Thursday, March 11, 2010

Virtual Deception and Clinton War Games


Synopsis: Belief Global Guardians coordinated virtual deception maneuvers and killings during 9/11 war games with virtual private networks, fraudulently procured by Clinton WH (1993-2001).
Open text of e-mail and mail message sent July 27, 2007 to:
Representative Ron Paul, 14th. District of Texas, rep.paul@...
Representative Duncan Hunter, 52nd District of California bre@... 
From: Captain Field McConnell, Peter Tedesco and David Hawkins Forensic Economists at Hawks' CAFE  http://www.hawkscafe.com/  http://groups.yahoo.com/group/hawkscafe/
Copies to file:
Civil Case 3:07-cv-24  "McConnell v. Boeing and ALPA"
Civil Case 3:07-cv-49  "Hawks CAFE v. Global Guardians"
http://www.hawkscafe.com/107.html
Clerk's Office, Federal District Court of North Dakota
655 1st Ave. North, Suite 130, Fargo ND 58102
Copies for reference:
Michael Badnarik, 'Lighting the Fires of Liberty' 
scholar@... Alex Jones  aaron@... Jack Blood jackblood@...
WISH-TV, rdawson@... ABC-15, investigators@...  Senator Ted Stevens, Alaska, Congressman Jim Oberstar, Minnesota
Captain John Prater, ALPA President, 
john.prater@...
Pilots For Truth, 
pilotsfortruth@... Whistleblowers, ygmichaels@... 
Colonel Phillip S. Meilinger, USAF, School of Advanced Airpower Studies and Dr. Thomas Barnett formerly (?) of US Naval War College 
tom@...
Dear Representatives Hunter and Paul:
Re: Virtual Deception in Clinton War Games
Hawks' CAFE has alleged that the US Naval War College was paid by BNP Paribas – a corporate member of the French American Foundation and sponsor of its former Young Leaders Hillary and Bill Clinton – to infiltrate CO2e.com carbon-credit dealers during virtual desk-top 'war games' staged atop the North Tower May 2000-September 2001.
http://groups.yahoo.com/group/hawkscafe/message/212 
We note that virtual deception maneuvers used to fly decoy-and-drone passenger aircraft during the 9/11 war games, also allowed the College's Dr. Thomas Barnett to produce the "first live-broadcast, mass snuff film in human history" and therby divert attention from hedge-fund frauds apparently executed by the self-styled 'Global Guardians', including Saddam's Oil-for-Food banker, Paribas, and insiders of the Clinton-Gore White House .http://www.thomaspmbarnett.com/published/wsj.htm
We also note that one of Barnett's US Naval War College colleagues and a signatory to the Project for a New American Century, Colonel Philip S. Meilinger, has suggested that "Airpower includes not only military assets, but an aerospace industry and commercial aviation" and that is "...feasible to convert civilian airliners into military bombers or cargo aircraft".  http://www.airpower.au.af.mil/airchronicles/cc/meil.html
http://www.newamericancentury.org/RebuildingAmericasDefenses.pdf  

As a lifelong associate of 'airpower', Captain McConnell grew up in a career Air Force family, studied at and graduated from the U.S. Naval Academy at Annapolis and flew for the U.S. Marine Corps, the Air National Guard and for 28 years at a "big six" airline. 
However, never during his youth, his training, nor his 22,000 hours of safe flying was Captain McConnell educated regarding the overt or covert conversion of civilian airliners into military bombers or cargo aircraft for use during war games or training exercises. 
It has been quite common for the airlines' CRAF assets to bolster the lacking military airlift command and as recently as last August Captain McConnell flew U.S. troops to and from deployment and/or training assignments.  However, he can attest to the fact that no commercial airline pilots to his knowledge are aware that their aircraft may have been modified to fly as decoy or droned "binary cluster bombs" as they did on 9/11/01.
McConnell believes the Global Guardians' Joint Force Commanders coordinated 'virtual deception' maneuvers on 9/11 through the use of virtual private networks, fraudulently procured by the Clinton White House for the NATO Partnership-for-Peace program or provided by racketeering private-equity groups in France, Canada or Quebec.
Virtual deception has been defined as "network communication/information system to shape the enemy's [Bush Administration?] view of the battlefield by deliberately and explicitly altering, distorting, blocking, or destroying the real-time information processed in the enemy's imaging and sensor systems with the intent of deceiving the enemy to behave in a predetermined manner, and thus indirectly control the enemy's actions."http://www.airpower.au.af.mil/airchronicles/cc/pasanen.html  
Captain McConnell resigned from the North Dakota Air National Guard in 1993 rather than serve under incoming U.S. President Bill Clinton, a man who McConnell believes to have been involved in Mena drug trafficking in the '80s and to be the corrupt former commander in chief who ordered the virtual deception and killings of 9/11. 
Please call Captain McConnell and allow him to explain to you the nature of the threats to the lives and liberties of Americans from a decade of virtual deception associated with the Clinton war games; why Boeing planes must be cleansed of missile gyroscopes and cluster bombs; how his USNA college classmate, Captain Chic Burlingame on AA77 died, and how to bring to justice the murderers of nearly 3,000 Americans on 9-11-01. 
Yours sincerely,

