Metatron

Letters to the Dutch Government on the 2014 Shoot-down of Malaysia Airlines Flight MH17 over Ukraine

Home
A Cyborg Burger for King Charles: An E-meal fit for an Emperor & his digital Nomads
REAL JOURNALISM: Something BIG is missing from John Durham's Russiagate Probe
Something BIG is missing from John Durham's Russiagate Report
11 September 2021: A Day of Remembrance & Resolve
A Call to put Trump before an International 9/11 Nuremberg Tribunal
Slam the BREXIT Door shut on the Warmongers with an International 9/11 Nuremberg Tribunal
Lifting the Burdens of Falsehood & Deceit: Open Letters on 9/11 to the Attorneys General of the USA
Trump-Mueller-Giuliani 9/11 Conflicts of Interest
Mueller-Trump Conflict of Interest: An Opening for a 9/11 Nuremberg Tribunal
Trump-Mueller Conflict of Interest
Preventing WWIII with a 9/11 Nuremberg Tribunal
CONTACT
Hierosolyma: An Eight Part Peace Proposal for Greater Jerusalem
Beth El Is the Correct, Prophesied Location for the Real Israel's Next Temple
Constitution of the USA Offers Model Legal Mechanism for Conflict Resolution Among Nations
An Eight Part Peace Proposal for Greater Jerusalem Copyrights
SUBMISSION TO THE LAST SAVIOUR FESTIVAL BEING HELD IN TEHRAN, IRAN
ERSATZ ISRAEL: On those who say they are Jews, but are not.
KHAZARS from the Encyclopedia Britannica, 11th edition
TALMUD AWARENESS
The Talmudic Law of the Moser
Julius Rosenberg & the Talmudic Law of the Moser (Informer)
FAX BROADCASTS 2009
Fax Broadcasts 2005 & Before
Fax Broadcasts 2006
Fax Broadcasts 2007
Fax Broadcasts 2008
Letter to Chief Justice Rehnquist on George H. W. Bush & the JFK Assassination, 31 January 2005
Primary Documentary Evidence Showing Bush in Dallas & helping Jack Ruby spin Oswald's public Persona
USS Liberty Survivor fights for Truth, Justice & End of Cover-up
USS Liberty Incident: "The Missing Piece of the Middle East Peace Puzzle"
USS Liberty Documentary
US Army Intelligence Officer reveals Suppression of Analysts' Findings on USS Liberty Incident
FLASHBACK: Peled statement that 1967 Six Day War was in effect Dayan's "private venture"!
Arabic Numerals
Complaint of Judicial Misconduct against U.S. Bankruptcy Court Judge A. Jay Cristol
Petition for Review of Chief Judge's Dismissal of Complaint
Letter of advice to the clerk of the court:
Letter of request to clerk of the court for permission to donate case file
Reply to court's request for inventory of documents to be donated.
Follow up to edit court's summary of inventory of documents to be donated.
Letter to Rush Limbaugh on the 15th Anniversary of 9/11
A 9/11 Timeline within a 9/11 Timeline
Submission to the House of Lords Select Committee on Communications
The Praxis of Evil's Other Form of Telecommunications Hacking
The extraordinarily strange Odyssey of Professor Peter Bowal
Eyewitness Account of Judicial Conference on morning of 11 September 2001
9/11: Another Look
A Dissenting Critique of the 9/11 Commission Report
The Mastermind Behind 9/11?
Complaint to FCC on CNN's Bias Against "9/11 Truthers"
8 June 2012 Letter to District Attorney in San Jose, California
Open Letters on 9/11 to Attorney General of the USA Michael B. Mukasey
Certified Letter to US Attorney General Michael B. Mukasey
Open Letters on 9/11 to the Attorney General of the USA Eric Holder
Highly Recommended Documentary Films on 9/11
Alex Jones's Interview with Colonel Donn de Grand Pre
Barbarians Inside the Gates
Schlock & Awe on Top of Shock & Awe: NIST Report on WTC 7
President Bush twice said he saw the first jet hit the north tower World Trade Center 1
9/11 Dutch Treat?
Was 9/11 an Inside Job?
Citizen Investigation Team
911 Index
ARTICLE RETRACTED: "Dulles Airport" Shadow casts Doubt on US Government's 9/11 Conspiracy Theory
Letter to Chief Judge William B. Traxler, Jr., U. S. Court of Appeals, 4th Circuit, Richmond, VA
ARTICLE RETRACTED: "Dulles Airport" Shadow disproves US Government's 9/11 Conspiracy Theory
Complaint against US Department of Justice et al. for 9/11 Fraud UPDATED 24 MAY 2010
USCA, 2nd Circuit, 10-3022
St. John v US DoJ et al. Plaintiff-Appellant Brief
Petition for Rehearing En Banc
St. John v. Attorney General of the USA
Double Crossing Liberty
Lebanon's Cedar of Truth
US President Barack Obama's True Citizenship Status and Eligibility to be President Still Unresolved
Letters to the Ambassadors of Kenya & Indonesia on Barack Obama's Qualifications to be US President
USAF EC-135N & EGYPTAIR Flight 990: Precursors of Remote Controlled Flights of 9/11?
USAF EC-135N ACCIDENT INVESTIGATION REPORT
In Memoriam: Yitzhak Rabin, Peacemaker
Eidelberg Column in The Jewish Press argues for the Overthrow of the Rabin Government
Incitement for Assassination of President Asad is in Violation of the Law!
Letter on Newt Gingrich's Law of the Jungle
TWA Flight 800 Ten Years On
Photo of Cruise Missile that shot down TWA Flight 800
Cybernetic Telecommunications Piracy, The Boeing Company, & the Missing Malaysia Airlines Flight 370
Letter to Putin
Letters to the Dutch Government on the 2014 Shoot-down of Malaysia Airlines Flight MH17 over Ukraine
Virginia Tech Massacre: Any Lessons Learned?
Mughniyah Assassination coincides with Brzezinski/Rand Corporation Visit with Asad in Damascus!
Hear, oh Muslims! Hear!
In Memoriam: Helen Thomas, an honest, fair, accurate and courageous journalist
Alex Odeh Assassination File
Alex Odeh Assassination File: The Cartoon
New Olympic Event: Georgian Tie Eating
Hollywood Black Bag Job on the Iranians
FLASHBACK! Letter to Warren Christopher on NY Times Golan maps & Golan wine, dated December 29,1992
Editors of The Jewish Press compared President of the USA with Pharaoh back in 1998!
Stephen M. St. John for President of USA 2012
Governors Island in New York Harbor: Site of UN Military Staff Committee Headquarters?
Corporate Advertising on Legal Tender. Mind over Matter. Mind over Money. Mind over Deficit!
Magi Blowout Sale! Xmas Jingle, Middle East Peace & Security for Ersatz Israel!
Historic Schlesinger Letter points to Angleton/Eliot Same Man Theory!
Letter from Arthur Schlesinger Jr.
Letter to Arthur M. Schlesinger, Jr.
E-mail to BBC's Rowena Thursby concerning Dr. David Kelly, Princess Diana & CIA's Angleton/Eliot
Broadsheet protesting "Shock & Awe" Attack on Iraq
March 2001 Fax on Angleton/Eliot Same Man Theory
BLOODY BUSH CABAL BROUGHT US DALLAS 1963; WATERGATE 1972; BEIRUT 1982; BAGHDAD 1991 & 2003
2 February 1989 Reply from Princess Diana's Lady-in-Waiting Anne Beckwith-Smith
Letter to Mary Jo White on Jonathan Pollard & Marc Rich
Correspondence from the British Royal Family and British Government regarding my peace proposal.
British Bombers dressed as Arabs and caught in the Act!
Judith Miller on Joseph M. Demarest, Jr.
Will? Is that you, Will?
Red Heifer Sighted?
Jesus: Don't be called "Rabbi"! Call no man "Father" on this earth!
Is Harry Potter hawking the British Coronation Throne?
Bowl of Stupid
Why doesn't the City of San Jose fly the national flag according to the law?
Resumes
Letter of Recommendation from Dr. Frank Przetacznik
1993 Letter from Government of Lebanon
CONTACT
To be announced!
To be announced soon!
US Rewards for Justice: An International 9/11 Nuremberg Tribunal
Rewards for Justice & an International 9/11 Nuremberg Tribunal

Updated 30 December 2019
 

Tweede Kamer Der Staten-Generaal
Postbus 20018, 2500 EA Den Haag
The Kingdom of the Netherlands

26 December 2019

Dear Members of the Tweede Kamer,

My criticisms (2016) of the final report of the Dutch Safety Board (2015) on the unfortunate demise of Malaysia Airlines Flight MH17 (2014) were entertained last month by the Tweede Kamer's Standing Committee on Justice and Security, which, on 8 November 2019, decided "to refrain from taking any further action and to leave any further initiatives to the individual Members of Parliament themselves."

In light of this decision, kindly let me, a private citizen of the United States of America, urge each and every Member of Parliament to approach this very serious matter in a broad historical context.  Not unlike Antonie Philips van Leeuwenhoek, this Parliament is now poised to probe another unseen world of cybernetic telecommunications and their hidden dangers.  Nefarious use of such brilliant technologies constitutes a real threat not just to the flying public but to peoples and nations.  In this regard, I refer you to the statement of Ansgar Rieks, head of Germany's Military Aviation Authority, who confirmed that hostile hackers could commandeer a military plane's systems and operations from the ground (2017).  General Rieks remarked that ignoring this danger "would amount to gross negligence."

Here let me ask each Member, how more so negligent would it be to ignore the risks of such hostile hacking on commercial aviation?  Governmental and corporate secrecy laws and policies cloak such risks and can be best penetrated by an International 9/11 Nuremberg Tribunal where, among others, former FBI Director William Mueller will explain impossible-to-make cell and airphone calls from passengers on allegedly hijacked jets on 9/11, and where former FBI high official John Baker will explain how the National Security Agency and Verizon both failed to trace these fake news calls to their real sources.

A pattern of deception has emerged from well before 9/11 and, of course, the conspirators and their conspiracy theorists continue to disturb global peace to this day as you read in the news.  Those who suffer at their hands, including the victims of MH17, remind us that the pursuit of truth and justice is always of paramount importance, not just "six days from Sunday."  So I wish for all of you wise decision-making.  In my opinion, you must solve the shock & awe war crimes of 9/11 or you will not solve MH17.

An International 9/11 Nuremberg Tribunal will be like playing a double game with Pharaoh's magicians, as these highly advanced electrical engineers and their international handlers are very clever people.  You can start the ball rolling toward fair trials based on facts and law at a duly established tribunal.

Very truly yours,
Stephen M. St. John
Post Office Box 720274
San José, CA 95172 USA
stephen@show-the-house.com


* * * * * * *

 
A 9 October 2019 Reuters report about the unanimous vote of the Dutch Parliament (Tweede Kamer) to open an investigation into the July 2014 shootdown of Malaysia Airlines Flight MH 17 prompted me to send to the Dutch MPs copies of my 2016 Critique of the Dutch Safety Board's 2015 Final Report.  This DSB Final Report made serious errors and omissions but was accepted as the foundation for the subsequent criminal investigation, the Joint Investigation Team (JIT).  The official replies right below make me hope that new directions will be taken and leads followed by competent authorities.
 
 Tweede Kamer Cie J&V Reply 8 November 2019 MH17
 
 20191021TweedeKamerReply.jpg
 
 
 Updated 31 October 2016
Critique -- with Recommendations -- of the Dutch Safety Board's October 2015 Final Report on the Shootdown of Malaysia Airlines Flight MH17
 
Strange communications between Ukrainian control tower and flight deck of MH17 strongly suggest cybernetic telecommunications piracy in the forms of high-tech radio impersonations and remote-control of the aircraft to the desired location for the shoot-down.

Dutch Safety Board
T. H. J. Joustra, Chairman
E. R. Muller
M. B. A. van Asselt
Anna van Saksenlaan 50
2593 HT The Hague   The Netherlands

Copies to:

The Joint Investigation Team
Frederick Westerbeke
Wim de Bruin
The Joint Investigation Team

International Civil Aviation Organization
Dr. Fang Liu, Secretary General
999 Robert-Bourassa Boulevard
Montréal, Quebec H3C 5H7   Canada

International Air Transport Association
Alexandre de Juniac, Director General & Chief Executive Officer
800 Place Victoria Post Office Box 113
Montréal, Quebec H4Z 1M1   Canada

et al.

31 October 2016

Ladies & Gentlemen:

Let me, a private citizen of the United States of America who is concerned about airline safety in an increasingly complex and dangerous world, comment on the Dutch Safety Board’s final report of October 2015, Crash of Malaysia Airlines flight MH17, Hrabove, Ukraine, 17 July 2014, which is published at http://www.safetyboard.nl.  My October 2016 Critique – with recommendations -- of the Dutch Safety Board’s final report on the shootdown of Malaysia Airlines Flight MH17 is published today, 31 October 2016, on my private website at http://www.show-the-house.com/id119.html.

I believe that only truth and justice will properly honor those who were killed aboard Flight MH17 and bring a degree of comfort to their bereaved loved ones as well as lessons learned for the competent authorities.  I hope that the recommendations and criticisms that follow will help to provide a framework for evaluation of the recently released interim report on the criminal investigation of the Joint Investigation Team comprising representatives of Australia, Belgium, Malaysia, the Netherlands & Ukraine on 28 September 2016.  I’d be most grateful to know that my efforts will have turned a stone that has not yet been turned in the criminal investigation, come what may.

So let me proceed with these criticisms of your final report with frank acknowledgements that it is too easy to criticize and that only candor and good will can make criticisms constructive.  I am thankful for the education that you have provided me in your report.  Yet there remain certain things that still need to be said about space warfare and electronic warfare and cybernetic telecommunications piracy; these heavy electromagnetic influences endanger those who fly commercial, civil and military flights and may very well be an element of the heinous crime committed against Malaysia Airlines and humankind on 17 July 2014.  But as you ended your final report with recommendations, let me start my critique with recommendations.  For easy navigation, a clickable table of contents follows in this email letter.

Very truly yours,
Stephen M. St. John

Post Office Box 720274
San José, California 95172
stephen@show-the-house.com

 

* * * * * * *

 

Critique – with recommendations --
of the Dutch Safety Board’s
final report on the shootdown of
Malaysia Airlines Flight MH17

 

CONTENTS
Recommendations:
United Nations Military Staff Committee
Recognition Codes
Threat Assessment Terminology
Expansion of ICAO’s Annex 13 to 13A & 13B
Critique
Calling Things by their right Names
Loss of GPS over Ukraine prior to MH17 Shootdown
Weapon used in MH17 Shootdown
Weather
CVR & Cybernetic Telecommunications Piracy
Transparency etc.
Reflections:
Cui bono?
Previous Letters to the Dutch Safety Board:

 

RECOMMENDATIONS:

1. United Nations Military Staff Committee

Where you say in your foreword, “The aviation sector should take urgent measures to identify, assess and manage the risks associated with flying over conflict zones more effectively,” and that “the ball is now in the court of the states and the aviation sector,” I wish to point out that the only competent authority to take on this task on behalf of, and in coordination with, states and the aviation sector worldwide, is the United Nations Military Staff Committee.

Articles 26 and 47 of the Charter of the United Nations include “the regulation of armaments” in the mandate of the Military Staff Committee; it is therefore fitting that Notices to Airmen (NOTAMs) on the risks associated with flying over conflict zones worldwide be issued by the United Nations Military Staff Committee both to states and aviation sector operators for the benefit of all mankind, particularly those states and operators whose limited resources would otherwise increase their vulnerabilities to blind-spotted assessments on their uses of foreign airspaces.

Who can best keep track of who possesses what weapons and where do they store and deploy them on a global scale?  Answer:  the United Nations Military Staff Committee!  Intelligence gathering of this sort, especially intelligence gathering pertaining to space warfare, electronic warfare, and cybernetic telecommunications piracy, is intrinsically above and beyond the competency of civilian airline operators and even, I dare say, most states.  Why burden them with such tasks, which are really beyond most states’ abilities to accomplish satisfactorily, as you suggest [10.6 Supporting conclusions (flying over conflict zones), 1. Airspace management, d., PDF 262/279]?  Who, then, can best coordinate the requisite information-sharing between states and operators?  The United Nations Military Staff Committee!  Who can best close the gaps between the various responsibilities of those charged in these matters of risk assessment and decision making?  The United Nations Military Staff Committee!

In short, the United Nations Military Staff Committee will provide the “fixed structure” that you desire to make consultation most valuable:  “This increases the likelihood that parties assess conflicts from a mutual perspective and that an integrated risk assessment occurs.”  With the United Nations Military Staff Committee, such consultation, of course, will be on the international level, and not just on the national level.  [8.5 Analysis, PDF 243/279]

The United Nations Military Staff Committee is a creature of the United Nations Security Council.  In the past, I, a private citizen of the USA, have identified the need to raise the level of commitment of the United States to the principles and purposes of the United Nations.  Toward this goal I have proposed that Governors Island in New York harbor be made available for the formal headquarters of the United Nations Military Staff Committee as well as the campus for the first international military academy for military professionals from around the world.  [Please see http://www.show-the-house.com/id64.html]

Now the urgent need for a central information clearinghouse for timely and reliable information for threat and risk assessments and decision-making on the dangers of conflict zones to the aviation community worldwide makes such an expansion of the United Nations Military Staff Committee’s mandate more desirable than ever.  The Military Staff Committee can provide the structure for coordination of activities described in Appendix P of your final report, Developments Relevant to the Investigation, to bring together nation states, air operators, the International Civil Aviation Organization, and the International Air Transport Association, inter alia, in their common endeavor to achieve air safety.  The Russian Federation’s concern that the ICAO lacks leverage to coordinate military and civilian authorities will have been obviated. [Appendix W, Consultation B, PDF 16/28] This new air safety function of the Military Staff Committee will raise the profile and prestige of the United Nations Organization and its associated agencies to new heights.  This new air safety function of the Military Staff Committee will happily channel energy out of Chapter 7 of the Charter of the United Nations into normal peacetime operations for the benefit of mankind.  Vigilance will be the new byword for the Military Staff Committee, which will serve and protect as a watchman for mankind.

Let me add that Governors Island is deeply rooted in Dutch history as well as the history of the United States, and this historic military landmark promises to continue to be a vibrant symbol of the evolution of American power from colonial times through the preservation of the Union after the American Civil War to the final point where the USA will lead only as a sovereign equal among sovereign equals in the worldwide assembly of nations with full respect for boundaries, sovereignties, internal affairs of states, and international law.

back to contents

 

2. Recognition Codes

States and air operators must develop their own unique and original in-house recognition codes as a counter-measure against impersonation by real-time digital voice-morphing, which is a kind of cybernetic telecommunications piracy where the communications system of an aircraft can be taken over by an outside agency or system.  Currently, such cyber attacks are inherently deniable and unattributable; i.e., they constitute the perfect crime.  Well, you have to believe, almost the perfect crime!

First, in order to understand the need for such recognition codes, it is imperative that all interested parties take a walk in the shoes of Edward Felt for a very valuable lesson to be learned.  Edward Felt was a passenger on United Airlines Flight 93 on 11 September 2001.  John Shaw was the emergency dispatch operator on the ground who took a call from Edward Felt.  Shaw said that Felt told him that there was an on-going hijacking aboard United Flight 93 and that he had locked himself inside a lavatory where he was using his cellphone to make the call. [https://catalog.archives.gov/id/2608288]  The problem with this scenario is that cell phone calls were impossible to make with the technology available on commercial jets in 2001.  The cell phone signal cannot transfer from cell tower to cell tower on the ground because the jet is going too fast.  Furthermore, there is no chance of confusing a cell phone call with an air phone call because air phones are not installed in lavatories of commercial jets.  (There is doubt that there were any air phones anywhere on Flight 93.)  Moreover, the fuselage acts as a kind of Faraday cage to impede electronic signals, and the lavatory itself is a kind of Faraday cage inside a kind of Faraday cage.  And yet, John Shaw somehow did receive this somewhat lengthy but technologically impossible call from a man claiming to be Edward Felt on board the hijacked United Airlines Flight 93.  What is more, the Federal Bureau of Investigation (FBI) of the US Department of Justice played a recording of this impossible Felt-Shaw phone call for Felt’s wife and daughters, all of whom confirmed they heard the voice of Edward Felt.  How can this be explained?

Impersonation by real-time digital voice-morphing is the only logical explanation for the Felt-Shaw phone call described above.  What happened to Felt very likely also happened to other passengers and personnel inside the cockpits of the alleged flights of 9/11.  Real-time digital voice-morphing is at once both a brilliant and a diabolical technology whereby a person’s voice can be duplicated with very high fidelity for use in real time.  The targeted person’s voice is recorded, usually surreptitiously in a telephone conversation.  The recording is digitized and functions inside the software as a “sound print” that is unique, like a fingerprint, to the targeted person.  Then the software is connected to a phone or radio, and the impersonator using this software will sound exactly like the targeted person on the phone or radio.  So, as an imagined example, the great female Lebanese singer Farouz could call anybody and sound exactly like, say, Syrian President Bashar al Asad!  The possibilities stagger the imagination, be it a situation where the enemy can be deceived in warfare, or a criminal can manipulate his victim or set up a person for entrapment by law enforcement, or intelligence agents can seed a revolution or have a  Cockpit Voice Recorder establish a false dialogue and narrative for investigators.  If you own a phone, the National Security Agency (NSA) owns your voice and can weaponize your voice if it so desires!

In the cockpit in real time, recognition codes employed exclusively by pilots and other airline personnel who have a need to know will help, if such occasion arises, to confirm the authenticity of the dialogue contained on the Cockpit Voice Recorder.  If, for example, a certain tone or number or combination of numbers, letters and tones is repeated every 15 seconds, and, in an “accident” investigation it turns out that such tone or number or combination of numbers, letters and tones is not heard on the CVR, then the airline will know that the recording on the CVR is not authentic.  The recognition codes will protect the airlines from a fraudulent narrative that is developed from the CVR in the course of the investigation.  I am sure that the human imagination is capable of creating from many diverse cultures many different expressions of useful recognition codes.  The physical source of the recognition codes should be entirely independent of the plane’s electrical system, which can be ingeniously hacked.  An old-fashioned battery-powered cassette recorder would do nicely.  A live singer would be best.

Real-time digital voice-morphing is a very real phenomenon, yet it remains virtually unknown to the general public.  My awareness of this new danger to mankind for which I am most thankful comes from the pioneering 9/11 research of Alexander Keewatin Dewdney of Canada, whose website http://physics911.net/ is very highly recommended.  The only mainstream media report on real-time digital voice-morphing of which I am aware comes from a February 1999 Washington Post article at http://www.washingtonpost.com/wp-srv/national/dotmil/arkin020199.htm.

