Friday, April 23, 2010

Bank One 9/11 – How McConnell wired Obama for Rezko contract hits

Belief Bruce McConnell, Bank One public-key network wire credit to Con Air contract hit teams recruited by Rezko; launder insurance through tax shelters Women @ Sidley associates Michelle Obama.

Open e-mail sent June 7, 2008 to:
Kristine Marcy (Tel: 202-289-8800) Homeland Security Team Leader, McConnell International LLC, and Patricia McGinnis (Tel: 202 728 0418) President and CEO, Council for Excellence in Government, and the clients of their Suite 450 associates who share space at 1301 K Street NW West Washington, DC 20005contactus@... pmcginnis@...
Field McConnell and David Hawkins,
Forensic Economists at Hawks' CAFE

Copies: Susan A. Stone, Partner, Sidley Austin, Chicago sstone@...
Kathryn Stell, Director of Diversity, Sidley Austin   kstell@...
U.S. Attorney General, Michael Mukasey, Department of Justice 
AskDOJ@... U.S. Vice President Richard Cheney vice_president@...
For attention of Kristine Marcy, Patricia McGinnis and the clients of their Suite 450 associates who share space at 1301 K Street NW West Washington, DC 20005
Dear Ms. Marcy and Ms. McGinnis:
Bank One 9/11 – How McConnell wired Obama for Rezko contract hits
Hawks CAFE believes Bruce McConnell is using Bank One public-key communications networks to wire credit to Con Air contract hit teams recruited by Tony Rezko and Ba'ath Party intelligence agents.
Our forensic economists further believe that after the Con Air war games of 9/11, Mr. McConnell laundered the proceeds of 9/11 victim-life insurance through Bank One tax shelters set up for Rezko's clients by the Women @ Sidley associates of Michelle Obama.
"How To Make Security And Privacy Fit Together Bruce McConnell  .. Criminal, terrorist and nation-state cyber attacks against banks, technology companies, online merchants, individuals and government agencies cost the U.S. economy $400 billion annually .. These attacks are most often designed to steal information, such as business and military secrets, and personal data. Often they succeed in installing hidden malware that will 'phone home' with updates, or enable a denial of service in the future. ' Cyberspace has emerged as a war-fighting domain,' said Gen. James E. Cartwright, head of the U.S. Strategic Command .. Supreme Court Justice Stevens wrote in a majority opinion in 1995, 'Protections for anonymous speech are vital to democratic discourse.' .. creating greater certainty about who is online could increase the already excessive, unwanted and unauthorized surveillance and profiling of individuals that is conducted today by governments, businesses and criminals.  .. Bruce McConnell is a former White House IT policy chief, and is president of McConnell International , a Washington-based consultancy. He is a member of the Commission on Cyber Security for the 44th Presidency , convened by the Center for Strategic and International Studies ."
'Air Force One is next,' read the message received by the U.S. Secret Service at 9 a.m. Sept. 11, after two hijacked planes struck the twin towers of the World Trade Center in New York. Three minutes later, Secret Service agents grabbed Vice President Dick Cheney from his seat opposite a television set in the White House and hustled him down to the president's emergency operations center, a bunker built to withstand a nuclear blast. The terrorists' message threatening Air Force One was transmitted in that day's top-secret White House code words. As the clock ticked away, the Secret Service reached a frightening conclusion: The terrorists had obtained the White House code and a whole set of top-secret signals. This made it possible for a hostile force to pinpoint the exact position of Air Force One, its destination and its classified procedures. In fact, the hijackers were picking up and deciphering the presidential plane's incoming and outgoing transmissions. The discovery shocked everyone in the president's emergency operations center – Cheney, National Security Adviser Condoleezza Rice and Transportation Secretary Norman Mineta. Their first question was: How did the terrorists access top-secret White House codes and procedures? Is there a mole, or more than one enemy spy in the White House, the Secret Service, the FBI, the CIA or the Federal Aviation Administration? In the week after the attacks in New York and Washington, more hair-raising facts emerged. The terrorists had also obtained the code groups of the National Security Agency and were able to penetrate the NSA's state-of-the-art electronic surveillance systems. Indeed, they seemed to have at their disposal an electronic capability that was more sophisticated than that of the NSA. This startling observation came as no surprise to those tracking the globe-spanning investments of Saudi Arabia's bin Laden family and those of its exiled son, Osama, in some of the world's biggest and most advanced satellite and telecommunications companies. Bin Laden also has the NSA beat on the employment front, hiring the best computer experts on the market. One such is Nabil Khan Kani, a Syrian who lived in Barcelona with his Spanish wife, Jenna Florine, in the late 1980s and early 1990s. No one ever suspected what the amiable Syrian was really up to until January 2000, when FBI agents found two apartments he used thousands of miles from Barcelona, in the Bab el-Shabaa district of Saana, Yemen. The apartments served as transit points for Egyptians suspected of operational links with the Egyptian Islamic Jihad and Algerians connected with the Armed Islamic Group, or GIA. There, investigators turned up nine fake identity cards in different names, all with Kani's photo, Spanish, Italian, French and Sudanese passports, likewise with the same photo but in different names, and two pistols fitted with silencers. Kani must have used yet another alias for his getaway. His whereabouts are unknown to this day. Computer and terrorism experts suggest that the missing Syrian computer whiz was the author of the technology known as steganography, as first described in the Washington Post yesterday. This technology enables users to bypass electronic monitoring by hiding messages randomly in seemingly innocent digital files, such as music files, those of the popular online marketplace eBay, pornographic files or even e-mail headers. Scrambled with the help of basic encryption tools, they can only be read by those with a 'key.' These messages leave no trace of their presence. U.S. intelligence has been unable to trace their authors and recipients in the three years since first detecting evidence of their existence in the files of the bin Laden organization. U.S. agencies now believe that the attacks in New York and Washington were coordinated through those encrypted electronic messages, which were opened by 'key' holders. They also believe that terrorists are in possession of all or part of the codes used by the Drug Enforcement Administration, the National Reconnaissance Office, Air Force Intelligence, Army Intelligence, Naval Intelligence, Marine Corps Intelligence and the intelligence offices of the State Department and Department of Energy. Intelligence and counter-terror sources report that, while rescuers in New York andWashington were sifting through rubble inch by inch, US government experts were changing codes one-by-one – and even more difficult, replacing procedures and methods of encryption. The nagging question of a mole in the highest reaches of the U.S.government and intelligence community – with direct or indirect links with bin Laden – remains. Since no single individual has access to every top-level code at any given time – a single mole would not answer the case; it would have to be a large, widely spread number.U.S. experts do not believe bin Laden was capable of infiltrating double agents into the heart of the U.S. administration on a large scale. They are looking elsewhere, instead, at a country with a very well-oiled intelligence apparatus – Iraq."
Our Abel Danger team invites you to comment on the proven tax frauds of Bank One, the proven wire frauds of Tony Rezko, the proven links to terrorist organizations of Michelle Obama (Google Ayers, Dohrn), the apparent `Con Air' 8(a) loan frauds of Kristine Marcy and apparent use of Cyber Security for the 42nd Presidency by Bruce McConnell and Clinton White House insiders, in the attempted destruction of the 43rdPresidency of George Bush on 9/11.
Failing your prompt response, prepare yourselves for appropriate legal actions from Abel Danger to neutralize any threats to theUnited States from criminal, terrorist and nation-state cyber attacks, including any threats from Bruce McConnell, Michelle Obama and Tony Rezko, the latter being in temporary custody of `Con Air' Marshals!
Yours sincerely,

Field McConnell, United States Naval Academy, 1971, Forensic Economist 
fbi@... or avalonbeef@... Astana, Kazakhstan 30 year airline and 22 year military pilot, 23,000 hours of safety, Tel: +7 (777) 952 9767

David Hawkins hawks-cafe@... Tel: 604 542-0891 Leader, Reform Party of British Columbia, Former oil industry operating engineer; Blow-out specialist, safety officer, trouble shooting, 15 years experience explosives, incendiaries, radioactive materials

Civil Case 3:07-cv-49  'Hawks CAFE v. Global Guardians'
Clerk's Office, Federal District Court of North Dakota
655 1st Ave. North, Suite 130, Fargo ND 5810

No comments: