T. H. J. Joustra, Chairman
E. R. Muller
M. B. A. van Asselt
Anna van Saksenlaan 50
2593 HT The Hague The Netherlands
The Joint Investigation Team
Wim de Bruin
The Joint Investigation Team
Civil Aviation Organization
Dr. Fang Liu, Secretary General
999 Robert-Bourassa Boulevard
Quebec H3C 5H7 Canada
International Air Transport Association
Alexandre de Juniac, Director General & Chief Executive Officer
800 Place Victoria Post Office Box 113
Montréal, Quebec H4Z 1M1 Canada
31 October 2016
Ladies & Gentlemen:
Let me, a private citizen of the United States of America
who is concerned about airline safety in an increasingly complex and dangerous world, comment on the Dutch Safety Board’s
final report of October 2015, Crash of Malaysia Airlines flight MH17, Hrabove, Ukraine, 17 July 2014, which is published
at http://www.safetyboard.nl. My October 2016 Critique – with recommendations -- of the Dutch Safety Board’s final
report on the shootdown of Malaysia Airlines Flight MH17 is published today, 31 October 2016, on my private website at
I believe that only truth and justice will properly honor those who were killed aboard
Flight MH17 and bring a degree of comfort to their bereaved loved ones as well as lessons learned for the competent authorities.
I hope that the recommendations and criticisms that follow will help to provide a framework for evaluation of the recently
released interim report on the criminal investigation of the Joint Investigation Team comprising representatives of Australia,
Belgium, Malaysia, the Netherlands & Ukraine on 28 September 2016. I’d be most grateful to know
that my efforts will have turned a stone that has not yet been turned in the criminal investigation, come what may.
let me proceed with these criticisms of your final report with frank acknowledgements that it is too easy to criticize and
that only candor and good will can make criticisms constructive. I am thankful for the education that you
have provided me in your report. Yet there remain certain things that still need to be said about space
warfare and electronic warfare and cybernetic telecommunications piracy; these heavy electromagnetic influences endanger those
who fly commercial, civil and military flights and may very well be an element of the heinous crime committed against Malaysia
Airlines and humankind on 17 July 2014. But as you ended your final report with recommendations, let me
start my critique with recommendations. For easy navigation, a clickable table of contents follows in this
Stephen M. St. John
Post Office Box 720274
San José, California 95172
United Nations Military Staff Committee
Threat Assessment Terminology
Expansion of ICAO’s Annex 13 to 13A & 13B
Calling Things by their right Names
Loss of GPS over Ukraine prior to MH17 Shootdown
Weapon used in MH17 Shootdown
CVR & Cybernetic Telecommunications Piracy
Previous Letters to the Dutch Safety Board:
1. United Nations Military Staff Committee
you say in your foreword, “The aviation sector should take urgent measures to identify, assess and manage the risks
associated with flying over conflict zones more effectively,” and that “the ball is now in the court of the states
and the aviation sector,” I wish to point out that the only competent authority to take on this task on behalf of, and
in coordination with, states and the aviation sector worldwide, is the United Nations Military Staff Committee.
26 and 47 of the Charter of the United Nations include “the regulation of armaments” in the mandate of
the Military Staff Committee; it is therefore fitting that Notices to Airmen (NOTAMs) on the risks associated with flying
over conflict zones worldwide be issued by the United Nations Military Staff Committee both to states and aviation sector
operators for the benefit of all mankind, particularly those states and operators whose limited resources would otherwise
increase their vulnerabilities to blind-spotted assessments on their uses of foreign airspaces.
Who can best keep track
of who possesses what weapons and where do they store and deploy them on a global scale? Answer:
the United Nations Military Staff Committee! Intelligence gathering of this sort, especially intelligence
gathering pertaining to space warfare, electronic warfare, and cybernetic telecommunications piracy, is intrinsically above
and beyond the competency of civilian airline operators and even, I dare say, most states. Why burden them
with such tasks, which are really beyond most states’ abilities to accomplish satisfactorily, as you suggest [10.6 Supporting
conclusions (flying over conflict zones), 1. Airspace management, d., PDF 262/279]? Who, then, can best
coordinate the requisite information-sharing between states and operators? The United Nations Military
Staff Committee! Who can best close the gaps between the various responsibilities of those charged in these
matters of risk assessment and decision making? The United Nations Military Staff Committee!
short, the United Nations Military Staff Committee will provide the “fixed structure” that you desire to make
consultation most valuable: “This increases the likelihood that parties assess conflicts from a mutual
perspective and that an integrated risk assessment occurs.” With the United Nations Military Staff
Committee, such consultation, of course, will be on the international level, and not just on the national level.
[8.5 Analysis, PDF 243/279]
The United Nations Military Staff Committee is a creature of the United Nations Security
Council. In the past, I, a private citizen of the USA, have identified the need to raise the level of commitment
of the United States to the principles and purposes of the United Nations. Toward this goal I have proposed
that Governors Island in New York harbor be made available for the formal headquarters of the United Nations Military Staff
Committee as well as the campus for the first international military academy for military professionals from around the world.
[Please see http://www.show-the-house.com/id64.html]
Now the urgent need for a central information clearinghouse for timely and reliable information for threat
and risk assessments and decision-making on the dangers of conflict zones to the aviation community worldwide makes such an
expansion of the United Nations Military Staff Committee’s mandate more desirable than ever. The
Military Staff Committee can provide the structure for coordination of activities described in Appendix P of your final report,
Developments Relevant to the Investigation, to bring together nation states, air operators, the International Civil Aviation
Organization, and the International Air Transport Association, inter alia, in their common endeavor to achieve air
safety. The Russian Federation’s concern that the ICAO lacks leverage to coordinate military and
civilian authorities will have been obviated. [Appendix W, Consultation B, PDF 16/28] This new air safety function of the
Military Staff Committee will raise the profile and prestige of the United Nations Organization and its associated agencies
to new heights. This new air safety function of the Military Staff Committee will happily channel energy
out of Chapter 7 of the Charter of the United Nations into normal peacetime operations for the benefit of mankind.
Vigilance will be the new byword for the Military Staff Committee, which will serve and protect as a watchman for mankind.
me add that Governors Island is deeply rooted in Dutch history as well as the history of the United States, and this historic
military landmark promises to continue to be a vibrant symbol of the evolution of American power from colonial times through
the preservation of the Union after the American Civil War to the final point where the USA will lead only as a sovereign
equal among sovereign equals in the worldwide assembly of nations with full respect for boundaries, sovereignties, internal
affairs of states, and international law.
back to contents
2. Recognition Codes
and air operators must develop their own unique and original in-house recognition codes as a counter-measure against impersonation
by real-time digital voice-morphing, which is a kind of cybernetic telecommunications piracy where the communications system
of an aircraft can be taken over by an outside agency or system. Currently, such cyber attacks are inherently
deniable and unattributable; i.e., they constitute the perfect crime. Well, you have to believe, almost
the perfect crime!
First, in order to understand the need for such recognition codes, it is imperative that all interested
parties take a walk in the shoes of Edward Felt for a very valuable lesson to be learned. Edward Felt was
a passenger on United Airlines Flight 93 on 11 September 2001. John Shaw was the emergency dispatch operator
on the ground who took a call from Edward Felt. Shaw said that Felt told him that there was an on-going
hijacking aboard United Flight 93 and that he had locked himself inside a lavatory where he was using his cellphone to make
the call. [https://catalog.archives.gov/id/2608288] The problem with this scenario is that cell phone calls were impossible to make with the technology available
on commercial jets in 2001. The cell phone signal cannot transfer from cell tower to cell tower on the
ground because the jet is going too fast. Furthermore, there is no chance of confusing a cell phone call
with an air phone call because air phones are not installed in lavatories of commercial jets. (There is
doubt that there were any air phones anywhere on Flight 93.) Moreover, the fuselage acts as a kind of Faraday
cage to impede electronic signals, and the lavatory itself is a kind of Faraday cage inside a kind of Faraday cage.
And yet, John Shaw somehow did receive this somewhat lengthy but technologically impossible call from a man claiming
to be Edward Felt on board the hijacked United Airlines Flight 93. What is more, the Federal Bureau of
Investigation (FBI) of the US Department of Justice played a recording of this impossible Felt-Shaw phone call for Felt’s
wife and daughters, all of whom confirmed they heard the voice of Edward Felt. How can this be explained?
by real-time digital voice-morphing is the only logical explanation for the Felt-Shaw phone call described above.
What happened to Felt very likely also happened to other passengers and personnel inside the cockpits of the alleged
flights of 9/11. Real-time digital voice-morphing is at once both a brilliant and a diabolical technology
whereby a person’s voice can be duplicated with very high fidelity for use in real time. The targeted
person’s voice is recorded, usually surreptitiously in a telephone conversation. The recording is
digitized and functions inside the software as a “sound print” that is unique, like a fingerprint, to the targeted
person. Then the software is connected to a phone or radio, and the impersonator using this software will
sound exactly like the targeted person on the phone or radio. So, as an imagined example, the great female
Lebanese singer Farouz could call anybody and sound exactly like, say, Syrian President Bashar al Asad! The
possibilities stagger the imagination, be it a situation where the enemy can be deceived in warfare, or a criminal can manipulate
his victim or set up a person for entrapment by law enforcement, or intelligence agents can seed a revolution or have a Cockpit
Voice Recorder establish a false dialogue and narrative for investigators. If you own a phone, the National
Security Agency (NSA) owns your voice and can weaponize your voice if it so desires!
In the cockpit in real time,
recognition codes employed exclusively by pilots and other airline personnel who have a need to know will help, if such occasion
arises, to confirm the authenticity of the dialogue contained on the Cockpit Voice Recorder. If, for example,
a certain tone or number or combination of numbers, letters and tones is repeated every 15 seconds, and, in an “accident”
investigation it turns out that such tone or number or combination of numbers, letters and tones is not heard on the CVR,
then the airline will know that the recording on the CVR is not authentic. The recognition codes will protect
the airlines from a fraudulent narrative that is developed from the CVR in the course of the investigation. I
am sure that the human imagination is capable of creating from many diverse cultures many different expressions of useful
recognition codes. The physical source of the recognition codes should be entirely independent of the plane’s
electrical system, which can be ingeniously hacked. An old-fashioned battery-powered cassette recorder
would do nicely. A live singer would be best.
Real-time digital voice-morphing is a very real phenomenon,
yet it remains virtually unknown to the general public. My awareness of this new danger to mankind for
which I am most thankful comes from the pioneering 9/11 research of Alexander Keewatin Dewdney of Canada, whose website http://physics911.net/ is very highly recommended. The only mainstream media report on real-time digital voice-morphing of which
I am aware comes from a February 1999 Washington Post article at http://www.washingtonpost.com/wp-srv/national/dotmil/arkin020199.htm.
Real-time digital voice-morphing and remote-control piloting of an aerial vehicle are two types of cybernetic
telecommunications piracy which are much, much more aggressive than mere eavesdropping and data collection; their underlying
science is highly advanced electrical engineering. A short history of instances where my theory of cybernetic
telecommunications piracy offers the best possible explanation for incidents in the air that have occurred as far back as
1981 is contained in my own article Cybernetic Telecommunications Piracy, The Boeing Company, & the Missing Malaysia
Airlines Flight MH370 at http://www.show-the-house.com/id117.html. As a regular news watcher with a natural curiosity, I have noted these incidents and, having detected
a pattern, felt compelled to write about them beginning in 1999 right after the EgyptAir 990 disaster. Zionist
motive, means and opportunity are factors in nearly all of these incidents. In the beginning I believed
these phenomena were peculiar to Boeing jets only, but later developments suggest that this is not so. I
have followed my instinct, which is, if you see something, say something. This is now the motto of the
US Department of Homeland Security. But there are certain things they don’t want to hear!
back to contents
3. Threat Assessment Terminology
With reference to the recommendation
of the Dutch Intelligence & Security Services Inspectorate (CTIVD) that the Military Intelligence & Security Service
(MIVD) and the General Intelligence & Security Service (AIVD) align their separate terminologies that they use to describe
threat factors (intention, capacity and activity for the military MIVD and capacity, potential and intention for the civil
AIVD), let me recommend the factors of motive, means and opportunity for this purpose. [8.3.2, the tasks
of the AIVD and the MIVD, PDF 236/279, and Appendix T]
back to contents
4. Expansion of ICAO’s Annex 13 to Annex 13A & Annex 13B
International Civil Aviation Organization (ICAO) needs to expand its Annex 13 guidelines for investigations of “accidents”
and “incidents” to include Annex 13A for obvious terrorist acts committed against civil aviation and Annex 13B
for shock and awe acts against civil aviation committed by state sponsored entities or their private armies or contractors
or mercenaries or other associates far and near. Doing so will alleviate the severe mental torture of the
victims’ families, friends and associates who must endure repeated references to “accident” and “crash”
to describe the cold-hearted murders of their loved ones. Such proposed restructuring of the guidelines
will emphasize that the carrier, in this case Malaysia Airlines, is as much a victim of a crime as anyone on board the doomed
jet. It is good to call things by their right names.
back to contents
* * * * * * *
Here let me offer my criticisms
of the Dutch Safety Board’s final report on the shootdown of Malaysia Airlines Flight MH17. Again,
I hope that these criticisms will help to provide a framework for evaluation of the recently released interim report on the
criminal investigation of the Joint Investigation Team on 28 September 2016 and to provide other avenues of investigation.
Calling Things by their right Names
first deficiency of your final report is your repeated use of the words “accident” and “crash” and
“incident” to describe what was a heinous crime. Annex 13 to the Chicago Convention, which
created the International Civil Aviation Organization, and the Kingdom Act Dutch Safety Board, apparently lock you into this
“accident” terminology. [MH17 About the Investigation, 1.3 Legal framework, PDF 12/99] This watered-down word
for a deliberate attack strikes me as the Madison Avenue lingo of the lawyerly class, and in this regard let me bring to your
attention how much the late Soviet spy Kim Philby rightly deplored the Central Intelligence Agency’s heavy recruitment
from the advertising industry. Shootdown (also spelled shoot-down) is the word you wanted.
There was no need to bend minds in this regard with softer words like “accident” and “crash”
and “incident.” “Crash” and “incident” are somewhat neutral words,
but the word “accident” actually implies pre-judgment by any investigation!
The second deficiency of
your final report is your failure to to condemn the shootdown. Setting down words to describe whoever
would commit such a heinous crime would have been appropriate and well within the limited scope of your inquiry to promote
safety with lessons learned and not to assess blame. Psychopathic criminals with ultra high-tech equipment
and a mandate from God to divide and conquer and rule the world are as dangerous to aviation as a loose screw, nut or bolt
or hail that can crack a windshield or a goose getting caught in the engine intake!
The third deficiency of
your final report is your failure to consider Malaysia Airlines a victim of the attack on Malaysia Airlines Flight MH17.
You come halfway in acknowledging this deficiency where you admit that Dutch authorities refused active input of Malaysia
Airlines with respect to transfer of information regarding the passengers who were on board MH17. [Passenger Information 4.6.2,
PDF 63/98] It seems that the Malaysians were whacked physically, economically and socially!
The fourth deficiency of your final report is your antiquated conception of what is a conflict zone.
Yes, it can be said that there was fighting going on in eastern Ukraine, and that there was a conflict zone extending
gradually higher and higher into the air. But in this modern age of space warfare and electronic warfare
and cybernetic telecommunications piracy, a conflict zone can begin between one’s ears and extend infinitely along x,
y and z axes. If you eat the right mushroom, there may be more dimensions than you can bargain for!
Four is enough for me for the time being. We need to be aware of the powerful electromagnetic influences
around us, and how they can, from land, sea, air or space, play havoc with the navigation and communications of commercial,
general, and military aviation.
The fifth deficiency of your final report is your failure to mention my unique and
original theory of cybernetic telecommunications piracy as a new and hitherto unacknowledged danger to the civil aviation
sector as well as a possible contributing factor in the shootdown of Malaysia Airlines Flight MH17. I expressed
my theory of cybernetic telecommunications piracy in letters emailed to the Dutch Safety Board which are now published on
my private website at http://www.show-the-house.com/id119.html. Your inclusion of my theory in your final
report would have been in accord with your own advice given in your foreword: “Risk assessments should
not only focus on phenomena that have threatened civil aviation in the past but also devote attention to new and thus unfamiliar
threats in a changing world. The challenge is to stimulate the imagination of the parties concerned in
such a way that improbable scenarios are also at the forefront of their minds and receive sufficient attention” [Foreword,
a blind spot in the risk assessment, PDF 8/279]. You had the perfect opportunity to break the corporate
and governmental wall of silence and of shunning by warning the peoples of this earth about the clear and present danger of
cybernetic telecommunications piracy, but you blew it! Everything is still under control. At
this juncture, I can only hope that the Joint Investigation Team will finally take this grave matter into account and give
it their utmost attention.
The sixth deficiency of your final report is the understated bias which is revealed
in the following statement concerning the intentions of the Russian armed forces, the Ukrainian armed forces and the Separatists:
“However, unlike the other two actors, the Separatists were not a homogeneous group. They
were composed of factions with different specific objectives and working methods. It was clear, however,
that the Separatists all shared the intention to shoot Ukrainian air force fighter aeroplanes and helicopters out of the air.”
[Appendix T, Report of the Dutch Review Committee for the Intelligence and Security Services, 5.2 MIVD’s degree
of knowledge, The intentions of the Russian armed forces, the Ukrainian armed forces and the Separatists, 25/38, PDF 140/176]
Such use of the word homogeneous, which means consisting of parts all of the same kind, implies that a certain
faction among the Separatists may have had a different agenda conducive to a working method which included shooting down a
civilian airliner or at least shooting at Ukrainian jet fighters at heights where civilian airliners fly. Furthermore,
it is simply not the case that the Ukrainian armed forces were totally homogeneous. The Governor of Dnipropetrovsk,
whose Air Traffic Control had last contact with MH17 right before the shootdown, was an ardent Zionist known to have had the
functional equivalent of a private army at his disposal. Ukraine’s Acting President Oleksandr Turchynov
, who took office right after an illegal and violent coup d’état against his democratically elected
predecessor on 22 February 2014, made Ihor (Igor) Kolomoysky the Regional Governor of Dnipropetrovsk on 2 March 2014, but
President Petro Poroshenko removed him on 24 March 2015 during your investigations leading to this final report.
What you said about the Separatists, that they had “different specific objectives and working methods,”
can just as well be said about Ukrainian armed forces and Ihor Kolomoysky’s faction that functioned like a private army
back to contents
Loss of GPS over Ukraine prior to MH17 Shootdown
seventh deficiency of your final report is your failure to sense the implications of the Malaysia Airlines briefing note,
dated 17 July 2014, on reports dating back to late April 2014 of loss of GPS signals over Ukraine from “several flights”
prior to the shootdown of MH17 on 17 July 2014 (NOTAM information, Appendix D, PDF 33/176). Repeated loss
of GPS suggests a pattern of unlawful flight interference. This is a red flag. Illegal
flight interference coming repeatedly from a known conflict zone is another red flag. Illegal flight interference
coming repeatedly from a known conflict zone is also a manifestation of electronic warfare. Electronic
warfare is consistent with my theory, previously expressed in letters to the Dutch Safety Board, that cybernetic telecommunications
piracy may have played a role in the attack on MH17.
The eighth deficiency of your final report is your listing
of the aforementioned internal Malaysia Airlines advisory (“briefing note”) on loss of GPS over Ukraine in Appendix
D (PDF 33/176), which is a listing of Notifications to Airmen, otherwise known as NOTAMs. This internal
Malaysia Airlines advisory is of an entirely different nature than a NOTAM. A NOTAM has comparatively wider
distribution in the aviation sector, whereas the Malaysia Airlines briefing note was restricted to Malaysia Airlines personnel.