Real-time digital voice-morphing and remote-control piloting of an aerial vehicle are two types of cybernetic telecommunications piracy which are much, much more aggressive than mere eavesdropping and data collection; their underlying science is highly advanced electrical engineering.  A short history of instances where my theory of cybernetic telecommunications piracy offers the best possible explanation for incidents in the air that have occurred as far back as 1981 is contained in my own article Cybernetic Telecommunications Piracy, The Boeing Company, & the Missing Malaysia Airlines Flight MH370 at http://www.show-the-house.com/id117.html.  As a regular news watcher with a natural curiosity, I have noted these incidents and, having detected a pattern, felt compelled to write about them beginning in 1999 right after the EgyptAir 990 disaster.  Zionist motive, means and opportunity are factors in nearly all of these incidents.  In the beginning I believed these phenomena were peculiar to Boeing jets only, but later developments suggest that this is not so.  I have followed my instinct, which is, if you see something, say something.  This is now the motto of the US Department of Homeland Security.  But there are certain things they don’t want to hear!

back to contents

 

3. Threat Assessment Terminology

With reference to the recommendation of the Dutch Intelligence & Security Services Inspectorate (CTIVD) that the Military Intelligence & Security Service (MIVD) and the General Intelligence & Security Service (AIVD) align their separate terminologies that they use to describe threat factors (intention, capacity and activity for the military MIVD and capacity, potential and intention for the civil AIVD), let me recommend the factors of motive, means and opportunity for this purpose.  [8.3.2, the tasks of the AIVD and the MIVD, PDF 236/279, and Appendix T]

back to contents

 

4. Expansion of ICAO’s Annex 13 to Annex 13A & Annex 13B

The International Civil Aviation Organization (ICAO) needs to expand its Annex 13 guidelines for investigations of “accidents” and “incidents” to include Annex 13A for obvious terrorist acts committed against civil aviation and Annex 13B for shock and awe acts against civil aviation committed by state sponsored entities or their private armies or contractors or mercenaries or other associates far and near.  Doing so will alleviate the severe mental torture of the victims’ families, friends and associates who must endure repeated references to “accident” and “crash” to describe the cold-hearted murders of their loved ones.  Such proposed restructuring of the guidelines will emphasize that the carrier, in this case Malaysia Airlines, is as much a victim of a crime as anyone on board the doomed jet.  It is good to call things by their right names.

back to contents

 

* * * * * * *

 

CRITIQUE:

Here let me offer my criticisms of the Dutch Safety Board’s final report on the shootdown of Malaysia Airlines Flight MH17.  Again, I hope that these criticisms will help to provide a framework for evaluation of the recently released interim report on the criminal investigation of the Joint Investigation Team on 28 September 2016 and to provide other avenues of investigation.

Calling Things by their right Names

The first deficiency of your final report is your repeated use of the words “accident” and “crash” and “incident” to describe what was a heinous crime.  Annex 13 to the Chicago Convention, which created the International Civil Aviation Organization, and the Kingdom Act Dutch Safety Board, apparently lock you into this “accident” terminology. [MH17 About the Investigation, 1.3 Legal framework, PDF 12/99] This watered-down word for a deliberate attack strikes me as the Madison Avenue lingo of the lawyerly class, and in this regard let me bring to your attention how much the late Soviet spy Kim Philby rightly deplored the Central Intelligence Agency’s heavy recruitment from the advertising industry.  Shootdown (also spelled shoot-down) is the word you wanted.  There was no need to bend minds in this regard with softer words like “accident” and “crash” and “incident.”  “Crash” and “incident” are somewhat neutral words, but the word “accident” actually implies pre-judgment by any investigation!

The second deficiency of your final report is your failure to to condemn the shootdown.  Setting down words to describe whoever would commit such a heinous crime would have been appropriate and well within the limited scope of your inquiry to promote safety with lessons learned and not to assess blame.  Psychopathic criminals with ultra high-tech equipment and a mandate from God to divide and conquer and rule the world are as dangerous to aviation as a loose screw, nut or bolt or hail that can crack a windshield or a goose getting caught in the engine intake!

The third deficiency of your final report is your failure to consider Malaysia Airlines a victim of the attack on Malaysia Airlines Flight MH17.  You come halfway in acknowledging this deficiency where you admit that Dutch authorities refused active input of Malaysia Airlines with respect to transfer of information regarding the passengers who were on board MH17. [Passenger Information 4.6.2, PDF 63/98]  It seems that the Malaysians were whacked physically, economically and socially!  Why?!?

The fourth deficiency of your final report is your antiquated conception of what is a conflict zone.  Yes, it can be said that there was fighting going on in eastern Ukraine, and that there was a conflict zone extending gradually higher and higher into the air.  But in this modern age of space warfare and electronic warfare and cybernetic telecommunications piracy, a conflict zone can begin between one’s ears and extend infinitely along x, y and z axes.  If you eat the right mushroom, there may be more dimensions than you can bargain for!  Four is enough for me for the time being.  We need to be aware of the powerful electromagnetic influences around us, and how they can, from land, sea, air or space, play havoc with the navigation and communications of commercial, general, and military aviation.

The fifth deficiency of your final report is your failure to mention my unique and original theory of cybernetic telecommunications piracy as a new and hitherto unacknowledged danger to the civil aviation sector as well as a possible contributing factor in the shootdown of Malaysia Airlines Flight MH17.  I expressed my theory of cybernetic telecommunications piracy in letters emailed to the Dutch Safety Board which are now published on my private website at http://www.show-the-house.com/id119.html.  Your inclusion of my theory in your final report would have been in accord with your own advice given in your foreword:  “Risk assessments should not only focus on phenomena that have threatened civil aviation in the past but also devote attention to new and thus unfamiliar threats in a changing world.  The challenge is to stimulate the imagination of the parties concerned in such a way that improbable scenarios are also at the forefront of their minds and receive sufficient attention” [Foreword, a blind spot in the risk assessment, PDF 8/279].  You had the perfect opportunity to break the corporate and governmental wall of silence and of shunning by warning the peoples of this earth about the clear and present danger of cybernetic telecommunications piracy, but you blew it!  Everything is still under control.  At this juncture, I can only hope that the Joint Investigation Team will finally take this grave matter into account and give it their utmost attention.

The sixth deficiency of your final report is the understated bias which is revealed in the following statement concerning the intentions of the Russian armed forces, the Ukrainian armed forces and the Separatists:  “However, unlike the other two actors, the Separatists were not a homogeneous group.  They were composed of factions with different specific objectives and working methods.  It was clear, however, that the Separatists all shared the intention to shoot Ukrainian air force fighter aeroplanes and helicopters out of the air.”  [Appendix T, Report of the Dutch Review Committee for the Intelligence and Security Services, 5.2 MIVD’s degree of knowledge, The intentions of the Russian armed forces, the Ukrainian armed forces and the Separatists, 25/38, PDF 140/176]  Such use of the word homogeneous, which means consisting of parts all of the same kind, implies that a certain faction among the Separatists may have had a different agenda conducive to a working method which included shooting down a civilian airliner or at least shooting at Ukrainian jet fighters at heights where civilian airliners fly.  Furthermore, it is simply not the case that the Ukrainian armed forces were totally homogeneous.  The Governor of Dnipropetrovsk, whose Air Traffic Control had last contact with MH17 right before the shootdown, was an ardent Zionist known to have had the functional equivalent of a private army at his disposal.  Ukraine’s Acting President Oleksandr Turchynov , who took office right after an illegal and violent coup d’état against his democratically elected predecessor on 22 February 2014, made Ihor (Igor) Kolomoysky the Regional Governor of Dnipropetrovsk on 2 March 2014, but President Petro Poroshenko removed him on 24 March 2015 during your investigations leading to this final report.  What you said about the Separatists, that they had “different specific objectives and working methods,” can just as well be said about Ukrainian armed forces and Ihor Kolomoysky’s faction that functioned like a private army inside Ukraine.

back to contents

 

Loss of GPS over Ukraine prior to MH17 Shootdown

The seventh deficiency of your final report is your failure to sense the implications of the Malaysia Airlines briefing note, dated 17 July 2014, on reports dating back to late April 2014 of loss of GPS signals over Ukraine from “several flights” prior to the shootdown of MH17 on 17 July 2014 (NOTAM information, Appendix D, PDF 33/176).  Repeated loss of GPS suggests a pattern of unlawful flight interference.  This is a red flag.  Illegal flight interference coming repeatedly from a known conflict zone is another red flag.  Illegal flight interference coming repeatedly from a known conflict zone is also a manifestation of electronic warfare.  Electronic warfare is consistent with my theory, previously expressed in letters to the Dutch Safety Board, that cybernetic telecommunications piracy may have played a role in the attack on MH17.

The eighth deficiency of your final report is your listing of the aforementioned internal Malaysia Airlines advisory (“briefing note”) on loss of GPS over Ukraine in Appendix D (PDF 33/176), which is a listing of Notifications to Airmen, otherwise known as NOTAMs.  This internal Malaysia Airlines advisory is of an entirely different nature than a NOTAM.  A NOTAM has comparatively wider distribution in the aviation sector, whereas the Malaysia Airlines briefing note was restricted to Malaysia Airlines personnel.  This internal Malaysia Airlines advisory needed to be highlighted by the Dutch Safety Board; instead it was merged into a list of routine NOTAMs where it really does not belong and does not get the attention it deserves.  Unlawful flight interference as a precursor of the shootdown of MH17 needs to be weighed and considered as a contributing factor of the crime.  Were the criminals calibrating their equipment on other Malaysia Airlines flights prior to the shootdown of Malaysia Airlines Flight MH17?

The ninth deficiency of your final report is your unsubstantiated reference to “other operators” who experienced loss of GPS and SatCom over Ukraine.  You maintain that “Malaysia Airlines received signals” from these other operators. [7 Flying over Ukraine:  What did Malaysia Airlines and others do? 7.5.3, PDF 219/279]  What “other operators” and what kind of “signals” are you talking about?  The internal Malaysia Airlines advisory (“briefing note”) about loss of GPS over Ukraine does not refer to “other operators” but instead mentions “other flights” that experienced loss of GPS over Ukraine.  The internal Malaysia Airlines advisory does not mention any loss of SatCom at all.  Without further information and clarification, the known circumstances tend to indicate that Malaysia Airlines was singled out for loss of GPS over Ukraine at various times prior to the shootdown of MH17.  Vague reference to “other operators” lessens the impact of unlawful flight interference specifically against Malaysia Airlines and Malaysia Airlines alone in the months and weeks leading up to the shootdown!

The tenth deficiency of your final report is your failure to ask why Malaysia Airlines or, indeed, any of these putative “other operators,” didn’t report this unlawful flight interference (loss of GPS and SatCom) over Ukraine so that proper warning about it could be made to the aviation sector through NOTAMS.  Selective warning to a chosen airline prior to disaster is a scary thought!  Psychopaths with ultra high tech means and a mandate from God to commit the perfect crime can tell themselves “we gave them enough warning to stay away by fiddling with their GPS and they didn’t pay attention to our warning so it’s not our fault when we went ahead with our plan to use lethal force.  They should have known better and taken another route.”  On the other hand, ignorance among pilots about the dangers to aviation from space warfare and electronic warfare could very well explain the failure to sound the alarm throughout the aviation sector about a pattern of unlawful flight interference over Ukraine prior to the shootdown of Malaysia Airlines Flight MH17.  Such ignorance regrettably arises from the wall of silence and shunning built around the topic of cybernetic telecommunications piracy by corporate and governmental entities.

The eleventh deficiency of your final report is the inconsistency displayed in your presentation [PDF 219/279], where you say, “In April 2014, Malaysia Airlines received signals from other operators that the satellite communication (SatCom), and possibly also GPS, may be disrupted in Ukraine’s airspace.”  Whereas the Malaysia Airlines “briefing note” [Appendix D] mentions only loss of GPS and not loss of SatCom, and here you say “loss of SatCom” and “possibly also GPS,” one is left wondering, well, which is it?  In the given contexts, “SatCom” and “GPS” are not one and the same thing.

