in a childish report on Russia’s reset time zones, signed off with a slip of the tongue by calling herself “Renée Ukraine”!  This psychologically revealing utterance was followed within hours by the resignation of Arseniy Yatsenjuk, Victoria Nuland’s original choice to lead Ukraine!  The situation is bizarre indeed.  One needs to be cautious now so as not to react to a possible false flag provocation by the Breivik element that dwells among us.
*
Very truly yours,
Stephen M. St. John
*

*******

 

(Emails sent individually to all members of the Deutscher Bundestag whose surnames begin with K & L.)

Deutscher Bundestag
Platz der Republik 1
11011 Berlin
*
28 July 2014
*
Dear M,
*
Greetings from San José, California, the heart of Silicon Valley!  Please allow me to advise you along with other honorable and esteemed members of the Deutscher Bundestag that there are at least two kinds of cybernetic telecommunications piracy which are much, much more aggressive than mere eavesdropping and surveillance.
*
After reading my article “Cybernetic Telecommunications Piracy, The Boeing Company, and the Missing Malaysia Airlines Flight MH370” (below and in attachment) you and your colleagues might want to consider a ban on all Boeing jets in German airspace until The Boeing Company gives full accountability and an action plan to meet these new challenges to peace and security in the 21st century.
*
With the sad news of the yet-to-be-explained crash of Malaysia Airlines Flight MH17 over eastern Ukraine on 17 July 2014, your urgent attention to act on this matter is now, more than ever, required.  The USA’s illegal $5 billion overthrow of the democratically elected government of Ukraine last February has indeed had dire consequences going far beyond Ukraine’s borders.  Last Thursday Renée Montagne, co-host of National Public Radio’s Morning Edition, the most widely heard radio news program in the USA, after mocking President Putin in a childish report on Russia’s reset time zones, signed off with a slip of the tongue by calling herself “Renée Ukraine”!  This psychologically revealing utterance was followed within hours by the resignation of Arseniy Yatsenjuk, US Department of State official Victoria Nuland’s original choice to lead Ukraine!  The situation is bizarre indeed.  One needs to be cautious now so as not to react to another possible false flag provocation by the Breivik element that dwells among us.
*
Very truly yours,
Stephen M. St. John
*

*******

 

 

 

(Emails sent individually to all members of the Deutscher Bundestag whose surnames begin with M, N, O & P.)
Deutscher Bundestag
Platz der Republik 1
11011 Berlin
*
04 August 2014
*
Dear M,
*
Greetings from San José, California, the heart of Silicon Valley!  Please allow me to advise you along with other honorable and esteemed members of the Deutscher Bundestag that there are at least two kinds of cybernetic telecommunications piracy which are much, much more aggressive than mere eavesdropping and surveillance.
*
After reading my article “Cybernetic Telecommunications Piracy, The Boeing Company, and the Missing Malaysia Airlines Flight MH370” (below and in attachment) you and your colleagues might want to consider a ban on all Boeing jets in German airspace until The Boeing Company gives full accountability and an action plan to meet these new challenges to peace and security in the 21st century.
*
With the sad news of the yet-to-be-explained crash of Malaysia Airlines Flight MH17 over eastern Ukraine on 17 July 2014, your urgent attention to act on this matter is now, more than ever, required.  The USA’s illegal $5 billion overthrow of the democratically elected government of Ukraine last February has indeed had dire consequences going far beyond Ukraine’s borders.  One needs to be vigilant and cautious now so as not to react to another possible false flag provocation by the Breivik element that dwells among us.
*
Very truly yours,
Stephen M. St. John
 

*******

 

 

(Emails sent individually to all members of the Deutscher Bundestag whose surnames begin with Q, R & S.)
Frank-Walter Steinmeier
Deutscher Bundestag
Platz der Republik 1
11011 Berlin
*
05 August 2014
*
Dear Mr. Steinmeier,
*
Greetings from San José, California, the heart of Silicon Valley! Please allow me to advise you along with other honorable and esteemed members of the Deutscher Bundestag that there are at least two kinds of cybernetic telecommunications piracy which are much, much more aggressive than mere eavesdropping and surveillance.
*
After reading my article “Cybernetic Telecommunications Piracy, The Boeing Company, and the Missing Malaysia Airlines Flight MH370” (below and in attachment) you and your colleagues in the Deutscher Bundestag might want to consider a ban on all Boeing jets in German airspace until The Boeing Company gives full accountability and an action plan to meet these new challenges to peace and security in the 21st century.
*
With the sad news of the yet-to-be-explained crash of Malaysia Airlines Flight MH17 over eastern Ukraine on 17 July 2014, your urgent attention to act on this matter is now, more than ever, required. The USA’s illegal $5 billion overthrow of the democratically elected government of Ukraine last February has indeed had dire consequences going far beyond Ukraine’s borders. One needs to be vigilant and cautious now so as not to react to another possible false flag provocation by the Breivik element that dwells among us.
*
Very truly yours,
Stephen M. St. John

*******

 


