Wednesday, April 2, 2014

#1909: Marine links MI-3 Mycroft Flash Override to Serco Cope Tiger, ZigBee Autopilot and MH 370 Stealth

Plum City – ( United States Marine Field McConnell has linked former UK Minister of Defence Nicholas Soames’s development of a 30-Day Mycroft Flash Override capability for the traveling guests of the MI-3 Innholders Livery Company to Serco director Maureen Baginski’s alleged hack of a U.S. Air Force “Cope Tiger” war game to capture  a ZigBee-enabled Boeing Uninterruptible Autopilot (BUAP) on MH Flight 370 and fly a Freescale Semiconductors stealth-technology team to Diego Garcia on March 8, 2014.

[Spoliation inference: The United States and United Kingdom has created a “temporary” flash override capability which allows insiders traveling through hotels controlled by the MI-3 Innolders Livery Company  to authorize man-in-the-middle attacks on government leaders and crime-scene investigators as they participate in spurious war games or exercises] Temporary DSN service upgrading to support the NCA, Chairman of the Joint Chiefs of Staff, CINCs, Service Chiefs, or other equivalent personnel during travel is authorized for all precedence levels for up to 30 days. Temporary upgrading is also authorized for emergencies and exercises. Requests should follow the procedures in Enclosure C and must be coordinated with DISA and approved by the CINC or the Service Chief concerned. Approvals of flash override and flash access must be provided to DISA and the Joint Staff. The CINC or Service Chief must identify source of funding to cover additional costs prior to approval.”   

McConnell’s allegations are based on information collected by his Abel Danger research team and presented in the April 1st, 2014 interview with David Hawkins under Project Camelot and Cynthia McKinney’s interviews on April 1st and 2nd of Matthias Chang, a top aide to a former Malaysian Prime Minister, which address the question “WHAT IS THE US HIDING REGARDING MALAYSIAN FLIGHT 370?” … See links below.

David Hawkins  Tuesday, April 1st, 2014 - 12 Noon PT/2PM CT - Interview with David Hawkins: Abel Danger II Re: MH Flight 370

Mathias Chang Part 1 

Mathias Chang Part 2 

Multi-Lateral Exercise Cope Tiger 2014  

While excerpts from relevant texts and references have been added in the notes below, McConnell has decided to offer whistleblower service to explain the jargon associated with Cope Tiger, Stealth, ZigBee and Boeing Uninterruptible Autopilot technologies; identify the flash-override criminal authorities behind the MH 370 hijack, and, provide an expert witness service to prospective plaintiffs in any class action suits for damages in re wrongful deaths associated with apparent malfeasance in the fate of MH 370 by Serco, The Honourable Company of Air Pilots and the Air Line Pilots Association, Int’l (ALPA). He will testify that while flying as a Captain for Northwest Airlines before his CONSTRUCTIVE DISCHARGE he flew Airbus, Douglas or Boeing jets unaware that the UNINTERRUPTIBLE AUTOPILOT was aboard his aircraft and not trained in how to trigger it or the procedures to follow in event of a REMOTELY TRIGGERED CAPTURE as specified in US Patents 6965816 and 6845302, see below, and as experienced by the crews of Adam Air 574, Kenya Airways 507, Air France 447, Sukhoi Superjet 100 and MH370.


It connects each vehicle either on the earth's surface or near the earth's surface with application specific intranets for air, sea and land travel, via either host commercial servers or agency providers through wireless communication gateways and then further interfaces these vehicles in a larger machine messaging matrix via wireless and IP protocols to further coordinate movement assess and manage equipment use and impact on the world resources, societies infrastructure and the environment. This filing focuses directly on PFN/TRAC System use to augment and upgrade public safety and security in the Airline Industry and restrict any unauthorized use of an aircraft. Additionally, this application and related filings teaches the PFN/TRAC System™ use for all vehicle platforms to increase safety and security in a free society like the United State of America.


Directed toward universal commercial-airliner application as an air/ground-lifesaving function, this cost-effective retrofitable system enables airliner-pilots to conveniently actuate an inconspicuous AIRCIA™/enable-switch,—thereby instantly disabling onboard flight-commands to render the airliner's guidance-system irretrievably placed into total reliance upon its existing autopilot-system in RF-communication with encrypted remote ground/air-intercept personnel. Acting to virtually confound any criminal-attempt by a hijacker to commandeer an airliner, the airliner thus becomes flown only as directed by an authorized remote/flight-control station in cooperation with the airliner's remotely-reprogrammed onboard avionics-system, automatically vectoring the airliner to land safely via the existing avionics/autopilot-system at a designated airport. The AIRCIA™-system is initially verified for flight-worthiness operation upon every routine preflight/check-list procedure, its master ECU/restore-switch being accessible externally of the aircraft-interior. Support-system options include SmartCard®-interfacing, and automatic is engagement of AIRCIA™-system in event of natural-cause pilot-incapacitation, and ATI (automatic/tranquil-Infusion) which introduces tranquilizing-gas into the airliner's entire interior.

Yours sincerely,

Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222

David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation

New Straights Times April 1, 2014
MH370 Tragedy: A week to go before black box signal vanishes

KUALA LUMPUR: It’s been 24 days since Malaysia Airlines Flight MH370 disappeared and the authorities now have about a week to find the phsyical evidence, especially the 'black box' as signals from the recorder will fade out soon.

The signals emitted from the black box is powered by batteries that will die out after 30 days, and it will be difficult for the search operation to trace it without a signal, especially in a vast area like the Indian Ocean.

The multi-national search operation has identified an area of 254,000 square kilometres in the Indian Ocean, about 1,850km west of Perth, Australia, as where the plane likely went down.  

Acting Transport Minister Datuk Seri Hishammuddin Tun Hussein today said ten including one civilian aircraft and 10 ships had travelled to the search area to find debris that may be related to the plane.  

If they can locate the debris and confirm they were from the plane, it may help the search team to narrow the search area to find the black box.

However, with arrival of the vessel Ocean Shield, which is fitted with a towed pinger locator and a Bluefin 21 autonomous underwater vehicle on Thursday in the search area, it is hoped the ship can detect the black box.

Hishammuddin said in terms of sightings of potential objects, on Saturday, five objects were retrieved by the Australian navy's  warship 0HMAS Success and Haixun, a ship from China.

"However, it was found that none of these objects were related to MH370," he told a media conference on the latest developments on the search mission for MH370 here today.

On March 24, Prime Minister Datuk Seri Najib Razak had announced that (the flight path of) Flight MH370 ended in a remote region of the southern Indian Ocean based on detailed analyses of satellite data.

Najib also will be visiting Perth, Australia this Wednesday to see first hand the search operation for the missing aircraft in the Indian Ocean.

"Our Prime Minister has decided to travel to Perth on Wednesday for a working visit to Pearce Air force base (in Perth), to see the operation first hand and also to thank the personnel involved in the multinational search effort, including the Malaysian personnel," Hishammuddin said.

Meanwhile, Malaysia Airlines (MAS) code share partner China Southern Airlines has agreed to cooperate with MAS in giving aid to families of passengers of the ill-fated flight , said MAS chief executive officer Ahmad Jauhari Yahya.

He said MAS, however, shouldered a heavier burden because the missing aircraft belonged to the airline.

Flight MH370 was also marketed as Flight CZ748 by China Southern Airlines and there were passengers (on board) holding the Chinese airline company's tickets.

Flight MH370, carrying 227 passengers including 152 China nationals and 12 crew, left the KL International Airport at 12.41 am on March 8 and disappeared from radar screens about an hour later while over the South China Sea. It was to have landed in Beijing at 6.30 am on the same day.

A multinational search was mounted for the aircraft, first in the South China Sea and then, after it was learned that the plane had veered off course, along two corridors - the northern corridor stretching from the border of Kazakhstan and Turkmenistan to northern Thailand and the southern corridor, from Indonesia to the southern Indian Ocean.

Following an unprecedented type of analysis of satellite data, United Kingdom satellite telecommunications company Inmarsat and the UK Air Accidents Investigation Branch (AAIB) concluded that Flight MH370 flew along the southern corridor and that its last position was in the middle of the Indian Ocean, west of Perth, Australia.

Prime Minister Datuk Seri Najib Razak then announced on March 24, seventeen days after the disappearance of Boeing 777-200 aircraft, that Flight MH370 "ended in the southern Indian Ocean". The search continues there. - BERNAMA

Read more: MH370 Tragedy: A week to go before black box signal vanishes - Latest - New Straits Times

Missing Malaysia Airlines Flight MH370 now classified as a criminal investigation
APRIL 02, 2014 8:05PM

THE investigation into the disappearance of Malaysia Airlines Flight MH370 has been classified as a criminal investigation, according to reports in the Wall Street Journalciting Malaysia’s police chief.

As the search for the missing Boeing 777-200ER continues into its 25th day, a series of updates linked to The Wall Street Journal’s Twitter feed quoted police chief Inspector General Khalid Abu Bakar as saying police had taken more than 170 statements for the ongoing probe, and would interview more people.

“Investigations may go on and on and on. We have to clear every little thing,’’ Abu Bakar told reporters in Kuala Lumpur.

“At the end of the investigations, we may not even know the real cause. We may not even know the reason for this incident.”