Field McConnell, Tel: 218 329 2993
28 year airline and 22 year military pilot,
23,000 hours of safety
avalonbeef@...,
David Hawkins Tel: 604 542-0891
hawks-cafe@...
Peter Tedesco, Tel: 718-736-3413
Notes: "Virtual Deception and Clinton War Games"
"Capabilities of Virtual Deception Virtual Deception is by no means a new concept. In fact its roots are centuries old and can be traced back to Sun Tzu who stated, "the primary target is the mind of the opposing commander", and, "all warfare is based on deception" (Sun Tzu 41). Virtual Deception takes the principles envisioned by Sun Tzu and combines them with the capabilities of modern technology. The result is a psychological warfare concept based on the reflexive control of the enemy decision cycle. According to Dr. Tim Thomas of the Foreign Military Studies Office, "Reflexive control involves creating a pattern or providing partial information which causes an enemy to react in a predetermined fashion without the enemy realizing that he is being manipulated" (Thomas 13). The ultimate goal of Virtual Deception is to deliberately manipulate information to deceive the opposing commander to make a decision predetermined and desired by the opposing side. Dr. Tim Thomas has conducted in-depth research on the theory of reflexive control used by the former Soviet Union, and he uncovered the writings of Vladimir Lefebvre, one of the best Soviet minds working on Reflexive Control. Lefebvre believed, "We [the Soviet Union] can influence the channels of information and send messages which shift the flow of information in a way favorable to us" (Reid 293). In addition, he also listed several types of reflexive control that could be exploited by Virtual Deception. They are:
  • transfer of an image of the situation: providing the opponent with an erroneous or incomplete image of the situation.
  • creation of a goal for the opponent
  • form a goal by transferring an image of the situation: creating a false picture
  • transfer of an image of one's own goal: a feint (changing the enemy's perception)
  • transfer of an image of one's own doctrine (false view of decision-making procedures)
  • transfer of one's own image of a situation to make the opponent deduce his own goal
  • reflexive control of a bilateral agreement by a third party
  • reflexive control over an opponent who is using reflexive control: exploiting opportunities
  • identified as imitation of the initiators own process of reflexive control (Reid 296-308).
Using Virtual Deception, each of these reflexive control theories can be applied in the warfare of 2025. The manipulation of a few bits of information in an enemy's information processing system can make the enemy see friendly military assets that do not even exist. This concept I call Virtual Deterrence will be addressed later. A good example of this deterrent capability is illustrated by the possible compromise of the U.S. Army's "All Source Analysis System." According to the U.S. Army, this system will someday, "fuse threat information from all intelligence disciplines and provide correlated intelligence to maneuver commanders and staffs down to battalion level" (www.army.mil). The consequences of the enemy manipulating the system which will handle ninety percent of the Army's intelligence could change the result of the war or prevent it from happening. Similarly, Mr. Jim Cooper, a senior analyst at the Air Force Information Warfare Center: Concepts Division, stated the use of such methods and technology against U.S. classified information systems could provide a "stepping stone" to other classified networks and, "could severely affect the flow of intelligence" throughout U.S. military systems (Cooper Int). Another possible manipulation is attacking the enemy's media to alter the enemy's perception of the global environment or transpiring events. In the Tofflers' book entitled War and Anti-War, "the most powerful mind-wrench of all is meta-propaganda -- propaganda that discredits the other side's propaganda" (168). The result is the swaying of public or political opinion within the enemy nation, which is a powerful weapon. The consequences of using meta-propaganda against the U.S. are drastically increased due to our open democratic society. Also since the media is the watchdog of the government, the manipulation of the watchdog could wreak havoc for our government. Lastly, the ever-increasing capabilities of satellite reconnaissance can be countered without the political upheaval of destroying a foreign satellite. Since most nations believe in the vehicular sovereignty of satellites, the destruction of one is liable to prompt a declaration of war. However, Virtual Deception techniques could be used to manipulate or leech the data traveling through the satellite itself without the enemy knowing about the intrusion. All of these possibilities have significant ramifications for the military of 2025."
http://www.airpower.au.af.mil/airchronicles/cc/pasanen.html

No comments: