Pages

Thursday, March 11, 2010

Al Gore's drug phones and murder of Ron Brown


My apologies for last post - I sent one yahoo sent the rest. I am told it happens from time to time. Makes me mad, a number of members unsuscribed, they thought I was spamming.  David H.
Al Gore's drug phones and murder of Ron Brown
Open post sent March 29, 2007 to:U.S. Vice-President Richard Cheney vice_president@...
Canadian Prime Minister, Stephen Harper 
pm@... 
From: Captain Field McConnell and David Hawkins
Forensic Economists at Hawks' CAFE  
http://www.hawkscafe.com/   http://groups.yahoo.com/group/hawkscafe/
Copies include:
United States Representative Ron Paul, 14th. District of Texasrep.paul@... http://www.house.gov/paul/
Jack Blood,  http://jackblood.netfirms.com/home/jackblood@... Eric Sauve, CEO, Co-founder of Tomoye Corporation, esauve@... 
Kristine Marcy and Bruce McConnell, 
Executive Consultants,
McConnell International LLC 
contactus@... 


Dear Vice-President Cheney and Prime Minister Harper
Re: Al Gore's drug phones and murder of Ron Brown
In 1993, the Clinton White House solved a problem associated with  "AT&T Telephone Security Device" at a meeting chaired by Vice President Al Gore and attended by Webster Hubbell, the later convicted Rose Law Firm partner of Hillary Clinton, Attorney General Janet Reno, Commerce Secretary Ron Brown, and, Director of Office of Management and Budget Leon Panetta.
Panetta (right) meets with National Security Advisor Anthony Lake and President Clinton in 1994.
http://en.wikipedia.org/skins-1.5/common/images/magnify-clip.png
Panetta (right) meets with National Security Advisor Anthony Lake and President Clinton in 1994. http://en.wikipedia.org/wiki/Leon_Panetta
Gore and his insiders decided to buy the entire production of AT&T's secure telephony system with money confiscated by the Department of Justice from the drug cartels and thereby prevent Americans from using the system to thwart FBI or government eavesdropping.
Hawks CAFE believes that Al Gore and Clinton White House insiders privatized AT&T's secure "Drug Phones" and gave them - knowingly or unknowingly - to an 'Arkancide' murder-for-hire network.
The Arkancide network appears to have killed Ron Brown and many of his Commerce Department colleagues with a thermite (aluminum powder boosted) bomb on April 2, 1996 leaving a signature M.O. consistent with the most recent FBI profiles descrbing the suspected UNAbomber as a blue-collar aircraft mechanic i.e. not Ted Kaczysnki.
The signature of subsequent killings, including Kyoto 9/11, suggests Al Gore's clients had access through AT&T's secure virtual private network (VPN) to an Arkancide murder-for-hire service, with hitmen possibly provided by Tomoye or McConnell International in Canada and Washington, D.C., to ensure the principals had alibis at the time of a murder.
We ask you to investigate who was issued Al Gore's drug phones and what they were doing with them on April 2, 1996 when Ron Brown and his Commerce Department colleagues died, and on September 11, 2001, when Carlton Bartels and over 600 of his colleagues at CO@... and Cantor Fitzgerald - a principal competitor to Gore's Kyoto boosters - were murdered by UNABOMB-style devices atop the North Tower.
Please let us know when or if you have something of value to add to our research.
Yours sincerely,
Field McConnell Tel: 218 329 2993
28 year airline and 22 year military pilot,
23,000 hours of safety 
avalonbeef@...,
David Hawkins Tel: 604 542-0891 hawks-cafe@... 
Notes: "Al Gore's drug phones and murder of Ron Brown"
April 2, 1996 - T-43A jet (a modified Boeing 737-200 used by the U.S. Air Force) carrying U.S. Commerce Secretary Ron Brown crashed in Yugoslavia. Subsequent U.S. Air Force report blamed crash on failure of command, aircrew error and an improperly designed instrument approach procedure. Maintenance chief for the navigation system at the airport where Brown's plane was headed committed suicide Saturday April 6. Cadavers from crash arrived at Dover AFB Delaware and are alleged to have carried chemical traces of Thermite, a chemical using in bombs boosted by UNABOMB-style aluminum powder to blow safes and bunker doors. BILL CLINTON alleged to have ordered all cadavers cremated and others are trying to block the order. Victims of crash include Ronald H. Brown Secretary of Commerce and 11 senior officers of U.S. DEPARTMENT OF COMMERCE, James Lewek, CIA Analyst, Lee Jackson, Treasury U.S. Executive Director, European Bank for Reconstruction and Development, Nathaniel Nash N.Y. Times and six USAF personnel, including Ashley Davis, Capt. USAF Pilot, Timothy Shafer, Capt., USAF Pilot and Cheryl Turnage, TSgt, USAF. Ron Brown's  law  partner  at Patton Boggs and Blow was murdered in South Africa WITHIN ONE HOUR OF THE PLANE CRASH." Sherman  Skolnick,  the  Chicago-based  investigator,  adds  that "Apparently, the plane broke up  over  an  area of some 17 square miles. http://legalminds.lp.findlaw.com/list/cyberjournal/msg00059.html
http://www.newsmax.com/archives/articles/2002/8/29/103257.shtml
Secret Documents: Hubbell Wanted Federal Access to Phones
Charles R. Smith
Thursday, Aug. 29, 2002
Al Gore once assured the American public that an Orwellian government would not monitor us. Even today, Al Gore will not claim that he planned to enable the government to tap every phone in the United States if it so desired.
Al Gore wanted to be Big Brother. In 1993, Vice President Al Gore spearheaded a project called "Clipper" which was designed to monitor America. Gore's leadership in this scheme to allow the Feds to have easy access to bug American telephones is all too well documented for him to deny.
"We also want to assure users of key escrow encryption products that they will not be subject to unauthorized electronic surveillance," wrote Al Gore in a 1994 memo to Congress.
"As we have done with the Clipper Chip, future key escrow schemes must contain safeguards to provide for key disclosures only under legal authorization and should have audit procedures to ensure the integrity of the system," wrote Gore.
Hubbell and a Secret Project
One document released by the Justice Dept. is a March 1993 Justice Dept. memo from Stephen Colgate, Assistant Attorney General for Administration, to Webster Hubbell.
In 1993, Webster Hubbell, the now convicted Rose office law partner of Hillary Clinton, served as the number two at the Justice Department. Both Gore and Janet Reno personally tasked Hubbell to run the Clipper project.
Colgate's 1993 memo to Hubbell provides the details of the Gore plan. According to the Colgate memo, Vice President Al Gore chaired a meeting with Hubbell, Reno, Commerce Secretary Ron Brown, and Leon Panetta in March 1993. The meeting was on the "AT&T Telephone Security Device".
In 1992, AT&T had developed secure telephones that the U.S. government could not tap. In response, AT&T was secretly paid by the Clinton administration to keep the secure phones out of the American market. According to Colgate's memo, the secure phones were simply too dangerous for American citizens.
"AT&T has developed a Data Encryption Standard (DES) product for use on telephones to provide security for sensitive conversations. The FBI, NSA and NSC want to purchase the first production run of these devices to prevent their proliferation. They are difficult to decipher and are a deterrent to wiretaps," Assistant Attorney General Colgate wrote to Webster Hubbell.
Secret Fund
The basic idea of the plan was to pay money to AT&T into using a National Security Agency (NSA) developed chip called CLIPPER inside its phones and computers. The Clipper chip would enable the Federal government to monitor both secure computer and telephone conversations.
Hubbell arranged for the entire production run of secure AT&T phones to be secretly purchased, using the Department of Justice "confiscation" fund supplied by the "drug war", in order to keep the purchase off the general books.
The project also included plans to "mandate" the Clipper chip into all U.S. homes and businesses. According to a secret March 1993 memo to Webster Hubbell, "FBI, NSA and NSC want to push legislation which would require all government agencies and eventually everyone in the U.S. to use a new public-key based cryptography method."
The plan to have access to every American's phones was justified in a SECRET memo to Webster Hubbell by the National Security Agency. According to Stewart Baker, NSA General Counsel, the super-secret agency "considered seeking legislation to give the government authority to regulate the manufacture or importation of encryption into the United States."
"But regulation or forbidding encryption would be a big step - and a controversial one. It seems prudent to try the less drastic voluntary approach first," noted NSA's Baker in his memo to Hubbell.
"It is also possible that competitors will not use CLIPPER and will tout their devices' lack of law enforcement access. If so, the government will have to face the harder question of whether to make key escrow mandatory," noted Baker in the SECRET memo.
"But that is a question the government would have to face today if AT&T introduced a successful non-key-escrow device. In addition to delaying the problem, getting AT&T to use CLIPPER voluntarily will give decision makers the advantage of real-life experience with key-escrow, which will provide a much better basis for deciding whether mandatory key-escrow is practicable."
Despite public statements to the contrary, and payouts to AT&T, the Clinton administration determined that mandatory CLIPPER chips were the only answer. According to a 1993 FBI memo to then Clinton national security advisor George Tenet, "technical solutions, such as they are, will only work if they are incorporated into all encryption products. To ensure that this occurs, legislation mandating the use of Government approved encryption products or adherence to Government encryption criteria is required."
Achilles Heel
However, according to secret FBI documents, the Clipper chip also had an "exploitable" feature. That "exploitable feature" was an Achilles heel.
In 1993, Benita Cooper, NASA Associate Administrator for Management Systems and Facilities, documented the fatal flaw in Gore's great computer-security idea.
"The [Clipper] Chip programmer is a device provided by the National Security Agency. There is no assurance, without scrutiny, that all keying material introduced during the chip programming is not already available to the NSA. Thus, not only do the escrow key agents have a decryption capability, the NSA also retains this capability," wrote Ms. Cooper in her rejection of the Clipper chip for NASA.
"Compromise of the NSA keys, such as in the Walker case, could compromise the entire EES [Escrowed Encryption Standard] system," concluded Ms. Cooper.
Despite the public assurances by Al Gore that the Clipper project would require legal authority to monitor subjects, it was clear at the technical level that the chip did not require any authority other than a secret okay from the NSA.
Criminals and Secrets
The secret Clipper project also had another flaw. A corrupt individual led it. In April of 1994, Hubbell resigned from the Justice Department under allegations of fraud.
Even though Hubbell was gone, the access-to-your-computer idea did not die. According to the 1996 report to V.P. Gore by then CIA Director Deutch, Ms. Reno proposed an all out Federal take-over of the computer security industry.
The Justice Department, proposed "legislation that would ... ban the import and domestic manufacture, sale or distribution of encryption that does not have key recovery. Janet Reno and Louis Freeh are deeply concerned about the spread of encryption. Pervasive use of encryption destroys the effectiveness of wiretapping, which supplies much of the evidence used by FBI and Justice. They support tight controls, for domestic use."
If Al Gore had become President, it is certain that the mandatory government phone and computer bug legislation would have become reality along with another term for Louis Freeh as FBI director.
As it is, the follow-on to Clipper authorized by the Freeh led FBI is called Carnivore. Carnivore is simply a system to monitor the keystrokes on a target computer, and it is similar in construction to many virus programs that circulate on the Internet. The Carnivore system is so imperfect that it gathers unneeded, and sometimes, unwarranted information that must be screened out.
Read more on this subject in related Hot Topics:

No comments:

Post a Comment