The twelfth deficiency of your final report is your recurring inconsistency in dealing with the internal Malaysia Airlines briefing note where you say, “On 28 April 2014, Malaysia Airlines introduced briefing note MAS00083/14 regarding the possible loss of Global Positioning System (GPS) signals in Ukrainian airspace. [2.8 Aids to Navigation, PDF 35/279]  Again, one is left wondering, well, which is it?  Possible or actual loss of GPS?!?  Curiously, mention of “other operators” does not appear in this particular passage introducing a note of uncertainty about the loss of GPS scenario.  Was this loss of GPS and SatCom just a rumor?  If it was a rumor, whose rumor was it?  Why, then, was the rumor started? How did a rumor get into your report?

The thirteenth deficiency of your final report is your repeated failure to regard reported loss of GPS and/or SatCom as a clear manifestation of unlawful interference with the flight of a commercial jet and thus a possible precursor and component of a crime involving the shootdown of Malaysia Airlines Flight MH17.  Your statement that “Malaysia Airlines did not receive signals from other operators or via any other channels indicating that the airspace above the eastern part of Ukraine was unsafe” is clear proof of an attempt to minimize the significance of loss of GPS and/or SatCom, the proper consideration of which opens the door to space warfare and electronic warfare and cybernetic telecommunications piracy as possible contributing factors in the shootdown.  [7.9 Sub-conclusions, #1, PDF 229/279]

back to contents

 

Weapon used in MH17 Shootdown

The fourteenth deficiency of your final report is the missing smoke trail of the alleged BUK missile.  You claim that a BUK missile brought down Malaysia Airlines Flight MH17, yet you simply ignore this issue of the missing smoke trail so characteristic of a BUK.  You ignore the simple logic that, if a BUK missile had been fired, many observers in the air and on the ground would have seen the huge plume of thick, white smoke.  There would have been numerous cell-phone photos of this unmistakable tell-tale sign of a BUK missile being fired into the air and its lingering display.  There is no indication whatsoever that Almaz Antey manufactures a smokeless “green” BUK!  So how do you explain the lack of a signature smoke trail for your alleged BUK?  And how can God’s bankers in the West issue “carbon credits” to the Russian Federation for such a smokeless “green” BUK with sanctions still in place and more on the way?

The fifteenth deficiency of your final report is the total lack of accountability for any “non-perforating” missile fragments that did not hit the jet. [10.2 Supporting conclusions (causes of the crash), #6, Fragmentation spray of pre-formed fragments, PDF 255/279]  Indeed, common sense dictates that most fragments do not hit the target, but fly freely away from it.  Your photograph of the fragmentation pattern of a stationary, horizontal high-explosive fragmentation warhead detonation [Figure 54, PDF 130/279 and Figure 52, page 53 of Appendix X, Dutch National Aerospace Laboratory’s Investigation of the impact damage due to high-energy objects on the wreckage of flight MH17, PDF 57/72] demonstrates this point very well.  Yet you avoid the obvious implications of this “non-perforating” pre-formed missile fragments issue in your responses to the comments of the Russian Federation.  [MH17 About the Investigation, Appendix L, Response to the comments of the Russian Federation, PDF 96/99]  Such “non-perforating” pre-formed fragments that did not hit the target, but fell freely onto the soft grassland of Ukraine, are much better pieces of identification than just a few “perforating” fragments found in wreckage and bodies which, having been altered by the sheer force of hitting the target at very high speed, are only “consistent with” pre-formed fragments.  Were your hypothesis correct, such pristine pre-formed fragments had to have existed and were recoverable, but were not recovered.  Even by taking into account the difficulties of a conflict zone on the ground, it is still hard to believe that not one of hundreds of pristine bowtie or cube fragments was located by the recovery teams or by the local inhabitants.  Why weren’t the elegant Newtonian calculations applied to the “non-perforating” missile fragments as they were to the “perforating” missile fragments [TNO’s numerical reconstruction of damage patterns in Appendix Y and its numerical blast simulations in Appendix Z] and the falling debris of the destroyed jet [Appendix K, Ballistic Trajectory Analysis Methods] and the many “fly out simulations” conducted by various agencies to assess possible origins of a Buk missile flight path to MH17? [3.8.6 Simulations of the missile’s flight path, PDF 143-147/279]

The sixteenth deficiency of your final report is your failure to consider other weapons not in common use in the region but which may have been brought into the region for special purpose.

The seventeenth deficiency of your final report is your failure to consider the possibility of weapons that have been modified.  I am reminded how I once found mostaccioli inside a box of penne at roughly one third of the total content.  Assuming deliberateness in carrying out the attack, is alteration of evidence in advance of the attack that far-fetched a concept?  Can bow-tie and cube shaped pre-formed fragments be placed in an altogether different type of missile warhead than the kind that normally uses them?

The eighteenth deficiency of your final report is your total failure to consider several eyewitness accounts of a jet fighter in the immediate vicinity of MH17 at the time of the shootdown.  Bear in mind that the USA’s National Transportation Safety Board ignored 715 witnesses to what appeared to be a missile rising to meet and then to explode TWA Flight 800 on 17 July 1996.  Among them was a retired US Navy officer over 50 miles away on the Connecticut shoreline of Long Island Sound.  Seeing a rocket’s afterburner at such a great distance rules out a shoulder-launched rocket.  A shoulder-launched rocket could have been falsely attributed to Arab terrorists in a boat under the flight path with a great deal of plausibility, and the USA would have invaded the Middle East much sooner.  You don’t want to go down that evil route!  But you should at least apprise yourself of that evil route by viewing an excellent documentary TWA:  Flight 800 by Kristina Borjesson at http://www.flight800doc.com.

The nineteenth deficiency of your final report is your failure to consider space warfare and electronic warfare techniques that can add to or subtract from data on a radar screen or make a jet fighter undetectable to radar or allow a jet fighter to alter the return radar signals so as to project a false location and identity.  Moreover, you fail to consider that Ukrainian authorities admitted that they lacked the technical resources to observe any unauthorized use of Ukrainian airspace by civil or military aircraft!  Nor could they effectively track weapons systems in the area, and had no indication that the armed groups in eastern Ukraine possessed medium or long-range surface to air missile systems.  [6.2 Restricting the use of the airspace below FL 260, PDF 195/279] Furthermore, the reported loss of GPS by commercial pilots while flying over Ukraine before the MH17 shootdown should have been a clue to look into space warfare and electronic warfare as a contributing factor in this heinous crime.  My letter advising of the possibility of cybernetic telecommunications piracy (http://www.show-the-house.com/id119.html) should have been another prompt to consider space and electronic warfare measures and their possible role in the shootdown of MH17.

back to contents

 

Weather

The twentieth deficiency of your final report is your misleading classification of meteorological reports (METARS) from airports in the vicinity of the shootdown of MH17 under the heading “Forecast weather.”  [2.7.2 Forecast weather, PDF 32/279]  These meteorological reports are not primarily weather forecasts or prognostications, but descriptions of actual conditions at the time of issuance.  All four meteorological reports – from airports at Kryvyi Righ, Dnipropetrovsk, Kharkiv and Kyiv Boryspil – were issued at 13.30 UTC, just ten minutes after the shootdown of MH17.  These METARS give the actual weather conditions at the time of the shootdown of MH17.  How could you possibly list them under “Forecast weather”?  This is as bad as putting the internal Malaysia Airlines memo on previously reported losses of GPS over Ukraine among your list of NOTAMS in Appendix D!

The twenty-first deficiency of your final report is your speculative treatment of clouds relative to the flight path of Malaysia Airlines MH17.  Whereas your alleged BUK lacked its rather distinctive smoke trail, the clouds you describe may well be exaggerated figments of your imagination.  Take another look at the meteorological report (METAR) issued by the Dnipropetrovsk airport at 13.30 UTC, just ten minutes after the shootdown of MH17.  You will see “Cloud and visibility:  visibility more than 10km, thunderstorms in the vicinity, scattered cumulonimbus cloud coverage at 3,300 feet, broken at 10,000 feet.” [2.7.2 Forecast weather, PDF 32/279]  At 33,000 feet, the flight path of MH17 was well clear of these clouds as the crew of MH17 communicated with the Dnipropetrovsk Air Traffic Control.

The twenty-second deficiency of your final report is your provision of a prognostic weather chart apparently to vie with the more pertinent meteorological reports from airports in the vicinity of the shootdown of MH17.  [Appendix F, Weather Chart and Weather Satellite Image, PDF 37/176]  The prognostic weather chart is valid for 12:00 UTC, which is one hour and twenty minutes before the shootdown; whereas the meteorological reports were issued ten minutes after the shootdown and therefore describe actual weather conditions at the time of the shootdown.  The prognostic weather chart puts undue focus on approaching clouds at 35,000 feet to the south and southwest of MH17’s flight path; whereas the local meteorological reports put clouds at the time of the shootdown of MH17 between 3,300 and 10,000 feet, which is well below the flight path of MH17 at 33,000 feet.

The twenty-third deficiency of your final report is your provision of prognostic weather reports, called a SIGMETS, for the entire Dnipropetrovsk Flight Information Region, the latest being for 12.00 to 15.00 UTC on the day of the shootdown of MH17, 17 July 2014.  Like the prognostic weather chart discussed above, these SIGMETS confusedly contend with the more pertinent meteorological reports from airports in the vicinity of the shootdown of MH17.  The then current SIGMET reads “Embedded thunderstorms with large hail stones forecast over the whole Dnipropetrovsk region, with cloud tops between 37,000 and 41,000 ft, moving North with a speed of 15 km/h, and Expected change:  intensifying.”  But MH17 was free and clear of this approaching weather.

The twenty-fourth deficiency of your final report is your provision of a too-distant weather satellite image of cloud coverage over eastern Ukraine taken at 13.15 UTC, very near the time of the shootdown of MH17 at 13.20 UTC.  A close-up satellite image would have revealed many breaks and openings in these clouds that were well below the flight path of MH17.

The twenty-fifth deficiency of your final report is your failure to take into account the many cell phone camera images taken at the crash sites within minutes of the shootdown of MH17.  Many of these images give fleeting glimpses of the sky, which include patches of blue sky in a broken cloud cover.  There was yet no rain or hail or clouds topping off at 41,000 feet according to the then current SIGMET forecast.

The twenty-sixth deficiency of your final report is your failure to take into account eyewitness testimonies of a fighter jet or fighter jets in the vicinity of MH17 at the time of its shootdown.  These eyewitnesses could not have seen what they saw unless there was a broken cloud cover well below the flight path of MH17.  Again, there was yet no rain or hail or clouds topping off at 41,000 feet according to the then current SIGMET forecast.

The twenty-seventh deficiency of your final report is your faulty analysis that concludes “According to Section 2.7, the weather forecast for flight MH17 was similar to the actual weather on 17 July 2014, as determined by aftercast.” [3.3.2.2 Horizontal Profile, PDF 108/279] What “aftercast” are you talking about?  As previously stated above, local meteorological reports were issued by four local airports, including Dnipropetrovsk, ten minutes after the shootdown of MH17 and describe weather conditions at the time of the shootdown.  Again, as previously stated above, there is a vast difference between the local meteorological reports from the airports and the prognostic weather chart given in Appendix F or the prognostic weather reports called SIGMETS [2.7.2 Forecast weather, PDF 33/279] You avoid this fact altogether in your analysis.

The twenty-eighth deficiency of your final report is your false assertion that “At 13.00 (15.00 CET), at a position about 40NM after waypoint PEKIT, the flight crew of MH17 made a request to Dnipro Radar to change their track by turning to the left and deviating 20 NM north, in order to avoid the weather associated with the cumulonimbus clouds on the aeroplane’s track.”  [Factual Information, 2.1 History of the flight, PDF 25/279] This is hardly factual information in that there were no cumulonimbus clouds on the aeroplane’s track or “weather associated with the cumulonimbus clouds on the aeroplane’s track” according to the local airport meteorological reports (METARS).  As you yourself say elsewhere, “the higher and more energetic clouds were south of the route, moving north east.” [3.3.2.2 Horizontal Profile, PDF 108/279]

The twenty-ninth deficiency of your final report is your faulty analysis resulting from your failure to discern the incongruity between actual weather conditions along MH17’s flight path according to the local airport meteorological reports (METARS) and what you heard MH17 say to Dnipropetrovsk ATC: “Dnipro, Malaysian one seven, okay, start to two zero miles to the left of track due to weather?” [Appendix G, 38/176] The simple fact is that there was no weather to circumnavigate along the flight path of MH17.  What you heard was very likely the product of real-time digital voice-morphing; namely, an impersonation of a pilot aboard MH17 in conjunction with remote control of the jet into the kill zone.

back to contents

 

Cockpit Voice Recorder &
Cybernetic Telecommunications Piracy

The thirtieth deficiency of your final report is your failure to take into account the possibility of cybernetic telecommunications piracy and its very real potential to take over the flight control and communications systems of an airliner, in which case the cockpit would become the functional equivalent of a Hollywood sound stage, and the sounds preserved by the Cockpit Voice Recorder would not be from the cockpit but from an outside system intruding upon the cockpit.  Thus, your statement that the “CVR contained the event flight” [Appendix H, Recorded Data, Cockpit Voice Recorder, PDF 50/176] is overconfident in this new world of space warfare and electronic warfare and cybernetic telecommunications piracy.  If psychopathic criminals ordained by God to divide and conquer and rule the world so desire, you will hear the hoof beats of a horse on the CVR.  It is more likely, though, that you will hear the “product” of real-time digital voice-morphing, a state of the art technological wonder that permits high-fidelity voice impersonations in real time.  Words can be put into the mouths of the pilots by actors, and the real pilots would find themselves disturbingly isolated and unable to send or receive communications as they realize they are no longer flying the jet but being taken for a ride!

The thirty-first deficiency of your final report is your repetition of misleading information contained in the Dutch Safety Board’s Preliminary Report, where you state “The last radio transmissions made by Dnipropetrovsk air traffic control center to Flight MH17 began at 13:20:00 (15:20:00 CET) and ended at 13:22:02 (15:22:02 CET).  The crew of flight MH17 did not respond to these radio transmissions.” [1.5 Preliminary Report, #8, PDF 17/279] True enough, but this statement disguises a bizarre 70 second delay before Dnipropetrovsk Air Traffic Control (DNP-S4) finally responds at 13.21.10 UTC to the long silence from MH17 following ATC’s previous unacknowledged transmission to MH17 at 13.20.00 UTC.  How can a 70 second interval be explained before Dnipropetrovsk Air Traffic Control (DNP-S4) finally says, “Malaysian one seven, how do you read me?”  [Appendix G, ATC Transcript, PDF 40/176]  Genuine dialogue between Dnipropetrovsk Air Traffic Control (DNP-S4) and MH17 would have Dnipropetrovsk Air Traffic Control (DNP-S4) asking for a read back within just a few seconds.  Of course, at this point, the high-powered detonation had already occurred, and MH17 was no longer able to respond to Dnipropetrovsk Air Traffic Control (DNP-S4), but Dnipropetrovsk Air Traffic Control (DNP-S4) couldn’t have known this so soon!  Or, could they have already known?!?  To wait 70 seconds before asking, “Malaysian one seven, how do you read me?” is a red flag.  How can this be explained?  How can this odd delay be overlooked by the Dutch Safety Board?  In light of the above, how could the Dutch Safety Board conclude “The actions of the air traffic controllers are consistent with normal operations”?  After 70 seconds of dead air before finally asking for a readback, how could the Dutch Safety Board insist that “the communication between the flight crew and the air traffic controllers by both parties appeared normal and was considered consistent with normal operations”? [3.3.2.2, The flight before in-flight break-up, Flight execution, Horizontal profile, PDF 108/279]  Such unnatural dialogue is an occupational hazard of criminals whom we can call Cybernetic Telecommunications Pirates!  They are B movie actors hired by intelligence agencies.

The thirty-second deficiency of your final report is your repeated failure to question the long pause of 70 seconds by Dnipropetrovsk Air Traffic Control (DNP-S4) after its previous transmission to MH17 at 13:20:00 (15:20:00 CET) was not answered.  Instead, you state “There is no evidence that the controllers did not perform their duties correctly.” [Appendix V, Consultation A, PDF 18/21]  This is simply not true!  Again, such unnatural dialogue is an occupational hazard of criminals whom we can call Cybernetic Telecommunications Pirates!

The thirty-third deficiency of your final report is your failure to sense the inappropriate responses between Dnipropetrovsk Air Traffic Control and MH17 where “the captain decided to deviate from the planned vertical flight profile by not climbing to FL350 as requested by the air traffic controller but maintained FL330.”  [3.3.2.1, The flight before in-flight break-up, Flight execution, Vertical profile, PDF 107/279]  Instead you argue for the soundness of the captain’s normal operational decision and call the performance of the Ukrainian ATC “adequate.” [10.3 Excluding other causes of the crash, 2. Air traffic controller, PDF 257/279] But the real issue here is the captain’s failure to articulate his reason to air traffic control and air traffic control’s failure to request an explanation.  This is yet another red flag indicating unnatural dialogue between ATC and MH17.  Once more, such unnatural dialogue is an occupational hazard of criminals whom we can call Cybernetic Telecommunications Pirates!

The thirty-fourth deficiency of your final report is your failure to consider the qualifications of the air traffic controllers, which you say “were not relevant to the investigation into the crash.” [10.3 Excluding other causes of the crash, 2. Air traffic controller, PDF 257/279]  Really?  I should think that air traffic controllers displaying unnatural dialogue with the MH17 pilot and waiting 70 seconds to request a routine read-back from MH17 deserve to be put under scrutiny at the very least!  I would want a list of all persons in Dnipropetrovsk Air Traffic Control and an investigation of each and every one of them.

The thirty-fifth deficiency of your final report is your misleading statement that “On request by the flight crew, the air traffic controller authorized flight MH17 to circumnavigate this weather” supposedly looming in its track. [10.3 Excluding other causes of the crash, 2. Air traffic controller, PDF 257/279 and 3.3.2.2, The flight before in-flight break-up, Flight execution, Horizontal profile, PDF 108/279]  Yes, I presume that this is what Ukrainian Air Traffic Control provided in its transcripts.  However, as already demonstrated above, meteorological reports (METARS) from four local airports, including Dnipropetrovsk, whose ATC had final contact with MH17, indicated that the broken cloud cover was well below the flight path of MH17, and that the looming cumulonimbus clouds reaching as high as 41,000 feet were well to the south and southwest of the aeroplane’s track.  There was no weather for MH17 to circumnavigate despite what the ATC transcripts reveal.  This is a red flag indicating that the dialogue between MH17 and Dnipropetrovsk ATC was not genuine.  Such unnatural dialogue is an occupational hazard of criminals whom we can call Cybernetic Telecommunications Pirates.  Cybernetic Telecommunications Piracy offers the best explanation for what actually happened. 

 The thirty-sixth deficiency of your final report is your tendency to ignore red flags indicating that the dialogue between Dnipropetrovsk Air Traffic Control and MH17 was not genuine.  By expanding on prognostic weather forecasts to describe a less than plausible weather scenario, and by minimizing meteorological reports from local airports which describe actual weather conditions at the time of the MH17 shootdown, you cut off consideration of Cybernetic Telecommunications Piracy as a contributing factor in the demise of Malaysia Airlines Flight MH17.

back to contents

 

Transparency etc.

The thirty-seventh deficiency of your final report is your failure to employ a proofreader for the English version.  I cannot judge the Dutch version because I cannot speak or read Dutch.  But as a native American English speaker, I found a few rough spots in your English text.

The thirty-eighth deficiency of your final report is your failure fully to appreciate the far-reaching implications of your statement “The conflicts that pose the greatest risks to civil aviation are those in which non-state parties are involved.” [Appendix U, Flying over Conflict Zones – Risk assessment, PDF 163/176]  This statement sounds like a broad hint that the “Separatists” were posing the greatest risks to civil aviation when MH17 was shot down, which comes very close to overstepping your mandate to determine cause and not to assess blame.  In so doing, you apparently exclude private contractors, mercenary groups and private armies which are arguably controlled by a state or states through proxies.  Such bias can improperly influence the criminal investigation, which no doubt relies on your final report.

The thirty-ninth deficiency of your final report is your reliance on classified information from Dutch intelligence services and the unspecified intelligence services of other countries, which information you maintain confirmed your findings about the causes of the crash of MH17. [Appendix A, PDF 10/176] Secret evidence such as this classified information from unnamed intelligence services to which you refer is of a totalitarian nature reeking of oppression and domination and evil.  How can you say that your investigation is independent when you rely on secret evidence?  “It is important to ensure that the investigation is carried out independently from the parties involved.  This is why the Dutch Safety Board itself selects the issues it wishes to investigate, mindful of citizens’ position of dependence with respect to authorities and businesses.” [Dutch Safety Board, PDF 3/279]  Yes, your Annex 13 Investigation is not meant to blame, but rather to learn to promote safety with lessons learned; yet your conclusions based on secret evidence serve as a guide for the Joint Investigation Team, which can only compromise the integrity of the JIT investigation and, ultimately, the proper administration of justice.  In a major incident such as the shootdown of Malaysia Airlines Flight MH17, the people and nations of the earth deserve to know the truth, the whole truth, and nothing but the truth!  Secret evidence apparently includes Ukraine’s refusal, according to the Russian military, to publish its radar data, the positions of air defense batteries it had deployed in the area of the shootdown, and communications between MH17 and the Ukrainian air traffic controller directing its flight toward the Separatist-held areas in eastern Ukraine.  All of this I find troubling to consider.

The fortieth deficiency of your final report is the uncertainty conveyed by your admission regarding your Preliminary Report on MH17 that the “original English report” was translated into the Dutch language. [1.5 Preliminary Report, PDF 18/279] If the Dutch Safety Board investigation was carried out by Dutch nationals, wouldn’t one properly expect that the original Preliminary Report would have been in Dutch, then translated into English, and not the other way around?  This leads to other questions.  Was the original of this, your final report, also in English, then translated into Dutch?  Were the Americans or the British involved in any way in making this final report?  If so, wouldn’t this be a breach of your standard of independence?  By curious coincidence, even as you (and perhaps others) were working on your investigation that ultimately produced this final report that was published in October 2015, a humongous amount of gold bullion was repatriated from the United States to the Netherlands.  This enormous transfer of gold from the Federal Reserve in New York City to Amsterdam in November 2014 was, in and of itself, an exceedingly rare occurrence.  Did elements within the United States Government – the very same ones who engineered the illegal and immoral coup d’état in Ukraine – buy your final report on MH17 to be used as propaganda against the Russian Federation in their next step toward world domination?

back to contents

* * * * * * *

 

REFLECTIONS:

Let me begin these reflections by sharing with you one of my favorite verses of the Holy Bible, which is the advice of King Solomon as recorded in the Book of Proverbs, 4:14-19.  “Enter not into the path of the wicked, and go not in the way of evil men.  Avoid it, pass not by it, turn from it, and pass away.  For they sleep not, except they have done mischief; and their sleep is taken away, unless they cause some to fall.  For they eat the bread of wickedness, and drink the wine of violence.  But the path of the just is as the shining light, that shineth more and more unto the perfect day.  The way of the wicked is as darkness: they know not at what they stumble.”

Choosing light over darkness, I should think, is consistent with the Dutch Safety Board’s charge from the King on behalf of the people of Holland and Holland’s obligations as signatory to the Chicago Convention.  To seek the truth, the whole truth and nothing but the truth about what happened to Malaysia Airlines Flight MH17 on 17 July 2014 is the main purpose not only of the Dutch Safety Board but of the Joint Investigation Team as well.

But I cannot bring myself to conclude that the Dutch Safety Board succeeded in upholding this main purpose of finding the truth of what really happened to MH17, which, in my opinion, does not augur well for the still-ongoing work of the Joint Investigation Team.

You steadfastly avoided the implications of unlawful flight interference as indicated by loss of GPS on other flights over Ukraine prior to the shootdown of MH17.  You simply ignored the salient issue of no smoke trail from your alleged Buk missile.  Your physical evidence of the alleged Buk missile is paltry when there should have been an abundance of such evidence; namely the pristine “non-perforating” missile fragments in the green fields of Ukraine.  Your imagined clouds from hyped weather forecasts clash sharply with local airport meteorological reports of actual weather conditions at the time of the shootdown of MH17.  Your questionable renderings of the Cockpit Voice Recorder are plausible only if the hyped weather forecasts are accepted as factual, which they are not!  You rely on unspecified secret evidence from unnamed foreign intelligence agencies, yet nevertheless maintain your independence despite this lack of transparency.  (Did this secret evidence really just confirm your own findings, or did it lead you to them?)  You remain virtually oblivious to the real and present dangers of space warfare, electronic warfare and, despite my best efforts to warn you, the dangers of cybernetic telecommunications piracy to an aeroplane’s navigation and communications systems.

The sum of these many deficiencies inevitably leads to two questions and a choice.  Do you realize what you have done?  Will you correct these deficiencies?  Do you wish to continue on the path of darkness or take the path of light and of truth and of justice?

Here I can only refer you again to my advice in my second recommendation where I invite you to walk in the shoes of Edward Felt, an alleged passenger on United Airlines Flight 93, which allegedly crashed in Shanksville, Pennsylvania on 11 September 2001.  This advice is in accord with your own recommendation to use one’s imagination in approaching these grave matters of flight safety and risk assessments. [Appendix U, Flying Over Conflict Zones – Risk Assessment, Vulnerabilities involved in risk assessment, The importance of imagination, PDF 165/176] As I have demonstrated for your edification, the whole story about Mr. Felt and his alleged cell phone call indicates elaborately planned deception and rampant criminality within the US Government.  This in turn calls into question the entire official story of 9/11.  Let me urge you to consider a very good summation of the many reasons why the entire official story of 9/11 is false by reading the first chapter of David Ray Griffin’s 9/11 Ten Years Later:  When State Crimes Against Democracy Succeed (Olive Branch Press, 2011, http://www.interlinkbooks.com).  Professor Griffin is a theologian who very ably acts as a judge in marshalling evidence showing that Osama Bin Laden in particular, and Al Qa’ida in general, had absolutely nothing to do with 9/11, and that the evidence actually points to an inside job to create a ruse so as to fabricate a justification to put American muscle on Mesopotamian patrol.  This strong delusion caused many, including the Netherlands, to follow the USA on its path of darkness and destruction.  It is time to reverse course.  Giving the USA another opportunity to act on another false flag provocation will only encourage more aggression.  This is what you will ultimately be doing in light of the many deficiencies of your final report and the forthcoming report of the Joint Investigation Team.

The pillars of US foreign policy are fraud and force, and have been so for many decades.  Share their goals and see what you have!  Chaos in the Middle East and mass migrations into Europe and growing divisions in both places.  The Netherlands ought to reconsider cooperation in the military adventures of the United States, particularly in relation to the North Atlantic Treaty Organization (NATO), which has outgrown its usefulness from the time it turned the Charter of the United Nations into a joke on Yugoslavia in 111 parts!  Haven’t we had enough false flag provocations such as Operation Gladio and the British Bombers (dressed as Arabs) of Basra?  Getting rid of NATO will only enhance the principles and purposes of the United Nations.  Invoking the Nuremberg Principles against the USA at the International Court of Justice in the Hague and implementing tariffs against the USA to fund massive restitution programs are just measures worthy to pursue.

Harking back to my first recommendation regarding the United Nations Military Staff Committee as the logical entity to coordinate states, air operators and other interested parties in their responsibilities to promote air safety particularly in areas where hostilities could arise, I mentioned Governors Island in New York Harbor as a potential site for a formal headquarters of the UN Military Staff Committee and campus for the first international academy for military professionals from around the world.  I also mentioned the deep connection of Governors Island with Dutch history and the history of the United States.  Let me here add that during the American Civil War (1861-1865) Governors Island served as a staging ground for Union troops who were transported from there to the war zones in the south.  At the very start of the war, it was Russian diplomacy that convinced President Abraham Lincoln to formulate a foreign policy that today reflects the basic principles contained in the first chapter of the Charter of the United Nations.  Lincoln sent German immigrant Carl Schurz as Ambassador to Spain with instructions to coordinate the official position of the United States in the capitals of Europe.  Schurz accordingly urged the European states to refrain from taking sides in the American Civil War, which he presented to them as an internal affair of the United States.  Flash forward to today, and you clearly see that the United States is not only unhinged from international law, but from its own historical underpinnings, as it brazenly interferes in the domestic affairs of other states around the globe.  The USA’s foreign policy is based on fraud and force, which is most regrettable.  For many, it is tragic.  I call it the praxis of evil.

Oddly enough, this praxis of evil was incubated decades ago right here in San José, California, the heart of Silicon Valley, well before the transforming discoveries of quantum mechanics and relativity in Europe were given practical applications by Yankee ingenuity.  In 1911 the first radio station in the history of mankind began to broadcast from what is now downtown San José.  By 1933, San José became famous for the first lynching in the history of  mankind to be promoted and conducted by radio broadcasts.  Apparently the victims were patsies engaged in crime with others who were never identified after the FBI, in telephone consultation with FBI Director J. Edgar Hoover in Washington, dismissed a very credible witness because she was a Portuguese farmer’s wife! The extrajudicial executions were never punished and, in a very real sense, this lynching set a precedent for a certain privileged class of society to get away with murder.  Add to this San José way of justice the robust advocacy of former President of the United States Herbert Hoover for the transfer of Palestinian Arabs out of their land to make room for Zionist settlers, and you have quite a combustible mix for decades to come!  Add one final ingredient, the old precedent from a San José court judgment that a corporation has the same rights as a human person, and you have a citizen without a heart, a democracy without a heart, and a fascist government with a will of its own.  In 1959 Bertrand Russell proposed world domination by the United States of America as a step toward one world government.  Today the US Government serves the Anglo-Zionist-Neoconservative ideology of world domination by means of the military power of the United States.

There has evolved from this lawyerly legalized lawlessness, what I call the praxis of evil, a pattern of deplorable behavior consisting of propaganda, provocations, and false accusations backed by nothing other than yottaWatts upon yottaWatts of broadcast power!  Milosevic of Yugoslavia, who was recently posthumously exonerated of charges that brought him kidnapping and unjust imprisonment and early death, comes to mind.  So do the three Lebanese generals who were imprisoned for three years for their alleged roles in the 2005 murder of Rafiq Hariri, and whose release from prison for lack of evidence did not elicit an apology, let alone compensation from, or punishment for, those who made the false accusations against them.  And more recently, we have endured the endlessly repeated false accusations against Syrian President Bashar al-Asad for use of chemical weapons!  This is a small, partial list of high-tech lynchings for the purpose of regime change consistent with the Anglo-Zionist-Neoconservative quest for world domination. (In the interests of full disclosure, it was the Hariri administration that in 1993 called my Eight Part Peace Proposal for Greater Jerusalem “a truly egalitarian model for consideration” for which I am forever grateful. [http://www.show-the-house.com/id40.html])

The shootdown of Malaysia Airlines Flight MH17 was just another provocation in a long line of provocations from the West.  So I caution the Joint Investigation Team and the Government of the Netherlands not to aid and abet the machinations of these psychopaths lest you reap what you sow!

Cui Bono?

Because the Dutch Safety Board’s duty was to determine the cause of the crash of MH17 and provide lessons learned so as to improve flight safety and prevent a recurrence of such a disaster, the important consideration of cui bono? – who benefitted from the crime of shooting down a civilian airliner over a known conflict zone – did not arise.  Yet certain assumptions about possible parties involved in the downing of MH17 had to be made, or could not be avoided being made; namely the Separatists in eastern Ukraine or the Russians or the Ukrainians.  This is most evident in your statement “However, unlike the other two actors, the Separatists were not a homogeneous group.  They were composed of factions with different specific objectives and working methods.  It was clear, however, that the Separatists all shared the intention to shoot Ukrainian air force fighter aeroplanes and helicopters out of the air.”  [Appendix T, Report of the Dutch Review Committee for the Intelligence and Security Services, 5.2 MIVD’s degree of knowledge, The intentions of the Russian armed forces, the Ukrainian armed forces and the Separatists, 25/38, PDF 140/176]

Here, I am afraid to say, the Dutch Safety Board was wearing blinders as to who would willingly commit this atrocity of shooting down a civilian aeroplane.  I dare to say that the real perpetrators of the shootdown were overly confident of where the blame would fall with their yottaWatts of broadcast power and were the first to point the finger and urge sanctions against one of the possible parties.  I dare to say that the real perpetrators of the shootdown were the same people who engineered the illegal, immoral and violent overthrow of Ukraine’s democratically elected government on 22 February 2014.  The Ukrainians by themselves, and the Russians and the Ukrainians in eastern Ukraine who remained loyal to their government after an illegal coup d’état against it, all lacked a motive to shoot down a commercial airliner.  On the other hand, the backers of this bloody coup d’état had motive as well as means and opportunity to attack a defenseless civilian airliner and place the blame on the one regional power opposed to their violent takeover of the leadership and economy of Ukraine.  To be frank, the backers of this bloody coup d’état have been engaged in regime changes all over the world for the better part of the past century, from before Mossadegh in Iran in 1953 to after Ghaddafi in Libya in 2011.  For them, it is a “game” of blood, money, power and cookies.  This Anglo-Zionist-Neoconservative praxis of evil seeks world domination through the military might of the United States of America.

Let me briefly dissect this Anglo-Zionist-Neoconservative praxis of evil.  The British Monarchy believes that it is destined by ancient Hebrew prophecy to rule the world, but its deep religious tradition has lately been stifled by a base portrayal of its deeply historic Coronation Throne in the Harry Potter movies, which feature a near replica of this throne in the mead hall at Hogwarts.  You might say that the British Monarchy is “off message,” and Hollywood is filling in the blanks!

The Jews are mainly Ashkenazi Jews, or descendants of Turkic Khazars who converted to the Jewish faith in the early Middle Ages.  The Khazars are identified by historians as Gog and the Kingdom of the North, which helps clarify certain prophecies of the ancient Hebrew prophets.  A Turkic people, the Ashkenazi Jews invented the term “anti-Semitism” to gain acceptance as Semites after their migrations into eastern Europe.  On the other hand, the Sephardic Jews are actual Semites and blood descendants of Abraham, but most of them were assimilated into Christianity.  In the past century, these Turkic Ashkenazi Jews have killed countless Semites who just happen to be Arab.  This deplorable anti-Semitism is behind the controlled chaos that we witness daily in the news from the Middle East.  Both the Ashkenazi Jews and the Sephardic Jews share a gene pool from their common ancestor,  Noah.  I have published a study of these important matters at http://www.show-the-house.com/id55.html.

The Neoconservatives are the American wing of this unholy triad.  They helped to perpetrate 9/11 to persuade gullible Americans to fight their wars against Arabs in particular and Moslems in general.  The George W. Bush and Barack H. Obama administrations have both served the Anglo-Zionist-Neoconservative ideology.  So will the next administration; both Hillary Clinton and Donald Trump have made pledges of allegiance to the Zionist state in their campaign appearances before the American Israel Public Affairs Committee.  The Bushes, Clintons and Obama have all paid lip-service to United Nations Security Council Resolution 242, but Trump took a quantum leap above and beyond them all when he declared his support for Zionist settlements in the occupied territories.  Trump simply threw the USA’s constitutionally mandated obligation to enforce resolution 242 out the window.

The driving force of the praxis of evil is the Talmud, which, unlike the Torah, teaches Jewish superiority, separation and license to kill or use or abuse non-Jews.  The Talmudic law of the Moser (Informer) prohibits a Jew from informing on another Jew to a non-Jew, which is a code of silence not unlike the Mafioso code of omertà.  The Talmudic law of the Moser can easily lead to obstruction of justice and corruption within a nation’s judicial system as well as dysfunction and corruption within its law enforcement and intelligence communities.  If you have already accepted my invitation in my second recommendation to use your imagination and walk in the shoes of Edward Felt, you might consider the Talmudic law of the Moser as the force behind the cover-up of his fabricated telephone call that exposes the entire fraudulent official governmental account of 9/11.

Well before the revelations of Edward Snowden about the true extent of the National Security Agency’s intrusions into the private communications of the citizens of the United States and, indeed, of the world, the late Admiral Thomas H. Moorer, a former Chairman of the Joint Chiefs of Staff, remarked in an interview in 1983, “I’ve never seen a president – I don’t care who he is – stand up to them.  It just boggles the mind.  They always get what they want.  The Israelis know what is going on all the time.  I got to the point where I wasn’t writing anything down.  If the American people understood what a grip those people have got on our government, they would rise up in arms.  Our citizens don’t have any idea what goes on.”  Judging from what Moorer said in 1983, the year Snowden was born, one can be sure that the Zionists have a controlling access to the resources of the NSA.  Earlier I wrote that if you own a phone, the NSA owns your voice and can weaponize it if it so chooses.  Well, let me add that if you own a phone, the Zionists own your voice and can weaponize it if they so choose.

Cybernetic Telecommunications Piracy is just another way to wage asymmetrical warfare.  So if, say, the Malaysians hold a Kuala Lumpur War Crimes Tribunal, as they did in 2007, and find George W. Bush and Tony Blair guilty of crimes against peace, as they did in 2011, then find Bush, Cheney, Rumsfeld, among others, guilty of conspiracy to commit war crimes, as they did in 2012, then find the State of Israel guilty of genocide of the Palestinian people, as they did in 2013, then referred their findings to the chief prosecutor at the International Court of Justice in the Hague, you can consider the motive of revenge for their audacity to publish evidence in support of their convictions.  With that motive, the high-tech means of cybernetic telecommunications piracy and the easy opportunities to lead off course Malaysia Airlines Flight MH370 and to shoot down Malaysia Airlines Flight MH17 deserve serious consideration. 

Iraq has proper standing to bring such war crimes charges before the International Court of Justice.  The case has already been made for them by the Malaysians.  The Iraqis just need the political will to proceed.  The Iraq Inquiry, also known as the Chilcot Report, which was published on 6 July 2016, supplements the case already made by the Malaysians.  Thanks to the noble efforts of the Kuala Lumpur Tribunal, Iraq and Afghanistan have grounds to invoke the Nuremberg Principles at the Hague.

Finally, the Malaysians have hosted the 9/11 Truth Movement in Malaysia, where the degree of awareness of the Big Lie of 9/11 is very high, which threatens to expose the real perpetrators of these heinous Shock & Awe crimes against New York and Washington on 11 September 2001.  The motive to punish the Malaysians for taking the path of light over darkness with asymmetrical warfare in the form of cybernetic telecommunications piracy against two jets of the Malaysia Airlines fleet deserves serious consideration.  Very few nations have the means and opportunities to employ such advanced high-tech means of warfare.  Start with the select few among them who have the motive and go from there.  (In the interests of full disclosure, Malaysian officials from the Mission of Malaysia to the United Nations in New York and the Malaysian Consulate General in New York hosted a luncheon meeting in New York (in 2005?) where we discussed many aspects of 9/11 which were the subjects of my fax broadcasts to the US Government and international community in Washington and New York.)

To conclude, it seems to me that the shootdown of Malaysia Airlines Flight MH17 was a false flag operation designed to put the blame on the Russian Federation in furtherance of the Anglo-Zionist-Neoconservative design to achieve world domination by confronting the Russian Federation with possible war.  The perpetrators of this heinous crime killed two birds with one stone by punishing Malaysia for exposing their Big Lie about 9/11 as well as their war crimes with evidence published for all to see, including the chief prosecutor at the International Court of Justice and the governments of Iraq and Afghanistan, who have standing to pursue the matter there.

* * * * * * *

back to contents

 

Previous Letters to the Dutch Safety Board:

Dr. Erwin Muller
Dutch Safety Board
Post Office Box 95404
25 09 CK, The Hague
info@onderzoeksraad.nl

Copies to:            Prime Minister of Malaysia Najib Razzaq
                                President of Russian Federation Vladimir Putin
                                German Chancellor Angela Merkel
                                Margaret Sullivan, Public Editor, The New York Times
                                                               

10 November 2014

Dear Doctor Muller,

Please allow me, a private citizen of the USA, to express my concern over the course of the investigation into the shoot-down of MH17, which you are heading, and to provide input about certain aspects of the preliminary report that was released to the public.  To get right to the point, the dialogue between the control tower in Ukraine and the crew aboard flight MH17 does not sound authentic, and this consideration strongly suggests to me the likelihood of cybernetic telecommunications piracy as an element of the crime that is now under investigation.  However, the worldwide corporate and governmental culture of secrecy makes this troubling subject taboo.  Moveover, the wall of silence in the newsmedia raises questions of journalistic integrity.  Without someone shouting a warning, the matter can easily be swept under the rug, and my purpose in writing is to prevent this from happening.  And so I make my presentation to you in the form of an article, “Cybernetic Telecommunications Piracy,” submitted last month with a cover letter to the Op-Ed Editor of The New York Times, both of which follow in the body of this e-mail.  This article was not published, and I am unaware of any other effort to shed light on this subject.  Therefore I ask for your utmost attention to this matter.

Very truly yours,
Stephen M. St. John

Post Office Box 720274
San José, CA 95172
stephen@show-the-house.com
stephen.m.st.john@gmail.com

 



Trish Hall
Op-Ed & Sunday Review Editor
The New York Times
620 Eighth Avenue
New York, NY 10018
opinion@nytimes.com

13 October 2014

Dear Ms. Hall,

I hereby submit exclusively to the New York Times my original 682 word article “Cybernetic Telecommunications Piracy” with the hope that it will be published and read by your huge audience worldwide.  A copy follows this letter in this email, and another is attached as a Word document.  The subject matter is in the public interest, and I cannot think of any conflict of interest involving me personally.  For your convenience I give two versions of my article, the second having footnotes indicating sources for fact-checking.  In the event that you do want to publish my article, you may refer to me as an independent researcher who maintains a website at www.show-the-house.com; also, I have no phone so communication to create a final draft must be done by email.

Very truly yours,
Stephen M. St. John

Post Office Box 720274
San José, CA 95172
Tel.:  NSA (no such accessory)
Email:  stephen@show-the-house.com
Email:  stephen.m.st.john@gmail.com

 

 

Cybernetic Telecommunications Piracy
© Stephen M. St. John 2014

There are at least two kinds of cybernetic telecommunications piracy which are much, much more aggressive than the usual eavesdropping and surveillance once employed by FBI Director J. Edgar Hoover and now, on a far greater scale, by the National Security Agency among others.

One kind is telephonic or radio impersonation by real-time digital voice-morphing, and the other is unauthorized remote control of systems such as an aircraft’s flight control system.

For the first, a surreptitious recording of the subject person’s telephone talk results in a digital profile of his or her voice on computer software that can then use the “voiceprint” to impersonate this subject person’s voice with astonishingly high fidelity.  For example, with the requisite preparation, the famous Lebanese female singer Farouz could dial the phone and sound exactly like, for example, Syrian President Bashar al-Asad, whether to order an attack or just a pizza.

For the second, an electronic signal can be directed at a Boeing jet flying according to flight plan and take control of the flight out of the hands of the pilot or even of an automatic flight control system.

Both remote-control hijacking and impersonation by real-time digital voice-morphing are inherently anonymous and undetectable.  Such cybernetic telecommunications piracies are ways to fabricate a provocation as a pretext for state action in support of a geopolitical strategy.  For example, co-opting the flight-control system as well as the communications system aboard Malaysia Airlines Flight MH17 may very well explain how the jet so conveniently remained below its assigned altitude and veered to the left before it was blown out of the sky.  The Dutch Safety Board would do well to scrutinize the communications between Ukrainian Air Traffic Control and MH17 with this possibility in mind.  Did an impersonator slip in terms of knowledge and sense for the mission and give the game away?

On 9/11, for example, Mark Bingham allegedly called his mother from Flight 93 and said “Hello, Mom, this is Mark Bingham”; such an unnatural utterance is an indicator of impersonation.  Again, Edward Felt allegedly called and told an emergency dispatcher that he had locked himself inside a lavatory aboard Flight 93 and was using his cell phone to report an ongoing hijacking.  Felt’s family confirmed his voice on a recording of the call which the FBI played for them even though in 2001 such a cell phone call was technically impossible to make.  How else can Felt’s call be explained other than by impersonation through real-time digital voice-morphing?

Likewise, in the case of MH17 and according to the preliminary report of the Dutch Safety Board which is charged with the investigation, we hear of the bizarre and unexplained refusal of the pilot to air traffic control’s even more bizarre cue to rise 2,000 feet according to a seemingly optional flight plan.  Again, the Malaysia Airlines pilot’s request to veer left because of weather conditions just happened to fit perfectly the scenario required for the criminals to carry out the shoot-down and promptly assign blame.  The real ringer – the experienced MH17 crew’s subsequent request to fly at a level normally reserved for jets going in the opposite direction – is yet another strong indicator of carelessness on the part of an impersonator co-opting the aircraft’s communications system with real-time digital voice-morphing.

Put all these and other examples together and you see a pattern suggesting the practice of cybernetic telecommunications piracy to stage events that influence the public’s attitude toward supporting war.

Cybernetic telecommunications piracy is almost the perfect crime, and therefore it lurks as a real but hidden danger to the security and peace of all nations on Earth.  Attempts to curb the full-spectrum   fraud and force of the USA’s Anglo-Zionist-Neoconservative-driven foreign policies will require full disclosure and accountability regarding both the legitimate and nefarious uses of these brilliant technologies as well as their associated risks.  Where their use constitutes a ruse to commence aggressive war, the perpetrators should be tried in The Hague according to the Nuremberg Principles, which hold that the initiation of aggressive war is the supreme war crime because it engenders so many other war crimes.

 

Cybernetic Telecommunications Piracy
(Text with footnotes indicating material supporting facts)
© Stephen M. St. John 2014

There are at least two kinds of cybernetic telecommunications piracy which are much, much more aggressive than the usual eavesdropping and surveillance once employed by FBI Director J. Edgar Hoover [1] and now, on a far greater scale, by the National Security Agency among others [2].

One kind is telephonic or radio impersonation by real-time digital voice-morphing [3], and the other is unauthorized remote control of systems such as an aircraft’s flight control system [4].

For the first, a surreptitious recording of the subject person’s telephone talk results in a digital profile of his or her voice on computer software that can then use the “voiceprint” to impersonate this subject person’s voice with astonishingly high fidelity.  For example, with the requisite preparation, the famous Lebanese female singer Farouz could dial the phone and sound exactly like, for example, Syrian President Bashar al-Asad [5], whether to order an attack or just a pizza.

For the second, an electronic signal can be directed at a Boeing jet flying according to flight plan and take control of the flight out of the hands of the pilot or even of an automatic flight control system.

Both remote-control hijacking and impersonation by real-time digital voice-morphing are inherently anonymous and undetectable.  Such cybernetic telecommunications piracies are ways to fabricate a provocation as a pretext for state action in support of a geopolitical strategy.  For example, co-opting the flight-control system as well as the communications system aboard Malaysia Airlines Flight MH17 may very well explain how the jet so conveniently remained below its assigned altitude and veered to the left before it was blown out of the sky [6].  The Dutch Safety Board would do well to scrutinize the communications between Ukrainian Air Traffic Control and MH17 with this possibility in mind.  Did an impersonator slip in terms of knowledge and sense for the mission and give the game away?

On 9/11, for example, Mark Bingham allegedly called his mother from Flight 93 and said “Hello, Mom, this is Mark Bingham” [7]; such an unnatural utterance is an indicator of impersonation.  Again, Edward Felt allegedly called and told an emergency dispatcher that he had locked himself inside a lavatory aboard Flight 93 and was using his cell phone to report an ongoing hijacking.  Felt’s family confirmed his voice on a recording of the call which the FBI played for them even though in 2001 such a cell phone call was technically impossible to make [8].  How else can Felt’s call be explained other than by impersonation through real-time digital voice-morphing?

Likewise, in the case of MH17 and according to the preliminary report of the Dutch Safety Board which is charged with the investigation, we hear of the bizarre and unexplained refusal of the pilot to air traffic control’s even more bizarre cue to rise 2,000 feet according to a seemingly optional flight plan [6].  Again, the Malaysia Airlines pilot’s request to veer left because of weather conditions just happened to fit perfectly the scenario required for the criminals to carry out the shoot-down and promptly assign blame [6].  The real ringer – the experienced MH17 crew’s subsequent request to fly at a level normally reserved for jets going in the opposite direction [6] [9] – is yet another strong indicator of carelessness on the part of an impersonator co-opting the aircraft’s communications system with real-time digital voice-morphing.

Put all these and other examples together [4] and you see a pattern suggesting the practice of cybernetic telecommunications piracy to stage events that influence the public’s attitude toward supporting war.

Cybernetic telecommunications piracy is almost the perfect crime, and therefore it lurks as a real but hidden danger to the security and peace of all nations on Earth.  Attempts to curb the full-spectrum   fraud and force of the USA’s Anglo-Zionist-Neoconservative-driven foreign policies will require full disclosure and accountability regarding both the legitimate and nefarious uses of these brilliant technologies as well as their associated risks.  Where their use constitutes a ruse to commence aggressive war, the perpetrators should be tried in The Hague according to the Nuremberg Principles, which hold that the initiation of aggressive war is the supreme war crime because it engenders so many other war crimes [10].

NOTES

[1]          Interview of former US Representative Neil Gallagher at http://larouchepac.com/node/28114;

[2]          I think the revelations of Edward Snowden are sufficient to establish this point;

[3]          As far as I am aware, this is the first and only article published in the mainstream on this subject:  http://www.washingtonpost.com/wp-srv/national/dotmil/arkin020199.htm;

[4]          The website of System Planning Corporation, www.sysplan.com, gives examples of remote-control systems.  My article “Cybernetic Telecommunications Piracy, The Boeing Company, and the Missing Malaysia Airlines Flight MH370” lists air disasters where cybernetic telecommunications piracy is the best explanation of what actually happened.  Please see www.show-the-house.com/id117.html;

[5]          As a student of Arabic, I find that “Asad” is a better rendition into English than the commonly encountered “Assad”; in the Arabic press I have never seen a doubling of the letter “s” in the Syrian President’s last name.  So I prefer “Asad” if that is not rocking the boat too much;

[6]          The Dutch Safety Board’s Preliminary Report on MH17, Section 2.1 History of the flight, provides the factual basis for my speculative probing in this paragraph; you can download a PDF version of this report from the website of the Dutch Safety Board at
http://www.onderzoeksraad.nl/uploads/phase-docs/701/b3923acad0ceprem-rapport-mh-17-en-interactief.pdf;

[7]          Mark Bingham’s mother Alice Hoagland said this in an interview with KTVU which was broadcast by CNN and recorded and published at http://www.youtube.com/watch?v=ryuYLUVX4VM;

[8]          Please see http://www.911myths.com/index.php/File:Team7_Box12_93Calls_EdFelt.pdf for background information on Edward Felt’s call; a Canadian university mathematics professor Kee Dewdney published results of tests http://www.physics911.net proving that cell phone calls from speeding jets at high altitude were impossible to make as of 2001; see also http://physics911.net/cellphoneflight93/; also, a USAF public affairs officer manning a booth in Rockefeller Center at the 2003 outdoor Boeing exhibit commemorating the 100th anniversary of the Wright brothers’ first powered flight responded to my question by saying that he and colleagues conducted their own informal experiments with cell phones on military and commercial jets and found that they did not work;

[9]          In the Dutch Safety Board’s Preliminary Report, 2.1 History of the flight, it is reported that twenty minutes before contact was lost with MH17, the crew of MH17 “requested whether FL340 was available”; this was a very strange request indeed if you consider that FL340 (Flight Level 340, or 34,000 feet) was reserved for jets going in the opposite direction.  The standard flight levels are basic knowledge known to all flight crews, even ones with just a modicum of experience inside the cockpit.  Please see 2.4.2 Standard flight levels and 2.6 Personnel information (regarding experience);

[10]        Please see http://en.wikipedia.org/wiki/Supreme_crime; contents are paraphrased as "The guilt we should reach is not that of numberless little people, but of those who planned and whipped up the war."

 

Follow-up letter of 19 March 2015 on GeoResonance press release:

 

Van: Stephen M. St. John [/src/compose.php?send_to=stephen@show-the-house.com]
Verzonden: vrijdag 20 maart 2015 4:15
Aan: info
Onderwerp: 7 March 2015 GeoResonance Press Release on MH370 & its Relevance to MH17
 
Dr. Erwin Muller
Dutch Safety Board
Post Office Box 95404
25 09 CK, The Hague
info@onderzoeksraad.nl

 

19 March 2015

 

Dear Doctor Muller,

As a follow-up to my previous correspondence with the Dutch Safety Board regarding my theory of cybernetic telecommunications piracy as an element of the crime that you are now investigating with respect to the shoot-down of Malaysia Airlines Flight MH17, please let me point out an avenue of investigation that could possibly lead to the conclusion that such piracy is part of a pattern including the mysterious disappearance of Malaysia Airlines Flight MH370; namely, the recent (7 March) press release issued by the Australian high-tech exploration company GeoResonance (see www.georesonance.com).  I am not connected in any way with GeoResonance, and GeoResonance does not support in any way my theory of cybernetic telecommunications piracy; the GeoResonance press release speaks for itself.  But reading this GeoResonance press release (and previous ones concerning MH370 as well), I cannot help but draw the conclusion that there is an official policy among the principals involved in the search for MH370 to conceal a key discovery made by the scientists at GeoResonance.  At the very least, the work of these scientists, which is based on principles of quantum physics, deserves recognition and verification rather than cover-up born of fraud and force and geopolitical considerations.  Lessons learned about MH370 may very well shed light on MH17, and vice versa.  Therefore, in the best interests of obtaining the whole truth about MH17 and the proper administration of justice, I urge the Dutch Safety Board to weigh and consider the claims being made by the scientists at GeoResonance concerning MH370.  If it turns out that they actually located MH370 shortly after it disappeared just over a year ago, they will have also succeeded in exposing a corporate and governmental culture of secrecy and deceit!  Thank you for your attention in this matter.

With kind regards and best wishes for success in your most important work,
Stephen M. St. John

 

*******

Follow-up letter of 10 July 2015 on the vile Verizon corporation:

 

To the Dutch Safety Board:

10 July 2015

Please accept this belated reply to your own belated reply and apology which I readily accept but think hardly necessary in view of the weighty matters that you must consider with great caution in your investigation of the shootdown of Malaysia Airlines Flight MH17 almost a year ago.  I appreciate knowing that my views are being seriously considered and thank you for it.  Cybernetic telecommunications piracy comprises ingenious high-tech methods of deception which have been developed over a long period of time in a culture of governmental and corporate secrecy.  But these capabilities have now grown wild as instruments of fraud and force that threaten mankind with fabricated justifications for war.  These methods of deception include seizure of an aircraft’s flight control, communications and security systems by remote control as well as radio or telephonic impersonation by real-time digital voice-morphing.  Cybernetic telecommunications piracy is a new component of the old doctrine of shock and awe, which is far worse than terrorism.
Let me add a personal note about myself and my motives.  Back on 26 June 2015 I received in my post office box an advertisement from Verizon which is addressed to my former boss, Marion Britton, and myself.  (A PDF file showing this advertisement is attached to this email for your perusal and use.)  (This ad is reproduced below.)  Marion was the Assistant Regional Director of the United States Bureau of the Census in New York City and, according to the official story, was killed on board United Airlines Flight 93 on the morning of 11 September 2001.  I can assure you that the last time I saw Marion was on 10 September 2001 and that our relationship did not extend beyond the official business of the Census Bureau in which I served as a Field Representative in the survey division for over a decade; hence, there is no plausibility whatsoever in connecting our names as possible customers in a Verizon advertisement nearly 14 years after her alleged death.  Furthermore, the news media stories put out about Marion’s alleged cell phone and air-phone calls do not make sense to me at all unless one entertains the possibility of impersonation by real-time digital voice-morphing.  As you will recall, in my opening communication with the Dutch Safety Board I cited two other examples from United Flight 93 that strongly suggest impersonation by real-time digital voice-morphing.  Other examples abound, which only leave us with unanswered questions and lessons not learned.  Whatever the case, this Verizon advertisement is a mean-spirited mind game or sick joke by an unknown person or persons in a multinational telecommunications corporation that no doubt is part of the 9/11 cover-up.  Who would know better how news media personnel obtained such quick access to bogus calls giving lurid details about terrorists which then became headline news and justification for war?  I share this information with you because this Verizon advertisement illustrates the mind-set that we are dealing with -- you in your official capacity to investigate the downing of MH17 and I in my personal struggle to uncover the truth about 9/11.  I call our adversary the Praxis of Evil.
Very truly yours,
Stephen M. St. John

 

VerizonAdvert.jpg

 

 

back to contents

* * * * * * *


Thank you for visiting
show-the-house.com!
Please come back soon!
 
 

 
 
* * * * * * *
©  Stephen M. St. John 2007, 2023
 
All original articles written by Stephen M. St. John and published on this website and its forerunner mysite.verizon.net/vze4wbps are fully protected by copyright law.  All rights are reserved.  However, non-commercial dissemination of these articles is allowed and encouraged so long as there is no change to the text or its meaning and proper attribution is given to the author, Stephen M. St. John.  Requests for commercial republication should be directed to the author through the contact information given below.  The author is not responsible for any changes made to the contents of this website without his awareness and consent, and will as soon as possible restore the true content if and when such unauthorized changes are discovered.
 
Current (2023) contact information:
 
Email:
stephen@show-the-house.com
stephen.m.st.john@gmail.com
 
Telephone:  669 388 0931
 
Smoke Signal, Radiation Flash:  37° 21' 57" N, 121° 51' 11" W at 100 feet elevation
 
For regular mail via USPS, please send to
:
 
Stephen M. St. John
Post Office Box 720274
San José, CA   95172
United States of America
 
For FedEx, UPS, Amazon, and other shipments, please send to:
 
Stephen M. St. John
Colonnade # 720274
200 South 3rd Street
San José, CA 95112-9998
USA
 
(The San José contact information shown above supercedes all previous contact information that may appear in this website including the mailing addresses Post Office Box 449, Rockefeller Center, New York, NY 10185; Post Office Box 1223, Newark, CA 94560; the email address metatron.metatron@verizon.net; and telephone numbers 212 534 5024, 917 519 2905 and 408 658 4717.)

* * * * * * *