*
(Emails sent individually to all members of the Deutscher Bundestag whose surnames begin with T, U, V, W, X, Y & Z.)
Deutscher Bundestag
Platz der Republik 1
11011 Berlin
*
06 August 2014
*
Dear Mr.
*
Greetings from San José, California, the heart of Silicon Valley! Please allow me to advise you along with other honorable and esteemed members of the Deutscher Bundestag that there are at least two kinds of cybernetic telecommunications piracy which are much, much more aggressive than mere eavesdropping and surveillance.
*
After reading my article “Cybernetic Telecommunications Piracy, The Boeing Company, and the Missing Malaysia Airlines Flight MH370” (below and in attachment) you and your colleagues in the Deutscher Bundestag might want to consider a ban on all Boeing jets in German airspace until The Boeing Company gives full accountability and an action plan to meet these new challenges to peace and security in the 21st century.
*
With the sad news of the yet-to-be-explained crash of Malaysia Airlines Flight MH17 over eastern Ukraine on 17 July 2014, your urgent attention to act on this matter is now, more than ever, required. The USA’s illegal $5 billion overthrow of the democratically elected government of Ukraine last February has indeed had dire consequences going far beyond Ukraine’s borders. One needs to be vigilant and cautious now so as not to react to another possible false flag provocation by the Breivik element that dwells among us.
*
Very truly yours,
Stephen M. St. John
*
 

*******

 

His Excellency Vitaly Churkin
Ambassador of the Russian Federation to the United Nations
Mission of the Russian Federation to the United Nations
New York, New York, USA

*
19 September 2014
*
Your Excellency,
*
Citizen of the United States of America Stephen M. St. John presents his compliments to His Excellency the Ambassador of the Russian Federation to the United Nations in New York City and has the honor to bring to his attention his article “Cybernetic Telecommunications Piracy, The Boeing Company, and the Missing Malaysia Airlines Flight 370,” which very likely has direct bearing on the more recent case of Flight MH17.
*
Citizen St. John also wishes to advise His Excellency the Ambassador that a United Nations International Independent Investigation of the shoot-down of Malaysia Airlines Flight MH17 is perhaps the only way to arrive at the truth with respect to examination of cybernetic telecommunications piracy as a possible explanation of events leading up to the shoot-down of this Boeing 777 jet.  In this regard, Citizen St. John brings to the attention of His Excellency the Ambassador the Dutch preliminary report on MH17, section 2.1 History of the Flight, which shows that the MH17 pilot, for reasons that are not clear, could not comply with air traffic control’s routine direction to gain 2,000 feet in altitude according to the MH17 flight plan.  This odd circumstance suggests a ruse to keep the plane at the lower altitude where it was when the MH17 pilot declined to follow routine air traffic control directions not long before the shoot-down.  This odd circumstance presents a possible scenario involving cybernetic telecommunications piracy where the communications system of the aircraft is co-opted with high tech impersonations of the pilots by real-time digital voice morphing.  Similarly, such possible scenario would also explain the slight deviation in course requested by the MH17 pilot, in which case yet another type of cybernetic telecommunications piracy – co-opting the flight control system of the aircraft and flying the jet by remote control – would also explain the maneuver to bring the jet into a position that was advantageous for the perpetrators of this monstrous crime.
*
Finally, Citizen St. John notes that when the MH17 shoot-down occurred, he was warning of the hidden dangers of cybernetic telecommunications piracy by individual emails to each and every member of the Deutscher Bundestag with a copy of his article “Cybernetic Telecommunications Piracy, The Boeing Company, and the Missing Malaysia Airlines Flight MH370.”  A copy of this same article follows in this email to His Excellency the Ambassador of the Russian Federation to the United Nations along with permission to use it and share it on condition that proper attribution is given to the author.  A sample copy of a cover letter to the members of the Bundestag – in this case, one to Peter Tauber -- precedes the article, all of which is sent with hope that this information will prove useful.
*
Very truly yours,
Stephen M. St. John
*
Post Office Box 720274
San José, CA 95172
stephen@show-the-house.com
stephen.m.st.john@gmail.com
*******
 

Thank you for visiting
show-the-house.com!
Please come back soon!
 
 

 
 
* * * * * * *
©  Stephen M. St. John 2007, 2023
 
All original articles written by Stephen M. St. John and published on this website and its forerunner mysite.verizon.net/vze4wbps are fully protected by copyright law.  All rights are reserved.  However, non-commercial dissemination of these articles is allowed and encouraged so long as there is no change to the text or its meaning and proper attribution is given to the author, Stephen M. St. John.  Requests for commercial republication should be directed to the author through the contact information given below.  The author is not responsible for any changes made to the contents of this website without his awareness and consent, and will as soon as possible restore the true content if and when such unauthorized changes are discovered.
 
Current (2023) contact information:
 
Email:
stephen@show-the-house.com
stephen.m.st.john@gmail.com
 
Telephone:  669 388 0931
 
Smoke Signal, Radiation Flash:  37° 21' 57" N, 121° 51' 11" W at 100 feet elevation
 
For regular mail via USPS, please send to
:
 
Stephen M. St. John
Post Office Box 720274
San José, CA   95172
United States of America
 
For FedEx, UPS, Amazon, and other shipments, please send to:
 
Stephen M. St. John
Colonnade # 720274
200 South 3rd Street
San José, CA 95112-9998
USA
 
(The San José contact information shown above supercedes all previous contact information that may appear in this website including the mailing addresses Post Office Box 449, Rockefeller Center, New York, NY 10185; Post Office Box 1223, Newark, CA 94560; the email address metatron.metatron@verizon.net; and telephone numbers 212 534 5024, 917 519 2905 and 408 658 4717.)

* * * * * * *