Pages

Sunday, March 28, 2010

Hillary Clinton, 8(a) Arkancide and the al-Qaeda database


Belief McConnell Int. offers 8(a) Arkancide service to Hillary Clinton with small business loans to mujaheddin assassins on an `al-Qaeda' database, stolen by former CIA director John Deutch.

Open e-mail sent April 22, 2008 for attention:
Bruce McConnell and Kristine Marcy, Homeland Security Team, 
contactus@... http://www.mcconnellinternational.com/associates.html
From:
Field McConnell USNA '71 and David Hawkins,
Forensic Economists at Hawks' CAFE 
fbi@... avalonbeef@...
http://www.hawkscafe.com/ http://groups.yahoo.com/group/hawkscafe/
Copies for reference:
Yolanda Gibson-Michaels, V. Director, No Fear Coalition, 
ygmichaels@...
Katheryn R. Stell, Sidley Austin Director of Diversity (LGBT) kstell@...  http://www.sidley.com/ourfirm/highlights/womeninleadership/
Dr. Jack Stockwell jack@...
http://www.jackstockwell.com/radio/default.asp

Dear Mr. McConnell and Ms. Marcy:
Hillary Clinton, 8(a) Arkancide and the al-Qaeda database
Hawks CAFE believes McConnell International is providing an 8(a) Arkancide (`murder for hire') service to Hillary Clinton by offering small-business loans to international mujaheddin assassins through a database known as `al-Qaeda' which was allegedly stolen from the CIA by its disgraced former director John Deutch.http://www.carana.com/assets/Random/small_business_program.jpg
http://www.usdoj.gr/ch14a.html
http://www.nucnews.net/nucnews/2000nn/0010nn/001009nn.htm#13
"Al Qaeda - The Database  http://www.thetruthseeker.co.uk/article.asp?ID=3836 .. British Foreign Secretary Robin Cook told the House of Commons that 'Al Qaeda' is not really a terrorist group but a database of international mujaheddin and arms smugglers used by the CIA and Saudis to funnel guerrillas, arms, and money into Soviet-occupied Afghanistan .. 'I first heard about Al-Qaida while I was attending the Command and Staff course in Jordan. I was a French officer at that time and the French Armed Forces had close contacts and cooperation with Jordan . . . 'Two of my Jordanian colleagues were experts in computers. They were air defense officers. Using computer science slang, they introduced a series of jokes about students' punishment. 'For example, when one of us was late at the bus stop to leave the Staff College, the two officers used to tell us: 'You'll be noted in 'Q eidat il-Maaloomaat' which meant 'You'll be logged in the information database.' Meaning 'You will receive a warning . . .' If the case was more severe, they would used to talk about 'Q eidat i-Taaleemaat.' Meaning 'the decision database.' It meant 'you will be punished.' For the worst cases they used to speak of logging in 'Al Qaida.' 'In the early 1980s the Islamic Bank for Development, which is located in Jeddah, Saudi Arabia, like the Permanent Secretariat of the Islamic Conference Organization, bought a new computerized system to cope with its accounting and communication requirements. At the time the system was more sophisticated than necessary for their actual needs. 'It was decided to use a part of the system's memory to host the Islamic Conference's database. It was possible for the countries attending to access the database by telephone: an Intranet, in modern language. The governments of the member-countries as well as some of their embassies in the world were connected to that network. '[According to a Pakistani major] the database was divided into two parts, the information file where the participants in the meetings could pick up and send information they needed, and the decision file where the decisions made during the previous sessions were recorded and stored. In Arabic, the files were called, 'Q eidat il-Maaloomaat' and 'Q eidat i-Taaleemaat.' Those two files were kept in one file called in Arabic 'Q eidat ilmu'ti'aat' which is the exact translation of the English word database. But the Arabs commonly used the short word Al Qaida which is the Arabic word for 'base.' The military air base of RiyadhSaudi Arabia is called 'q eidat 'riyadh al 'askariya.' Q eida means 'a base' and 'Al Qaida' means 'the base.' 'In the mid-1980s, Al Qaida was a database located in computer and dedicated to the communications of the Islamic Conference's secretariat. ' In the early 1990s, I was a military intelligence officer in the Headquarters of the French Rapid Action Force. Because of my skills in Arabic my job was also to translate a lot of faxes and letters seized or intercepted by our intelligence services . . . We often got intercepted material sent by Islamic networks operating from the UK or from Belgium. 'These documents contained directions sent to Islamic armed groups in Algeria or in France. The messages quoted the sources of statements to be exploited in the redaction of the tracts or leaflets, or to be introduced in video or tapes to be sent to the media. The most commonly quoted sources were the United Nations, the non-aligned countries, the UNHCR and . . . Al Qaida. 'Al Qaida remained the data base of the Islamic Conference. Not all member countries of the Islamic Conference are 'rogue states' and many Islamic groups could pick up information from the databases. It was but natural for Osama Bin Laden to be connected to this network. He is a member of an important family in the banking and business world. 'Because of the presence of 'rogue states,' it became easy for terrorist groups to use the email of the database. Hence, the email of Al Qaida was used, with some interface system, providing secrecy, for the families of the mujaheddin to keep links with their children undergoing training in Afghanistan, or in Libya or in the Beqaa valley, Lebanon. Or in action anywhere in the battlefields where the extremists sponsored by all the 'rogue states' used to fight. And the 'rogue states' included Saudi Arabia. When Osama bin Laden was an American agent in Afghanistan, the Al Qaida Intranet was a good communication system through coded or covert messages. Al Qaida was neither a terrorist group nor Osama bin Laden's personal property . . . The terrorist actions in Turkey in 2003 were carried out by Turks and the motives were local and not international, unified, or joint. These crimes put the Turkish government in a difficult position vis-a-vis the British and the Israelis. But the attacks certainly intended to 'punish' Prime Minister Erdogan for being a 'too tepid' Islamic politician. ' . . . In the Third World the general opinion is that the countries using weapons of mass destruction for economic purposes in the service of imperialism are in fact 'rogue states,' specially the US and other NATO countries. ' Some Islamic economic lobbies are conducting a war against the 'liberal' economic lobbies. They use local terrorist groups claiming to act on behalf of Al Qaida. On the other hand, national armies invade independent countries under the aegis of the UN Security Council and carry out pre-emptive wars. And the real sponsors of these wars are not governments but the lobbies concealed behind them. 'The truth is, there is no Islamic army or terrorist group called Al Qaida. And any informed intelligence officer knows this. But there is a propaganda campaign to make the public believe in the presence of an identified entity representing the 'devil' only in order to drive the 'TV watcher' to accept a unified international leadership for a war against terrorism. The country behind this propaganda is the US and the lobbyists for the US war on terrorism are only interested in making money.'http://100777.com/node/1462
Our Abel Danger counter intelligence team has determined that in 1993, John Deutch and Bruce McConnell began using public-key encryption to secure links between SMA 8(a) small businesses owned by Weatherwomen terror groups and the al-Qaeda database.http://www.sbaonline.sba.gov/IG/971101.pdf
http://www.hawkscafe.com/101.html
You must be aware that 1993 saw a failed attempt to assassinate former U.S. president George Bush Sr. in Kuwait and the first WTC bombing by Iraqi agent Ramzi Yusef, with both attacks falsely attributed by the Clinton-appointed AG, Janet Reno, to `al-Qaeda'.
Yours sincerely,
Field McConnell, United States Naval Academy, 1971, Forensic Economist fbi@... or avalonbeef@... Astana, Kazakhstan  28 year airline and 22 year military pilot, 23,000 hours of safety

David Hawkins 
hawks-cafe@... Tel: 604 542-0891 Leader, Reform Party of British Columbia, Former oil industry operating engineer; Blow-out specialist, safety officer, trouble shooting, 15 years experience explosives, incendiaries, radioactive materials
Civil Case 3:07-cv-49  'Hawks CAFE v. Global Guardians'http://www.hawkscafe.com/107.html
Clerk's Office, Federal District Court of North Dakota
655 1st Ave. North, Suite 130, Fargo ND 5810
Notes: "Hillary Clinton, 8(a) Arkancide and the al-Qaeda database"
"Does my company need to be certified to do business with Raytheon? As a prime contractor to the U.S. Government, Raytheon complies with the U.S. Small Business Administration's (SBA) certification guidelines. If you are a small, disadvantaged business or a small business located in a HUB-Zone, you must be certified through the SBA in order for Raytheon to demonstrate compliance with federal acquisition regulations regarding contracting with small businesses. If you are a small business, woman-owned small business, veteran-owned or service disabled veteran-owned small business, you can self-certify as to your business size. Raytheon relies on the U.S. SBA PRO-Net System for business size verification, therefore it is recommended that all small businesses register on the U.S. SBA PRO-Net website at http://pro-net.sba.gov. Raytheon also recommends minority-owned businesses obtain certification through one of local councils of the National Minority Supplier Development Council and women owned businesses obtain certification through one of the local Women Business Enterprise Council affiliations."http://www.raytheon.com/connections/supplier/diversity/portal/faq/index.html

No comments:

Post a Comment