Evidence Al Gore told John Deutch, John Shalikashvili to steal CIA-Pentagon encryption keys so Carlyle Quebec investors could tunnel into al-Qaeda 9/11 war game for life insurance & hedge fund frauds.
Open e-mail sent Sunday, April 8, 2007 to: U.S. Vice-President Richard Cheney vice_president@...
Canadian Prime Minister, Stephen Harper pm@...
From: Captain Field McConnell and David Hawkins, Forensic Economists at Hawks' CAFE http://www.hawkscafe.com/ http://groups.yahoo.com/group/hawkscafe/
Copies include: David Blood & Al Gore, Co-founders, Generation Investment Management, Washington, D.C. (Tel: 202 785 7400) info@... Kristine Marcy and Bruce McConnell, Executive Consultants, McConnell International LLC contactus@...
Dear Vice-President Cheney and Prime Minister Harper
Re: Public key, private tunnel to al-Qaeda, Quebec
Canadian Prime Minister, Stephen Harper pm@...
From: Captain Field McConnell and David Hawkins, Forensic Economists at Hawks' CAFE http://www.hawkscafe.com/ http://groups.yahoo.com/group/hawkscafe/
Copies include: David Blood & Al Gore, Co-founders, Generation Investment Management, Washington, D.C. (Tel: 202 785 7400) info@... Kristine Marcy and Bruce McConnell, Executive Consultants, McConnell International LLC contactus@...
Dear Vice-President Cheney and Prime Minister Harper
Re: Public key, private tunnel to al-Qaeda, Quebec
Hawks CAFE believes that in March 1993, al-Qaeda's clients ordered U.S. Vice-President Al Gore to equip an "Interagency Working Group on Environmental Justice" with public encryption keys for private tunnels used to move, conceal and communicate with 'al-Qaeda' assassins from a government-sponsored base in Quebec. http://groups.yahoo.com/group/hawkscafe/message/143
By 1997, John Deutch, disgraced director of the Central Intelligence Agency had stolen encryption keys, tunnels and 17,000 pages of top secret information from the agency and John Shalikashvili, then Chairman of the Joint Chiefs of Staff, had stolen encryption keys, tunnels and details of almost all America's weapons programs from the Pentagon.
The skilled maneveurs executed by 'al-Qaeda' special weapons and tactics teams during the June 1-2, 2001 war game (below), suggest that Al Gore instructed Deutch and Shalikashvili to transfer U.S. military encryption keys to CAI-Carlyle Canada private equity investors in China and Quebec and that these investors were then able to 'tunnel' into the war games of 9/11 to make a killing on life insurance and hedge fund frauds.
Hawks CAFE is sharing this information with you and the public following the Jeffersonian maxim that "An informed public will make the right decision".
If you want to know what we think is the right decision, please call the numbers below.
Yours sincerely,
Field McConnell Tel: 218 329 2993
28 year airline and 22 year military pilot,
23,000 hours of safety avalonbeef@...,
Notes: "Public key, private tunnel to al-Qaeda, Quebec"
"Operation Amalgam Virgo is a CINCNORAD joint task counter-terrorist and field training exercise (FTX) carried out in Tyndall Air Force Base, Florida on early June of 2001. NORAD sponsored the multi-agency planning exercise involving the hypothetical scenario of a cruise missile launched by a rogue government or threats from a barge off the East Coast. Osama Bin Laden was pictured on the cover of the proposal for the exercise. Key military players involved in the exercise also included personnel from the 1st Air Force battalion, the U.S. National Guard, the U.S. Reserve forces, and the U.S. Navy. Several naval ships including the USS Yorktown and the Navy Aegis cruiser were dispatched to the Gulf of Mexico as part of the multi-service anti-cruise missile operation. Military land personnel from the 1st Air Force also engaged in gathering radar information on low-level targets by using the Joint-Based Expeditionary Connectivity Center (JBECC), a mobile shelter capable of being deployed to high-risk regions while providing early warning signals on cruise missile attacks."
Parisien "PET is suite of Encryption Tools all using the same powerful blowfish encryption routines. It also includes a Secure Disk Wipe utility and a Secure File Wipeutility for permanently removing files. THE ENCRYPTION ALGORITHM: All PET encryption utilities use the Blowfish 64-bit / 8 byte block encryption algorithm with a variable length key up to 448 bits. :: File Vault - Self Extracting/Decrypting File System (freeware File Vault - Places a number of user selected files in a single self extracting / self decrypting executable file called a File Vault. A File Vault can be sent easily to anyone over the internet and only accessed with your password. The recipient of a File Vault does not have to have any special software installed to decrypt or access a file vault. Each File Vault is totally self contained. This makes for easy attaching, receiving and general use. The File Vault allows you to open the vault, access the files, then close the vault which performs a secure wipe of the files from the disk surface. FILE VAULT USES THE BLOWFISH ALGORITHM. File Vault allows you to open the vault, access the files, then close the vault which performs a secure wipe of the files from the disk surface. In an encrypted file vault, filename information is encrypted too, so if someone examines the vault with a disk editor, no information on contents is available other than the optional description line entered during creation. File Vault also has a simple system to facilitate Secure Email." http://www.parisien.org/products.htm
"VPN Tunneling Protocols Tunnels allow users to send data in secure packets across a network that is not secure, usually the Internet. A tunnel is a group of security protocols, encryption algorithms, and rules. The tunnel uses this information to send secure traffic from one endpoint to the other. A tunnel allows users to connect to resources and computers from other networks .. Encryption On a network that is not secure, hackers can find transmitted packets very easily. VPN tunnels use encryption to keep this data secure. The length of the encryption key and the algorithm used set the strength of encryption. A longer key gives better encryption and more security .. Selecting an encryption and data integrity method Think of security and performance when you select the encryption and data integrity method to use .. Data integrity makes sure that the data a VPN endpoint receives is not changed as it is sent. We give support to two types of data authentication. The first type is 128-bit Message Digest 5 (MD5-HMAC). The second type is 160-bit Secure Hash Algorithm (SHA1-HMAC). Because SHA1-HMAC has more bits, we think it is more safe."
http://www.watchguard.com/help/lss/74/VPNTunnelingProtocols.htm
"Admiral "Mike" McConnell .. became Director of the National Security Agency (NSA) after the Gulf victory and served under both President Bush and President Clinton. Admiral McConnell finally retired from service in 1996 and left the NSA .. SOFTWAR: What is the mission of the NSA? McConnell: Signals Intelligence. SIGINT is NSA's mission. The NSA is either talking to someone or listening to someone talk. The mission is to exploit human intelligence .. SOFTWAR: Can you explain why the Clipper project failed? McConnell: .. Vice President Gore directed us in a meeting early in 1993 to avoid the obvious conflict of interest with the Executive branch holding both keys .. Once Gore had given his mandate, the bureaucracy took over at the Department of Justice and the FBI .. The law enforcement bureaucracy presented a revised Clipper plan to Gore, with the Department of Justice and the Treasury Department as the key holders. Gore reacted strongly, saying this was not what he asked for. However, by then it was too late. The bureaucracy had already released the plan to the public SOFTWAR: Why did the Clinton administration support Clipper so strongly? McConnell: I'm not sure .. It had never gone very far under Bush .. However, under Clinton we were hustled into the oval office and made our presentation during the first few days .. SOFTWAR: RSA recently signed a "memorandum of understanding" to do encryption research with China and this November US Navy officials will be attending ASIACRYPT, a conference on encryption technology, in Beijing. Will the PRC benefit from such cooperation on sophisticated technology? McConnell: Absolutely. Even if the Chinese use weak encryption the sheer volume of their communications will make it impossible for us to monitor. If China were to erect a public key infra-structure it will severely impact our intelligence gathering ability .. SOFTWAR: Documents obtained by Freedom of Information requests show that Vince Foster attended a meeting at the NSA headquarters on May 2, 1993. What role did Mr. Foster have in Clipper or at the NSA? McConnell: Foster had NO NO NO NO role in Clipper. He never went to NSA headquarters to meet on Clipper .. John Podesta was our contact inside the White House. SOFTWAR: Does this lack of awareness reflect a general ignorance about encryption technology in the public and at the highest levels? McConnell: 99% of the American public has no idea what crypto is. SOFTWAR Main Menu. All content COPYRIGHT SOFTWAR (C) 2000. Any reproduction or use of content herein must be approved by SOFTWAR. [Hawks suggest the public interest has precedence - this article suggests that by 2000, the Gore-Clinton White House was engaged in murder-for-hire networking using public key cryptography with the Chinese Communists]" http://www.softwar.net/mcc.html
No comments:
Post a Comment