This internal Malaysia Airlines advisory needed to be highlighted by the Dutch Safety Board; instead it was merged
into a list of routine NOTAMs where it really does not belong and does not get the attention it deserves. Unlawful
flight interference as a precursor of the shootdown of MH17 needs to be weighed and considered as a contributing factor of
the crime. Were the criminals calibrating their equipment on other Malaysia Airlines flights prior to the
shootdown of Malaysia Airlines Flight MH17?
The ninth deficiency of your final report is your unsubstantiated reference to “other
operators” who experienced loss of GPS and SatCom over Ukraine. You maintain that “Malaysia
Airlines received signals” from these other operators. [7 Flying over Ukraine: What did Malaysia
Airlines and others do? 7.5.3, PDF 219/279] What “other operators” and what kind of “signals”
are you talking about? The internal Malaysia Airlines advisory (“briefing note”) about loss
of GPS over Ukraine does not refer to “other operators” but instead mentions “other flights” that
experienced loss of GPS over Ukraine. The internal Malaysia Airlines advisory does not mention any loss
of SatCom at all. Without further information and clarification, the known circumstances tend to indicate
that Malaysia Airlines was singled out for loss of GPS over Ukraine at various times prior to the shootdown of MH17.
Vague reference to “other operators” lessens the impact of unlawful flight interference specifically against
Malaysia Airlines and Malaysia Airlines alone in the months and weeks leading up to the shootdown!
The tenth deficiency of
your final report is your failure to ask why Malaysia Airlines or, indeed, any of these putative “other operators,”
didn’t report this unlawful flight interference (loss of GPS and SatCom) over Ukraine so that proper warning about it
could be made to the aviation sector through NOTAMS. Selective warning to a chosen airline prior to disaster
is a scary thought! Psychopaths with ultra high tech means and a mandate from God to commit the perfect
crime can tell themselves “we gave them enough warning to stay away by fiddling with their GPS and they didn’t
pay attention to our warning so it’s not our fault when we went ahead with our plan to use lethal force.
They should have known better and taken another route.” On the other hand, ignorance among
pilots about the dangers to aviation from space warfare and electronic warfare could very well explain the failure to sound
the alarm throughout the aviation sector about a pattern of unlawful flight interference over Ukraine prior to the shootdown
of Malaysia Airlines Flight MH17. Such ignorance regrettably arises from the wall of silence and shunning
built around the topic of cybernetic telecommunications piracy by corporate and governmental entities.
eleventh deficiency of your final report is the inconsistency displayed in your presentation [PDF 219/279], where you say,
“In April 2014, Malaysia Airlines received signals from other operators that the satellite communication (SatCom), and
possibly also GPS, may be disrupted in Ukraine’s airspace.” Whereas the Malaysia Airlines “briefing
note” [Appendix D] mentions only loss of GPS and not loss of SatCom, and here you say “loss of SatCom” and
“possibly also GPS,” one is left wondering, well, which is it? In the given contexts, “SatCom”
and “GPS” are not one and the same thing.
The twelfth deficiency of your final report is your recurring
inconsistency in dealing with the internal Malaysia Airlines briefing note where you say, “On 28 April 2014, Malaysia
Airlines introduced briefing note MAS00083/14 regarding the possible loss of Global Positioning System (GPS) signals in Ukrainian
airspace. [2.8 Aids to Navigation, PDF 35/279] Again, one is left wondering, well, which is it?
Possible or actual loss of GPS?!? Curiously, mention of “other operators” does not appear
in this particular passage introducing a note of uncertainty about the loss of GPS scenario. Was this loss
of GPS and SatCom just a rumor? If it was a rumor, whose rumor was it? Why, then, was
the rumor started? How did a rumor get into your report?
The thirteenth deficiency of your final report is your repeated
failure to regard reported loss of GPS and/or SatCom as a clear manifestation of unlawful interference with the flight of
a commercial jet and thus a possible precursor and component of a crime involving the shootdown of Malaysia Airlines Flight
MH17. Your statement that “Malaysia Airlines did not receive signals from other operators or via
any other channels indicating that the airspace above the eastern part of Ukraine was unsafe” is clear proof of an attempt
to minimize the significance of loss of GPS and/or SatCom, the proper consideration of which opens the door to space warfare
and electronic warfare and cybernetic telecommunications piracy as possible contributing factors in the shootdown.
[7.9 Sub-conclusions, #1, PDF 229/279]
back to contents
Weapon used in MH17 Shootdown
fourteenth deficiency of your final report is the missing smoke trail of the alleged BUK missile. You claim
that a BUK missile brought down Malaysia Airlines Flight MH17, yet you simply ignore this issue of the missing smoke trail
so characteristic of a BUK. You ignore the simple logic that, if a BUK missile had been fired, many observers
in the air and on the ground would have seen the huge plume of thick, white smoke. There would have been
numerous cell-phone photos of this unmistakable tell-tale sign of a BUK missile being fired into the air and its lingering
display. There is no indication whatsoever that Almaz Antey manufactures a smokeless “green”
BUK! So how do you explain the lack of a signature smoke trail for your alleged BUK? And
how can God’s bankers in the West issue “carbon credits” to the Russian Federation for such a smokeless
“green” BUK with sanctions still in place and more on the way?
The fifteenth deficiency of your
final report is the total lack of accountability for any “non-perforating” missile fragments that did not hit
the jet. [10.2 Supporting conclusions (causes of the crash), #6, Fragmentation spray of pre-formed fragments, PDF 255/279]
Indeed, common sense dictates that most fragments do not hit the target, but fly freely away from it.
Your photograph of the fragmentation pattern of a stationary, horizontal high-explosive fragmentation warhead detonation
[Figure 54, PDF 130/279 and Figure 52, page 53 of Appendix X, Dutch National Aerospace Laboratory’s Investigation of
the impact damage due to high-energy objects on the wreckage of flight MH17, PDF 57/72] demonstrates this point very well.
Yet you avoid the obvious implications of this “non-perforating” pre-formed missile fragments issue in
your responses to the comments of the Russian Federation. [MH17 About the Investigation, Appendix L, Response
to the comments of the Russian Federation, PDF 96/99] Such “non-perforating” pre-formed fragments
that did not hit the target, but fell freely onto the soft grassland of Ukraine, are much better pieces of identification
than just a few “perforating” fragments found in wreckage and bodies which, having been altered by the sheer force
of hitting the target at very high speed, are only “consistent with” pre-formed fragments. Were
your hypothesis correct, such pristine pre-formed fragments had to have existed and were recoverable, but were not recovered.
Even by taking into account the difficulties of a conflict zone on the ground, it is still hard to believe that not
one of hundreds of pristine bowtie or cube fragments was located by the recovery teams or by the local inhabitants.
Why weren’t the elegant Newtonian calculations applied to the “non-perforating” missile fragments
as they were to the “perforating” missile fragments [TNO’s numerical reconstruction of damage patterns in
Appendix Y and its numerical blast simulations in Appendix Z] and the falling debris of the destroyed jet [Appendix K, Ballistic
Trajectory Analysis Methods] and the many “fly out simulations” conducted by various agencies to assess possible
origins of a Buk missile flight path to MH17? [3.8.6 Simulations of the missile’s flight path, PDF 143-147/279]
sixteenth deficiency of your final report is your failure to consider other weapons not in common use in the region but which
may have been brought into the region for special purpose.
The seventeenth deficiency of your final report is your failure
to consider the possibility of weapons that have been modified. I am reminded how I once found mostaccioli
inside a box of penne at roughly one third of the total content. Assuming deliberateness in carrying out
the attack, is alteration of evidence in advance of the attack that far-fetched a concept? Can bow-tie
and cube shaped pre-formed fragments be placed in an altogether different type of missile warhead than the kind that normally
The eighteenth deficiency of your final report is your total failure to consider several eyewitness
accounts of a jet fighter in the immediate vicinity of MH17 at the time of the shootdown. Bear in mind
that the USA’s National Transportation Safety Board ignored 715 witnesses to what appeared to be a missile rising to
meet and then to explode TWA Flight 800 on 17 July 1996. Among them was a retired US Navy officer over
50 miles away on the Connecticut shoreline of Long Island Sound. Seeing a rocket’s afterburner at
such a great distance rules out a shoulder-launched rocket. A shoulder-launched rocket could have been
falsely attributed to Arab terrorists in a boat under the flight path with a great deal of plausibility, and the USA would
have invaded the Middle East much sooner. You don’t want to go down that evil route!
But you should at least apprise yourself of that evil route by viewing an excellent documentary TWA: Flight
800 by Kristina Borjesson at http://www.flight800doc.com.
The nineteenth deficiency of your final report is your failure to consider space warfare and electronic warfare
techniques that can add to or subtract from data on a radar screen or make a jet fighter undetectable to radar or allow a
jet fighter to alter the return radar signals so as to project a false location and identity. Moreover,
you fail to consider that Ukrainian authorities admitted that they lacked the technical resources to observe any unauthorized
use of Ukrainian airspace by civil or military aircraft! Nor could they effectively track weapons systems
in the area, and had no indication that the armed groups in eastern Ukraine possessed medium or long-range surface to air
missile systems. [6.2 Restricting the use of the airspace below FL 260, PDF 195/279] Furthermore, the reported
loss of GPS by commercial pilots while flying over Ukraine before the MH17 shootdown should have been a clue to look into
space warfare and electronic warfare as a contributing factor in this heinous crime. My letter advising
of the possibility of cybernetic telecommunications piracy (http://www.show-the-house.com/id119.html) should have been another
prompt to consider space and electronic warfare measures and their possible role in the shootdown of MH17.
back to contents
The twentieth deficiency
of your final report is your misleading classification of meteorological reports (METARS) from airports in the vicinity of
the shootdown of MH17 under the heading “Forecast weather.” [2.7.2 Forecast weather, PDF 32/279]
These meteorological reports are not primarily weather forecasts or prognostications, but descriptions of actual conditions
at the time of issuance. All four meteorological reports – from airports at Kryvyi Righ, Dnipropetrovsk,
Kharkiv and Kyiv Boryspil – were issued at 13.30 UTC, just ten minutes after the shootdown of MH17. These
METARS give the actual weather conditions at the time of the shootdown of MH17. How could you possibly
list them under “Forecast weather”? This is as bad as putting the internal Malaysia Airlines
memo on previously reported losses of GPS over Ukraine among your list of NOTAMS in Appendix D!
The twenty-first deficiency
of your final report is your speculative treatment of clouds relative to the flight path of Malaysia Airlines MH17.
Whereas your alleged BUK lacked its rather distinctive smoke trail, the clouds you describe may well be exaggerated
figments of your imagination. Take another look at the meteorological report (METAR) issued by the Dnipropetrovsk
airport at 13.30 UTC, just ten minutes after the shootdown of MH17. You will see “Cloud and visibility:
visibility more than 10km, thunderstorms in the vicinity, scattered cumulonimbus cloud coverage at 3,300 feet, broken
at 10,000 feet.” [2.7.2 Forecast weather, PDF 32/279] At 33,000 feet, the flight path of MH17 was
well clear of these clouds as the crew of MH17 communicated with the Dnipropetrovsk Air Traffic Control.
twenty-second deficiency of your final report is your provision of a prognostic weather chart apparently to vie with the more
pertinent meteorological reports from airports in the vicinity of the shootdown of MH17. [Appendix F, Weather
Chart and Weather Satellite Image, PDF 37/176] The prognostic weather chart is valid for 12:00 UTC, which
is one hour and twenty minutes before the shootdown; whereas the meteorological reports were issued ten minutes after the
shootdown and therefore describe actual weather conditions at the time of the shootdown. The prognostic
weather chart puts undue focus on approaching clouds at 35,000 feet to the south and southwest of MH17’s flight path;
whereas the local meteorological reports put clouds at the time of the shootdown of MH17 between 3,300 and 10,000 feet, which
is well below the flight path of MH17 at 33,000 feet.
The twenty-third deficiency of your final report is your
provision of prognostic weather reports, called a SIGMETS, for the entire Dnipropetrovsk Flight Information Region, the latest
being for 12.00 to 15.00 UTC on the day of the shootdown of MH17, 17 July 2014. Like the prognostic weather
chart discussed above, these SIGMETS confusedly contend with the more pertinent meteorological reports from airports in the
vicinity of the shootdown of MH17. The then current SIGMET reads “Embedded thunderstorms with large
hail stones forecast over the whole Dnipropetrovsk region, with cloud tops between 37,000 and 41,000 ft, moving North with
a speed of 15 km/h, and Expected change: intensifying.” But MH17 was free and
clear of this approaching weather.
The twenty-fourth deficiency of your final report is your provision of a too-distant
weather satellite image of cloud coverage over eastern Ukraine taken at 13.15 UTC, very near the time of the shootdown of
MH17 at 13.20 UTC. A close-up satellite image would have revealed many breaks and openings in these clouds
that were well below the flight path of MH17.
The twenty-fifth deficiency of your final report is your failure to take into account
the many cell phone camera images taken at the crash sites within minutes of the shootdown of MH17. Many
of these images give fleeting glimpses of the sky, which include patches of blue sky in a broken cloud cover.
There was yet no rain or hail or clouds topping off at 41,000 feet according to the then current SIGMET forecast.
twenty-sixth deficiency of your final report is your failure to take into account eyewitness testimonies of a fighter jet
or fighter jets in the vicinity of MH17 at the time of its shootdown. These eyewitnesses could not have
seen what they saw unless there was a broken cloud cover well below the flight path of MH17. Again, there
was yet no rain or hail or clouds topping off at 41,000 feet according to the then current SIGMET forecast.
twenty-seventh deficiency of your final report is your faulty analysis that concludes “According to Section 2.7, the
weather forecast for flight MH17 was similar to the actual weather on 17 July 2014, as determined by aftercast.” [220.127.116.11
Horizontal Profile, PDF 108/279] What “aftercast” are you talking about? As previously stated
above, local meteorological reports were issued by four local airports, including Dnipropetrovsk, ten minutes after the shootdown
of MH17 and describe weather conditions at the time of the shootdown. Again, as previously stated above,
there is a vast difference between the local meteorological reports from the airports and the prognostic weather chart given
in Appendix F or the prognostic weather reports called SIGMETS [2.7.2 Forecast weather, PDF 33/279] You avoid this fact altogether
in your analysis.
The twenty-eighth deficiency of your final report is your false assertion that “At 13.00 (15.00
CET), at a position about 40NM after waypoint PEKIT, the flight crew of MH17 made a request to Dnipro Radar to change their
track by turning to the left and deviating 20 NM north, in order to avoid the weather associated with the cumulonimbus clouds
on the aeroplane’s track.” [Factual Information, 2.1 History of the flight, PDF 25/279] This
is hardly factual information in that there were no cumulonimbus clouds on the aeroplane’s track or “weather associated
with the cumulonimbus clouds on the aeroplane’s track” according to the local airport meteorological reports (METARS).
As you yourself say elsewhere, “the higher and more energetic clouds were south of the route, moving north east.”
[18.104.22.168 Horizontal Profile, PDF 108/279]
The twenty-ninth deficiency of your final report is your faulty analysis resulting
from your failure to discern the incongruity between actual weather conditions along MH17’s flight path according to
the local airport meteorological reports (METARS) and what you heard MH17 say to Dnipropetrovsk ATC: “Dnipro, Malaysian
one seven, okay, start to two zero miles to the left of track due to weather?” [Appendix G, 38/176] The simple fact
is that there was no weather to circumnavigate along the flight path of MH17. What you heard was very likely
the product of real-time digital voice-morphing; namely, an impersonation of a pilot aboard MH17 in conjunction with remote
control of the jet into the kill zone.
back to contents
Cockpit Voice Recorder &
The thirtieth deficiency of your final report is your failure to take into account
the possibility of cybernetic telecommunications piracy and its very real potential to take over the flight control and communications
systems of an airliner, in which case the cockpit would become the functional equivalent of a Hollywood sound stage, and the
sounds preserved by the Cockpit Voice Recorder would not be from the cockpit but from an outside system intruding upon the
cockpit. Thus, your statement that the “CVR contained the event flight” [Appendix H, Recorded
Data, Cockpit Voice Recorder, PDF 50/176] is overconfident in this new world of space warfare and electronic warfare and cybernetic
telecommunications piracy. If psychopathic criminals ordained by God to divide and conquer and rule the
world so desire, you will hear the hoof beats of a horse on the CVR. It is more likely, though, that you
will hear the “product” of real-time digital voice-morphing, a state of the art technological wonder that permits
high-fidelity voice impersonations in real time. Words can be put into the mouths of the pilots by actors,
and the real pilots would find themselves disturbingly isolated and unable to send or receive communications as they realize
they are no longer flying the jet but being taken for a ride!
The thirty-first deficiency of your final report is your
repetition of misleading information contained in the Dutch Safety Board’s Preliminary Report, where you state “The
last radio transmissions made by Dnipropetrovsk air traffic control center to Flight MH17 began at 13:20:00 (15:20:00 CET)
and ended at 13:22:02 (15:22:02 CET). The crew of flight MH17 did not respond to these radio transmissions.”
[1.5 Preliminary Report, #8, PDF 17/279] True enough, but this statement disguises a bizarre 70 second delay before Dnipropetrovsk
Air Traffic Control (DNP-S4) finally responds at 13.21.10 UTC to the long silence from MH17 following ATC’s previous
unacknowledged transmission to MH17 at 13.20.00 UTC. How can a 70 second interval be explained before Dnipropetrovsk
Air Traffic Control (DNP-S4) finally says, “Malaysian one seven, how do you read me?” [Appendix
G, ATC Transcript, PDF 40/176] Genuine dialogue between Dnipropetrovsk Air Traffic Control (DNP-S4) and
MH17 would have Dnipropetrovsk Air Traffic Control (DNP-S4) asking for a read back within just a few seconds.
Of course, at this point, the high-powered detonation had already occurred, and MH17 was no longer able to respond
to Dnipropetrovsk Air Traffic Control (DNP-S4), but Dnipropetrovsk Air Traffic Control (DNP-S4) couldn’t have known
this so soon! Or, could they have already known?!? To wait 70 seconds before asking,
“Malaysian one seven, how do you read me?” is a red flag. How can this be explained?
How can this odd delay be overlooked by the Dutch Safety Board? In light of the above, how could
the Dutch Safety Board conclude “The actions of the air traffic controllers are consistent with normal operations”?
After 70 seconds of dead air before finally asking for a readback, how could the Dutch Safety Board insist that “the
communication between the flight crew and the air traffic controllers by both parties appeared normal and was considered consistent
with normal operations”? [22.214.171.124, The flight before in-flight break-up, Flight execution, Horizontal profile, PDF 108/279]
Such unnatural dialogue is an occupational hazard of criminals whom we can call Cybernetic Telecommunications Pirates!
They are B movie actors hired by intelligence agencies.
The thirty-second deficiency of your final report is your
repeated failure to question the long pause of 70 seconds by Dnipropetrovsk Air Traffic Control (DNP-S4) after its previous
transmission to MH17 at 13:20:00 (15:20:00 CET) was not answered. Instead, you state “There is no
evidence that the controllers did not perform their duties correctly.” [Appendix V, Consultation A, PDF 18/21]
This is simply not true! Again, such unnatural dialogue is an occupational hazard of criminals whom
we can call Cybernetic Telecommunications Pirates!
The thirty-third deficiency of your final report is your
failure to sense the inappropriate responses between Dnipropetrovsk Air Traffic Control and MH17 where “the captain
decided to deviate from the planned vertical flight profile by not climbing to FL350 as requested by the air traffic controller
but maintained FL330.” [126.96.36.199, The flight before in-flight break-up, Flight execution, Vertical
profile, PDF 107/279] Instead you argue for the soundness of the captain’s normal operational decision
and call the performance of the Ukrainian ATC “adequate.” [10.3 Excluding other causes of the crash, 2. Air traffic
controller, PDF 257/279] But the real issue here is the captain’s failure to articulate his reason to air traffic control
and air traffic control’s failure to request an explanation. This is yet another red flag indicating
unnatural dialogue between ATC and MH17. Once more, such unnatural dialogue is an occupational hazard of
criminals whom we can call Cybernetic Telecommunications Pirates!
The thirty-fourth deficiency of your final report is your
failure to consider the qualifications of the air traffic controllers, which you say “were not relevant to the investigation
into the crash.” [10.3 Excluding other causes of the crash, 2. Air traffic controller, PDF 257/279] Really?
I should think that air traffic controllers displaying unnatural dialogue with the MH17 pilot and waiting 70 seconds
to request a routine read-back from MH17 deserve to be put under scrutiny at the very least! I would want
a list of all persons in Dnipropetrovsk Air Traffic Control and an investigation of each and every one of them.
thirty-fifth deficiency of your final report is your misleading statement that “On request by the flight crew, the air
traffic controller authorized flight MH17 to circumnavigate this weather” supposedly looming in its track. [10.3 Excluding
other causes of the crash, 2. Air traffic controller, PDF 257/279 and 188.8.131.52, The flight before in-flight break-up, Flight
execution, Horizontal profile, PDF 108/279] Yes, I presume that this is what Ukrainian Air Traffic Control
provided in its transcripts. However, as already demonstrated above, meteorological reports (METARS) from
four local airports, including Dnipropetrovsk, whose ATC had final contact with MH17, indicated that the broken cloud cover
was well below the flight path of MH17, and that the looming cumulonimbus clouds reaching as high as 41,000 feet were well
to the south and southwest of the aeroplane’s track. There was no weather for MH17 to circumnavigate
despite what the ATC transcripts reveal. This is a red flag indicating that the dialogue between MH17 and
Dnipropetrovsk ATC was not genuine. Such unnatural dialogue is an occupational hazard of criminals whom
we can call Cybernetic Telecommunications Pirates. Cybernetic Telecommunications Piracy offers the best
explanation for what actually happened.
The thirty-sixth deficiency of your final
report is your tendency to ignore red flags indicating that the dialogue between Dnipropetrovsk Air Traffic Control and MH17
was not genuine. By expanding on prognostic weather forecasts to describe a less than plausible weather
scenario, and by minimizing meteorological reports from local airports which describe actual weather conditions at the time
of the MH17 shootdown, you cut off consideration of Cybernetic Telecommunications Piracy as a contributing factor in the demise
of Malaysia Airlines Flight MH17.
back to contents
The thirty-seventh deficiency
of your final report is your failure to employ a proofreader for the English version. I cannot judge the
Dutch version because I cannot speak or read Dutch. But as a native American English speaker, I found a
few rough spots in your English text.
The thirty-eighth deficiency of your final report is your failure fully to appreciate
the far-reaching implications of your statement “The conflicts that pose the greatest risks to civil aviation are those
in which non-state parties are involved.” [Appendix U, Flying over Conflict Zones – Risk assessment, PDF 163/176]
This statement sounds like a broad hint that the “Separatists” were posing the greatest risks to civil
aviation when MH17 was shot down, which comes very close to overstepping your mandate to determine cause and not to assess
blame. In so doing, you apparently exclude private contractors, mercenary groups and private armies which
are arguably controlled by a state or states through proxies. Such bias can improperly influence the criminal
investigation, which no doubt relies on your final report.
The thirty-ninth deficiency of your final report is your
reliance on classified information from Dutch intelligence services and the unspecified intelligence services of other countries,
which information you maintain confirmed your findings about the causes of the crash of MH17. [Appendix A, PDF 10/176] Secret
evidence such as this classified information from unnamed intelligence services to which you refer is of a totalitarian nature
reeking of oppression and domination and evil. How can you say that your investigation is independent when
you rely on secret evidence? “It is important to ensure that the investigation is carried out independently
from the parties involved. This is why the Dutch Safety Board itself selects the issues it wishes to investigate,
mindful of citizens’ position of dependence with respect to authorities and businesses.” [Dutch Safety Board,
PDF 3/279] Yes, your Annex 13 Investigation is not meant to blame, but rather to learn to promote safety
with lessons learned; yet your conclusions based on secret evidence serve as a guide for the Joint Investigation Team, which
can only compromise the integrity of the JIT investigation and, ultimately, the proper administration of justice.
In a major incident such as the shootdown of Malaysia Airlines Flight MH17, the people and nations of the earth deserve
to know the truth, the whole truth, and nothing but the truth! Secret evidence apparently includes Ukraine’s
refusal, according to the Russian military, to publish its radar data, the positions of air defense batteries it had deployed
in the area of the shootdown, and communications between MH17 and the Ukrainian air traffic controller directing its flight
toward the Separatist-held areas in eastern Ukraine. All of this I find troubling to consider.
fortieth deficiency of your final report is the uncertainty conveyed by your admission regarding your Preliminary Report on
MH17 that the “original English report” was translated into the Dutch language. [1.5 Preliminary Report, PDF 18/279]
If the Dutch Safety Board investigation was carried out by Dutch nationals, wouldn’t one properly expect that the original
Preliminary Report would have been in Dutch, then translated into English, and not the other way around? This
leads to other questions. Was the original of this, your final report, also in English, then translated
into Dutch? Were the Americans or the British involved in any way in making this final report?
If so, wouldn’t this be a breach of your standard of independence? By curious coincidence,
even as you (and perhaps others) were working on your investigation that ultimately produced this final report that was published
in October 2015, a humongous amount of gold bullion was repatriated from the United States to the Netherlands.
This enormous transfer of gold from the Federal Reserve in New York City to Amsterdam in November 2014 was, in and
of itself, an exceedingly rare occurrence. Did elements within the United States Government – the
very same ones who engineered the illegal and immoral coup d’état in Ukraine – buy your final
report on MH17 to be used as propaganda against the Russian Federation in their next step toward world domination?
back to contents
* * * * * * *
Let me begin these reflections
by sharing with you one of my favorite verses of the Holy Bible, which is the advice of King Solomon as recorded
in the Book of Proverbs, 4:14-19. “Enter not into the path of the wicked, and go not in
the way of evil men. Avoid it, pass not by it, turn from it, and pass away. For they
sleep not, except they have done mischief; and their sleep is taken away, unless they cause some to fall. For
they eat the bread of wickedness, and drink the wine of violence. But the path of the just is as the shining
light, that shineth more and more unto the perfect day. The way of the wicked is as darkness: they know
not at what they stumble.”
Choosing light over darkness, I should think, is consistent with the Dutch Safety
Board’s charge from the King on behalf of the people of Holland and Holland’s obligations as signatory to the
Chicago Convention. To seek the truth, the whole truth and nothing but the truth about what happened to
Malaysia Airlines Flight MH17 on 17 July 2014 is the main purpose not only of the Dutch Safety Board but of the Joint Investigation
Team as well.
But I cannot bring myself to conclude that the Dutch Safety Board succeeded in upholding this main
purpose of finding the truth of what really happened to MH17, which, in my opinion, does not augur well for the still-ongoing
work of the Joint Investigation Team.
You steadfastly avoided the implications of unlawful flight interference as indicated
by loss of GPS on other flights over Ukraine prior to the shootdown of MH17. You simply ignored the salient
issue of no smoke trail from your alleged Buk missile. Your physical evidence of the alleged Buk missile
is paltry when there should have been an abundance of such evidence; namely the pristine “non-perforating” missile
fragments in the green fields of Ukraine. Your imagined clouds from hyped weather forecasts clash sharply
with local airport meteorological reports of actual weather conditions at the time of the shootdown of MH17. Your
questionable renderings of the Cockpit Voice Recorder are plausible only if the hyped weather forecasts are accepted as factual,
which they are not! You rely on unspecified secret evidence from unnamed foreign intelligence agencies,
yet nevertheless maintain your independence despite this lack of transparency. (Did this secret evidence
really just confirm your own findings, or did it lead you to them?) You remain virtually oblivious to the
real and present dangers of space warfare, electronic warfare and, despite my best efforts to warn you, the dangers of cybernetic
telecommunications piracy to an aeroplane’s navigation and communications systems.
The sum of these many deficiencies
inevitably leads to two questions and a choice. Do you realize what you have done? Will
you correct these deficiencies? Do you wish to continue on the path of darkness or take the path of light
and of truth and of justice?
Here I can only refer you again to my advice in my second recommendation where I invite
you to walk in the shoes of Edward Felt, an alleged passenger on United Airlines Flight 93, which allegedly crashed in Shanksville,
Pennsylvania on 11 September 2001. This advice is in accord with your own recommendation to use one’s
imagination in approaching these grave matters of flight safety and risk assessments. [Appendix U, Flying Over Conflict Zones
– Risk Assessment, Vulnerabilities involved in risk assessment, The importance of imagination, PDF 165/176] As I have
demonstrated for your edification, the whole story about Mr. Felt and his alleged cell phone call indicates elaborately planned
deception and rampant criminality within the US Government. This in turn calls into question the entire
official story of 9/11. Let me urge you to consider a very good summation of the many reasons why the entire
official story of 9/11 is false by reading the first chapter of David Ray Griffin’s 9/11 Ten Years Later:
When State Crimes Against Democracy Succeed (Olive Branch Press, 2011, http://www.interlinkbooks.com). Professor Griffin is a theologian who very ably acts as a judge in marshalling evidence showing that
Osama Bin Laden in particular, and Al Qa’ida in general, had absolutely nothing to do with 9/11, and that the evidence
actually points to an inside job to create a ruse so as to fabricate a justification to put American muscle on Mesopotamian
patrol. This strong delusion caused many, including the Netherlands, to follow the USA on its path of darkness
and destruction. It is time to reverse course. Giving the USA another opportunity to
act on another false flag provocation will only encourage more aggression. This is what you will ultimately
be doing in light of the many deficiencies of your final report and the forthcoming report of the Joint Investigation Team.
pillars of US foreign policy are fraud and force, and have been so for many decades. Share their goals
and see what you have! Chaos in the Middle East and mass migrations into Europe and growing divisions in
both places. The Netherlands ought to reconsider cooperation in the military adventures of the United States,
particularly in relation to the North Atlantic Treaty Organization (NATO), which has outgrown its usefulness from the time
it turned the Charter of the United Nations into a joke on Yugoslavia in 111 parts! Haven’t
we had enough false flag provocations such as Operation Gladio and the British Bombers (dressed as Arabs) of Basra?
Getting rid of NATO will only enhance the principles and purposes of the United Nations. Invoking
the Nuremberg Principles against the USA at the International Court of Justice in the Hague and implementing tariffs against
the USA to fund massive restitution programs are just measures worthy to pursue.
Harking back to my first
recommendation regarding the United Nations Military Staff Committee as the logical entity to coordinate states, air operators
and other interested parties in their responsibilities to promote air safety particularly in areas where hostilities could
arise, I mentioned Governors Island in New York Harbor as a potential site for a formal headquarters of the UN Military Staff
Committee and campus for the first international academy for military professionals from around the world. I
also mentioned the deep connection of Governors Island with Dutch history and the history of the United States.
Let me here add that during the American Civil War (1861-1865) Governors Island served as a staging ground for Union
troops who were transported from there to the war zones in the south. At the very start of the war, it
was Russian diplomacy that convinced President Abraham Lincoln to formulate a foreign policy that today reflects the basic
principles contained in the first chapter of the Charter of the United Nations. Lincoln sent German
immigrant Carl Schurz as Ambassador to Spain with instructions to coordinate the official position of the United States in
the capitals of Europe. Schurz accordingly urged the European states to refrain from taking sides in the
American Civil War, which he presented to them as an internal affair of the United States. Flash forward
to today, and you clearly see that the United States is not only unhinged from international law, but from its own historical
underpinnings, as it brazenly interferes in the domestic affairs of other states around the globe. The
USA’s foreign policy is based on fraud and force, which is most regrettable. For many, it is tragic.
I call it the praxis of evil.
Oddly enough, this praxis of evil was incubated decades ago right here in
San José, California, the heart of Silicon Valley, well before the transforming discoveries of quantum mechanics and
relativity in Europe were given practical applications by Yankee ingenuity. In 1911 the first radio station
in the history of mankind began to broadcast from what is now downtown San José. By 1933, San José
became famous for the first lynching in the history of mankind to be promoted and conducted by radio broadcasts.
Apparently the victims were patsies engaged in crime with others who were never identified after the FBI, in telephone
consultation with FBI Director J. Edgar Hoover in Washington, dismissed a very credible witness because she was a Portuguese
farmer’s wife! The extrajudicial executions were never punished and, in a very real sense, this lynching set a precedent
for a certain privileged class of society to get away with murder. Add to this San José way of justice
the robust advocacy of former President of the United States Herbert Hoover for the transfer of Palestinian Arabs out of their
land to make room for Zionist settlers, and you have quite a combustible mix for decades to come! Add one
final ingredient, the old precedent from a San José court judgment that a corporation has the same rights as a human
person, and you have a citizen without a heart, a democracy without a heart, and a fascist government with a will of its own.
In 1959 Bertrand Russell proposed world domination by the United States of America as a step toward one world government.
Today the US Government serves the Anglo-Zionist-Neoconservative ideology of world domination by means of the military
power of the United States.
There has evolved from this lawyerly legalized lawlessness, what I call the praxis
of evil, a pattern of deplorable behavior consisting of propaganda, provocations, and false accusations backed by nothing
other than yottaWatts upon yottaWatts of broadcast power! Milosevic of Yugoslavia, who was recently posthumously
exonerated of charges that brought him kidnapping and unjust imprisonment and early death, comes to mind. So
do the three Lebanese generals who were imprisoned for three years for their alleged roles in the 2005 murder of Rafiq Hariri,
and whose release from prison for lack of evidence did not elicit an apology, let alone compensation from, or punishment for,
those who made the false accusations against them. And more recently, we have endured the endlessly repeated
false accusations against Syrian President Bashar al-Asad for use of chemical weapons! This is a small,
partial list of high-tech lynchings for the purpose of regime change consistent with the Anglo-Zionist-Neoconservative quest
for world domination. (In the interests of full disclosure, it was the Hariri administration that in 1993 called my Eight
Part Peace Proposal for Greater Jerusalem “a truly egalitarian model for consideration” for which I am forever
The shootdown of Malaysia Airlines Flight MH17 was just another provocation in a long line of provocations
from the West. So I caution the Joint Investigation Team and the Government of the Netherlands not to aid
and abet the machinations of these psychopaths lest you reap what you sow!
Because the Dutch Safety Board’s duty was to determine the cause of the crash
of MH17 and provide lessons learned so as to improve flight safety and prevent a recurrence of such a disaster, the important
consideration of cui bono? – who benefitted from the crime of shooting down a civilian airliner over a known
conflict zone – did not arise. Yet certain assumptions about possible parties involved in the downing
of MH17 had to be made, or could not be avoided being made; namely the Separatists in eastern Ukraine or the Russians or the
Ukrainians. This is most evident in your statement “However, unlike the other two actors, the Separatists
were not a homogeneous group. They were composed of factions with different specific objectives and working
methods. It was clear, however, that the Separatists all shared the intention to shoot Ukrainian air force
fighter aeroplanes and helicopters out of the air.” [Appendix T, Report of the Dutch Review Committee
for the Intelligence and Security Services, 5.2 MIVD’s degree of knowledge, The intentions of the Russian armed forces,
the Ukrainian armed forces and the Separatists, 25/38, PDF 140/176]
Here, I am afraid to say, the Dutch Safety Board was wearing
blinders as to who would willingly commit this atrocity of shooting down a civilian aeroplane. I dare to
say that the real perpetrators of the shootdown were overly confident of where the blame would fall with their yottaWatts
of broadcast power and were the first to point the finger and urge sanctions against one of the possible parties.
I dare to say that the real perpetrators of the shootdown were the same people who engineered the illegal, immoral
and violent overthrow of Ukraine’s democratically elected government on 22 February 2014. The Ukrainians
by themselves, and the Russians and the Ukrainians in eastern Ukraine who remained loyal to their government after an illegal
coup d’état against it, all lacked a motive to shoot down a commercial airliner. On
the other hand, the backers of this bloody coup d’état had motive as well as means and opportunity to
attack a defenseless civilian airliner and place the blame on the one regional power opposed to their violent takeover of
the leadership and economy of Ukraine. To be frank, the backers of this bloody coup d’état
have been engaged in regime changes all over the world for the better part of the past century, from before Mossadegh in Iran
in 1953 to after Ghaddafi in Libya in 2011. For them, it is a “game” of blood, money, power
and cookies. This Anglo-Zionist-Neoconservative praxis of evil seeks world domination through the military
might of the United States of America.
Let me briefly dissect this Anglo-Zionist-Neoconservative praxis of evil.
The British Monarchy believes that it is destined by ancient Hebrew prophecy to rule the world, but its deep religious
tradition has lately been stifled by a base portrayal of its deeply historic Coronation Throne in the Harry Potter movies,
which feature a near replica of this throne in the mead hall at Hogwarts. You might say that the British
Monarchy is “off message,” and Hollywood is filling in the blanks!
The Jews are mainly Ashkenazi Jews,
or descendants of Turkic Khazars who converted to the Jewish faith in the early Middle Ages. The Khazars
are identified by historians as Gog and the Kingdom of the North, which helps clarify certain prophecies of the ancient Hebrew
prophets. A Turkic people, the Ashkenazi Jews invented the term “anti-Semitism” to gain acceptance
as Semites after their migrations into eastern Europe. On the other hand, the Sephardic Jews are actual
Semites and blood descendants of Abraham, but most of them were assimilated into Christianity. In the past
century, these Turkic Ashkenazi Jews have killed countless Semites who just happen to be Arab. This deplorable
anti-Semitism is behind the controlled chaos that we witness daily in the news from the Middle East. Both
the Ashkenazi Jews and the Sephardic Jews share a gene pool from their common ancestor, Noah.
I have published a study of these important matters at http://www.show-the-house.com/id55.html.
The Neoconservatives are the American wing of this unholy triad. They helped to perpetrate
9/11 to persuade gullible Americans to fight their wars against Arabs in particular and Moslems in general. The
George W. Bush and Barack H. Obama administrations have both served the Anglo-Zionist-Neoconservative ideology.
So will the next administration; both Hillary Clinton and Donald Trump have made pledges of allegiance to the Zionist
state in their campaign appearances before the American Israel Public Affairs Committee. The Bushes, Clintons
and Obama have all paid lip-service to United Nations Security Council Resolution 242, but Trump took a quantum leap above
and beyond them all when he declared his support for Zionist settlements in the occupied territories. Trump
simply threw the USA’s constitutionally mandated obligation to enforce resolution 242 out the window.
driving force of the praxis of evil is the Talmud, which, unlike the Torah, teaches Jewish superiority,
separation and license to kill or use or abuse non-Jews. The Talmudic law of the Moser (Informer)
prohibits a Jew from informing on another Jew to a non-Jew, which is a code of silence not unlike the Mafioso code of omertà.
The Talmudic law of the Moser can easily lead to obstruction of justice and corruption within a nation’s
judicial system as well as dysfunction and corruption within its law enforcement and intelligence communities.
If you have already accepted my invitation in my second recommendation to use your imagination and walk in the shoes
of Edward Felt, you might consider the Talmudic law of the Moser as the force behind the cover-up of his fabricated telephone
call that exposes the entire fraudulent official governmental account of 9/11.
Well before the revelations of Edward
Snowden about the true extent of the National Security Agency’s intrusions into the private communications of the citizens
of the United States and, indeed, of the world, the late Admiral Thomas H. Moorer, a former Chairman of the Joint Chiefs of
Staff, remarked in an interview in 1983, “I’ve never seen a president – I don’t care who he is –
stand up to them. It just boggles the mind. They always get what they want.
The Israelis know what is going on all the time. I got to the point where I wasn’t writing
anything down. If the American people understood what a grip those people have got on our government, they
would rise up in arms. Our citizens don’t have any idea what goes on.” Judging
from what Moorer said in 1983, the year Snowden was born, one can be sure that the Zionists have a controlling access to the
resources of the NSA. Earlier I wrote that if you own a phone, the NSA owns your voice and can weaponize
it if it so chooses. Well, let me add that if you own a phone, the Zionists own your voice and can weaponize
it if they so choose.
Cybernetic Telecommunications Piracy is just another way to wage asymmetrical warfare.
So if, say, the Malaysians hold a Kuala Lumpur War Crimes Tribunal, as they did in 2007, and find George W. Bush and
Tony Blair guilty of crimes against peace, as they did in 2011, then find Bush, Cheney, Rumsfeld, among others, guilty of
conspiracy to commit war crimes, as they did in 2012, then find the State of Israel guilty of genocide of the Palestinian
people, as they did in 2013, then referred their findings to the chief prosecutor at the International Court of Justice in
the Hague, you can consider the motive of revenge for their audacity to publish evidence in support of their convictions.
With that motive, the high-tech means of cybernetic telecommunications piracy and the easy opportunities to lead off
course Malaysia Airlines Flight MH370 and to shoot down Malaysia Airlines Flight MH17 deserve serious consideration.
Iraq has proper standing to bring such war crimes charges before the International Court of Justice.
The case has already been made for them by the Malaysians. The Iraqis just need the political will
to proceed. The Iraq Inquiry, also known as the Chilcot Report, which was published on 6 July 2016, supplements
the case already made by the Malaysians. Thanks to the noble efforts of the Kuala Lumpur Tribunal, Iraq
and Afghanistan have grounds to invoke the Nuremberg Principles at the Hague.
Finally, the Malaysians have hosted
the 9/11 Truth Movement in Malaysia, where the degree of awareness of the Big Lie of 9/11 is very high, which threatens to
expose the real perpetrators of these heinous Shock & Awe crimes against New York and Washington on 11 September 2001.
The motive to punish the Malaysians for taking the path of light over darkness with asymmetrical warfare in the form
of cybernetic telecommunications piracy against two jets of the Malaysia Airlines fleet deserves serious consideration.
Very few nations have the means and opportunities to employ such advanced high-tech means of warfare. Start
with the select few among them who have the motive and go from there. (In the interests of full disclosure,
Malaysian officials from the Mission of Malaysia to the United Nations in New York and the Malaysian Consulate General in
New York hosted a luncheon meeting in New York (in 2005?) where we discussed many aspects of 9/11 which were the subjects
of my fax broadcasts to the US Government and international community in Washington and New York.)
To conclude, it seems to
me that the shootdown of Malaysia Airlines Flight MH17 was a false flag operation designed to put the blame on the Russian
Federation in furtherance of the Anglo-Zionist-Neoconservative design to achieve world domination by confronting the Russian
Federation with possible war. The perpetrators of this heinous crime killed two birds with one stone by
punishing Malaysia for exposing their Big Lie about 9/11 as well as their war crimes with evidence published for all to see,
including the chief prosecutor at the International Court of Justice and the governments of Iraq and Afghanistan, who have
standing to pursue the matter there.
* * * * * * *
back to contents
Previous Letters to the Dutch Safety Board:
Dr. Erwin Muller
Post Office Box 95404
25 09 CK, The Hague
to: Prime Minister of Malaysia Najib Razzaq
President of Russian Federation Vladimir Putin
German Chancellor Angela Merkel
Margaret Sullivan, Public Editor, The New York Times
Please allow me, a private citizen of the USA, to express my concern over the course of the investigation
into the shoot-down of MH17, which you are heading, and to provide input about certain aspects of the preliminary report that
was released to the public. To get right to the point, the dialogue between the control tower in Ukraine and the crew
aboard flight MH17 does not sound authentic, and this consideration strongly suggests to me the likelihood of cybernetic telecommunications
piracy as an element of the crime that is now under investigation. However, the worldwide corporate and governmental
culture of secrecy makes this troubling subject taboo. Moveover, the wall of silence in the newsmedia raises questions
of journalistic integrity. Without someone shouting a warning, the matter can easily be swept under the rug, and my
purpose in writing is to prevent this from happening. And so I make my presentation to you in the form of an article,
“Cybernetic Telecommunications Piracy,” submitted last month with a cover letter to the Op-Ed Editor of The New
York Times, both of which follow in the body of this e-mail. This article was not published, and I am unaware
of any other effort to shed light on this subject. Therefore I ask for your utmost attention to this matter.
Very truly yours,
San José, CA 95172
Op-Ed & Sunday Review Editor
The New York Times
620 Eighth Avenue
New York, NY 10018
I hereby submit exclusively to the New York Times my original 682 word article “Cybernetic
Telecommunications Piracy” with the hope that it will be published and read by your huge audience worldwide. A
copy follows this letter in this email, and another is attached as a Word document. The subject matter is in the public
interest, and I cannot think of any conflict of interest involving me personally. For your convenience I give two versions
of my article, the second having footnotes indicating sources for fact-checking. In the event that you do want to publish
my article, you may refer to me as an independent researcher who maintains a website at www.show-the-house.com; also, I have no phone so communication to create a final draft must be done by email.
Very truly yours,
Stephen M. St. John
Post Office Box 720274
José, CA 95172
Tel.: NSA (no such accessory)
© Stephen M. St. John 2014
There are at least two kinds of cybernetic
telecommunications piracy which are much, much more aggressive than the usual eavesdropping and surveillance once employed
by FBI Director J. Edgar Hoover and now, on a far greater scale, by the National Security Agency among others.
is telephonic or radio impersonation by real-time digital voice-morphing, and the other is unauthorized remote control of
systems such as an aircraft’s flight control system.
For the first, a surreptitious recording of the subject
person’s telephone talk results in a digital profile of his or her voice on computer software that can then use the
“voiceprint” to impersonate this subject person’s voice with astonishingly high fidelity. For example,
with the requisite preparation, the famous Lebanese female singer Farouz could dial the phone and sound exactly like, for
example, Syrian President Bashar al-Asad, whether to order an attack or just a pizza.
For the second, an electronic signal
can be directed at a Boeing jet flying according to flight plan and take control of the flight out of the hands of the pilot
or even of an automatic flight control system.
Both remote-control hijacking and impersonation by real-time
digital voice-morphing are inherently anonymous and undetectable. Such cybernetic telecommunications piracies are ways
to fabricate a provocation as a pretext for state action in support of a geopolitical strategy. For example, co-opting
the flight-control system as well as the communications system aboard Malaysia Airlines Flight MH17 may very well explain
how the jet so conveniently remained below its assigned altitude and veered to the left before it was blown out of the sky.
The Dutch Safety Board would do well to scrutinize the communications between Ukrainian Air Traffic Control and MH17 with
this possibility in mind. Did an impersonator slip in terms of knowledge and sense for the mission and give the game
On 9/11, for example, Mark Bingham allegedly called his mother from Flight 93 and said “Hello,
Mom, this is Mark Bingham”; such an unnatural utterance is an indicator of impersonation. Again, Edward Felt allegedly
called and told an emergency dispatcher that he had locked himself inside a lavatory aboard Flight 93 and was using his cell
phone to report an ongoing hijacking. Felt’s family confirmed his voice on a recording of the call which the FBI
played for them even though in 2001 such a cell phone call was technically impossible to make. How else can Felt’s
call be explained other than by impersonation through real-time digital voice-morphing?
Likewise, in the case of MH17 and
according to the preliminary report of the Dutch Safety Board which is charged with the investigation, we hear of the bizarre
and unexplained refusal of the pilot to air traffic control’s even more bizarre cue to rise 2,000 feet according to
a seemingly optional flight plan. Again, the Malaysia Airlines pilot’s request to veer left because of weather
conditions just happened to fit perfectly the scenario required for the criminals to carry out the shoot-down and promptly
assign blame. The real ringer – the experienced MH17 crew’s subsequent request to fly at a level normally
reserved for jets going in the opposite direction – is yet another strong indicator of carelessness on the part of an
impersonator co-opting the aircraft’s communications system with real-time digital voice-morphing.
these and other examples together and you see a pattern suggesting the practice of cybernetic telecommunications piracy to
stage events that influence the public’s attitude toward supporting war.
Cybernetic telecommunications piracy
is almost the perfect crime, and therefore it lurks as a real but hidden danger to the security and peace of all nations on
Earth. Attempts to curb the full-spectrum fraud and force of the USA’s Anglo-Zionist-Neoconservative-driven
foreign policies will require full disclosure and accountability regarding both the legitimate and nefarious uses of these
brilliant technologies as well as their associated risks. Where their use constitutes a ruse to commence aggressive
war, the perpetrators should be tried in The Hague according to the Nuremberg Principles, which hold that the initiation of
aggressive war is the supreme war crime because it engenders so many other war crimes.
(Text with footnotes indicating material supporting facts)
© Stephen M. St. John 2014
are at least two kinds of cybernetic telecommunications piracy which are much, much more aggressive than the usual eavesdropping
and surveillance once employed by FBI Director J. Edgar Hoover  and now, on a far greater scale, by the National Security
Agency among others .
One kind is telephonic or radio impersonation by real-time digital voice-morphing , and the
other is unauthorized remote control of systems such as an aircraft’s flight control system .
first, a surreptitious recording of the subject person’s telephone talk results in a digital profile of his or her voice
on computer software that can then use the “voiceprint” to impersonate this subject person’s voice with
astonishingly high fidelity. For example, with the requisite preparation, the famous Lebanese female singer Farouz could
dial the phone and sound exactly like, for example, Syrian President Bashar al-Asad , whether to order an attack or just
For the second, an electronic signal can be directed at a Boeing jet flying according to flight
plan and take control of the flight out of the hands of the pilot or even of an automatic flight control system.
hijacking and impersonation by real-time digital voice-morphing are inherently anonymous and undetectable. Such cybernetic
telecommunications piracies are ways to fabricate a provocation as a pretext for state action in support of a geopolitical
strategy. For example, co-opting the flight-control system as well as the communications system aboard Malaysia Airlines
Flight MH17 may very well explain how the jet so conveniently remained below its assigned altitude and veered to the left
before it was blown out of the sky . The Dutch Safety Board would do well to scrutinize the communications between
Ukrainian Air Traffic Control and MH17 with this possibility in mind. Did an impersonator slip in terms of knowledge
and sense for the mission and give the game away?
On 9/11, for example, Mark Bingham allegedly called his
mother from Flight 93 and said “Hello, Mom, this is Mark Bingham” ; such an unnatural utterance is an indicator
of impersonation. Again, Edward Felt allegedly called and told an emergency dispatcher that he had locked himself inside
a lavatory aboard Flight 93 and was using his cell phone to report an ongoing hijacking. Felt’s family confirmed
his voice on a recording of the call which the FBI played for them even though in 2001 such a cell phone call was technically
impossible to make . How else can Felt’s call be explained other than by impersonation through real-time digital
Likewise, in the case of MH17 and according to the preliminary report of the Dutch Safety Board
which is charged with the investigation, we hear of the bizarre and unexplained refusal of the pilot to air traffic control’s
even more bizarre cue to rise 2,000 feet according to a seemingly optional flight plan . Again, the Malaysia Airlines
pilot’s request to veer left because of weather conditions just happened to fit perfectly the scenario required for
the criminals to carry out the shoot-down and promptly assign blame . The real ringer – the experienced MH17
crew’s subsequent request to fly at a level normally reserved for jets going in the opposite direction   –
is yet another strong indicator of carelessness on the part of an impersonator co-opting the aircraft’s communications
system with real-time digital voice-morphing.
Put all these and other examples together  and you see
a pattern suggesting the practice of cybernetic telecommunications piracy to stage events that influence the public’s
attitude toward supporting war.
Cybernetic telecommunications piracy is almost the perfect crime, and therefore it lurks as a
real but hidden danger to the security and peace of all nations on Earth. Attempts to curb the full-spectrum
fraud and force of the USA’s Anglo-Zionist-Neoconservative-driven foreign policies will require full disclosure and
accountability regarding both the legitimate and nefarious uses of these brilliant technologies as well as their associated
risks. Where their use constitutes a ruse to commence aggressive war, the perpetrators should be tried in The Hague
according to the Nuremberg Principles, which hold that the initiation of aggressive war is the supreme war crime because it
engenders so many other war crimes .
Interview of former US Representative Neil Gallagher at http://larouchepac.com/node/28114;
 I think the revelations of Edward Snowden
are sufficient to establish this point;
As far as I am aware, this is the first and only article published in the mainstream on this subject: http://www.washingtonpost.com/wp-srv/national/dotmil/arkin020199.htm;
The website of System Planning Corporation, www.sysplan.com, gives examples of remote-control systems. My article “Cybernetic Telecommunications Piracy, The Boeing Company,
and the Missing Malaysia Airlines Flight MH370” lists air disasters where cybernetic telecommunications piracy is the
best explanation of what actually happened. Please see www.show-the-house.com/id117.html;
As a student of Arabic, I find that “Asad” is a better rendition into English than the commonly encountered “Assad”;
in the Arabic press I have never seen a doubling of the letter “s” in the Syrian President’s last name.
So I prefer “Asad” if that is not rocking the boat too much;
The Dutch Safety Board’s Preliminary Report on MH17, Section 2.1 History of the flight, provides the factual basis for
my speculative probing in this paragraph; you can download a PDF version of this report from the website of the Dutch Safety
Mark Bingham’s mother Alice Hoagland said this in an interview with KTVU which was broadcast by CNN and recorded and
published at http://www.youtube.com/watch?v=ryuYLUVX4VM;
Please see http://www.911myths.com/index.php/File:Team7_Box12_93Calls_EdFelt.pdf for background information on Edward Felt’s call; a Canadian university mathematics professor Kee Dewdney published
results of tests http://www.physics911.net proving that cell phone calls from speeding jets at high altitude were impossible to make as of 2001; see also http://physics911.net/cellphoneflight93/; also, a USAF public affairs officer manning a booth in Rockefeller Center at the 2003 outdoor Boeing exhibit commemorating
the 100th anniversary of the Wright brothers’ first powered flight responded to my question by saying that
he and colleagues conducted their own informal experiments with cell phones on military and commercial jets and found that
they did not work;
In the Dutch Safety Board’s Preliminary Report, 2.1 History of the flight, it is reported that twenty minutes before
contact was lost with MH17, the crew of MH17 “requested whether FL340 was available”; this was a very strange
request indeed if you consider that FL340 (Flight Level 340, or 34,000 feet) was reserved for jets going in the opposite direction.
The standard flight levels are basic knowledge known to all flight crews, even ones with just a modicum of experience inside
the cockpit. Please see 2.4.2 Standard flight levels and 2.6 Personnel information (regarding experience);
 Please see http://en.wikipedia.org/wiki/Supreme_crime; contents are paraphrased as "The guilt we should reach is not that of numberless little people, but of those who
planned and whipped up the war."
Follow-up letter of 19 March 2015 on GeoResonance press release:
Van: Stephen M. St. John [/firstname.lastname@example.org]
Verzonden: vrijdag 20 maart 2015 4:15
Onderwerp: 7 March 2015 GeoResonance Press Release on MH370
& its Relevance to MH17
Dr. Erwin Muller
Dutch Safety Board
Post Office Box 95404
25 09 CK, The Hague
19 March 2015
As a follow-up to my previous correspondence with the Dutch Safety Board regarding my theory
of cybernetic telecommunications piracy as an element of the crime that you are now investigating with respect to the shoot-down
of Malaysia Airlines Flight MH17, please let me point out an avenue of investigation that could possibly lead to the conclusion
that such piracy is part of a pattern including the mysterious disappearance of Malaysia Airlines Flight MH370; namely, the
recent (7 March) press release issued by the Australian high-tech exploration company GeoResonance (see www.georesonance.com).
I am not connected in any way with GeoResonance, and GeoResonance does not support in any way my theory of cybernetic telecommunications
piracy; the GeoResonance press release speaks for itself. But reading this GeoResonance press release (and previous
ones concerning MH370 as well), I cannot help but draw the conclusion that there is an official policy among the principals
involved in the search for MH370 to conceal a key discovery made by the scientists at GeoResonance. At the very least,
the work of these scientists, which is based on principles of quantum physics, deserves recognition and verification rather
than cover-up born of fraud and force and geopolitical considerations. Lessons learned about MH370 may very well shed
light on MH17, and vice versa. Therefore, in the best interests of obtaining the whole truth about MH17 and the proper
administration of justice, I urge the Dutch Safety Board to weigh and consider the claims being made by the scientists at
GeoResonance concerning MH370. If it turns out that they actually located MH370 shortly after it disappeared just over
a year ago, they will have also succeeded in exposing a corporate and governmental culture of secrecy and deceit! Thank
you for your attention in this matter.
With kind regards and best wishes for success in your most important work,
Stephen M. St.
Follow-up letter of 10 July 2015
on the vile Verizon corporation:
the Dutch Safety Board:
accept this belated reply to your own belated reply and apology which I readily accept but think hardly necessary in view
of the weighty matters that you must consider with great caution in your investigation of the shootdown of Malaysia Airlines
Flight MH17 almost a year ago. I appreciate knowing that my views are being seriously considered and thank you for it.
Cybernetic telecommunications piracy comprises ingenious high-tech methods of deception which have been developed over a long
period of time in a culture of governmental and corporate secrecy. But these capabilities have now grown wild as instruments
of fraud and force that threaten mankind with fabricated justifications for war. These methods of deception include
seizure of an aircraft’s flight control, communications and security systems by remote control as well as radio or telephonic
impersonation by real-time digital voice-morphing. Cybernetic telecommunications piracy is a new component of the old
doctrine of shock and awe, which is far worse than terrorism.
Let me add a personal note about myself and my motives. Back on 26 June 2015 I received
in my post office box an advertisement from Verizon which is addressed to my former boss, Marion Britton, and myself.
(A PDF file showing this advertisement is attached to this email for your perusal and use.) (This ad is reproduced below.)
Marion was the Assistant Regional Director of the United States Bureau of the Census in New York City and, according to the
official story, was killed on board United Airlines Flight 93 on the morning of 11 September 2001. I can assure you
that the last time I saw Marion was on 10 September 2001 and that our relationship did not extend beyond the official business
of the Census Bureau in which I served as a Field Representative in the survey division for over a decade; hence, there is
no plausibility whatsoever in connecting our names as possible customers in a Verizon advertisement nearly 14 years after
her alleged death. Furthermore, the news media stories put out about Marion’s alleged cell phone and air-phone
calls do not make sense to me at all unless one entertains the possibility of impersonation by real-time digital voice-morphing.
As you will recall, in my opening communication with the Dutch Safety Board I cited two other examples from United Flight
93 that strongly suggest impersonation by real-time digital voice-morphing. Other examples abound, which only leave
us with unanswered questions and lessons not learned. Whatever the case, this Verizon advertisement is a mean-spirited
mind game or sick joke by an unknown person or persons in a multinational telecommunications corporation that no doubt is
part of the 9/11 cover-up. Who would know better how news media personnel obtained such quick access to bogus calls
giving lurid details about terrorists which then became headline news and justification for war? I share this information
with you because this Verizon advertisement illustrates the mind-set that we are dealing with -- you in your official capacity
to investigate the downing of MH17 and I in my personal struggle to uncover the truth about 9/11. I call our adversary
the Praxis of Evil.
Very truly yours,
Stephen M. St. John
back to contents
* * * * * * *