Some strange parallels with catastrophic consequences

By Matthias Chang – Future FastForward

April 1st, 2014

While this article is published on April 1st, 2014 I hope that all concerned would not take this analysis as an April Fool’s Joke but a serious attempt to explore what are the likely scenarios beyond that which have been discussed over the last few weeks.

I have thought long and hard since the publication of my previous two articles posted to my website on the 28th and 29th March, 2014 whether to write this article. I had sleepless nights but realized that this article must be written because the issues which I am addressing deserve public attention and a response from the relevant countries whose technologies are so far superior to Malaysia’s that only they can provide adequate answers.

I leave it to you to judge whether this article is a “conspiracy theory” (an oxymoron because any unlawful act committed by two or more persons or entities constitute a conspiracy - this is Criminal Law 101) or a legitimate demand for intelligent answers, for the public is not stupid.

What puzzled me most since the “disappearance” of MH 370 is the deafening silence of the Military establishments of the United States, Thailand, Singapore (and to a lesser extent those countries who are mere observers) who prior and subsequent to the “disappearance” of MH 370 were involved up to their eyeballs in the annual military exercises “Cobra Gold” and “Cope Tiger” led by the United States beginning from 11th February and ending 21st March, 2014.

Article in full at

The Defense Red Switch Network (DRSN) is a dedicated telephone network which provides global secure communication services for the command and controlstructure of the United States Armed Forces. The network is maintained by the Defense Information Systems Agency (DISA) and is secured for communications up to the level of Top Secret SCI.  

The DRSN provides multilevel secure voice and voice-conferencing capabilities to the National Command Authority (NCA, being the President and the Secretary of Defense of the United States), the Joint Chiefs of Staff, theNational Military Command Center (NMCC), Combatant Commanders and their command centers, warfighters, other DoD agencies, government departments, and NATO allies.

Department of Defense and federal government agencies can get access to the network with approval of the Joint Staff.[2] Upon approval by the Joint Staff, DISA will work with the customer and the appropriate military department to arrange the service.[3]

The Defense Red Switch Network consists of four major subsystems: the Switching Subsystem, the Transmission Subsystem, the Timing and Synchronization Subsystem, and the Network Management Subsystem. The Switching Subsystem uses both RED and BLACK switches to provide an integrated RED/BLACK service. End users are provided with a single telephone instrument with which they can access both secure and nonsecure networks.

The DRSN carried around 15,000 calls per day prior to September 11, 2001. DRSN usage subsequently peaked at 45,000 calls per day and by mid-2003 was running at around 25,000 calls per day. In that period the Defense Red Switch Network was expanded to support 18 additional US Federal Homeland Defense initiatives.[4]  

Nowadays, this network is also called the Multilevel Secure Voice service. It's the core of the Global Secure Voice System (GSVS) during peacetime, crisis and time of conventional war, by hosting national-level conferencing and connectivity requirements and providing interoperability with both tactical and strategic communication networks.[5]”

“The National Communications System (NCS) Voice Precedence System, was established by NCS Memorandum 1-70, dated 14 Feb. 1970, is directed for use by all authorized users of voice communications facilities. Since the effectiveness of the system depends on the cooperation of the people authorized to use it, users must: (1) be familiar with the purposes of each precedence category and the type of call that is assigned the precedence, and (2) exercise care not to request or use a precedence higher than required.

CJCSI 6215.01C, Policy for DoD Voice Networks, defines how Precedence Levels are assigned and controlled.

The NCS Voice Precedence System does not make provisions for conducting test and exercise calls. Those activities or individuals authorized or required to conduct such tests or exercise calls will use a precedence consistent with the nature of the test or exercise. When the originator of the test or exercise call has contacted the called party, the call will be identified immediately as a flash, immediate, or priority precedence test or exercise.

The following examples should aid users in determining what precedence to use when placing a call. These examples are according to the NCS Voice Precedence System, but are not to be used exclusively for determination of the precedence of a call. This should be at the discretion of the originator of the call.  


Flash override is considered a capability, not a level of precedence. Exercising this capability preempts calls of all other levels or precedence. The flash override capability is available to the following users:

The President of the United States of America

The Secretary of Defense and the Chairman of the JCS
Commanders of the Unified Commands


Flash calls preempt immediate, priority, and routine calls. Listed below are examples of flash calls:
Calls pertaining to C2 of military forces essential to defense and retaliation Critical intelligence essential to national survival Conduct of diplomatic negotiations critical to ceasing or limiting hostilities Dissemination of critical civil alert information essential to national survival Continuity of federal government functions essential to national survival
Fulfillment of critical United States internal security functions essential to national survival
Catastrophic events of national or international significance


Immediate calls preempt priority and routine calls and are reserved for communications pertaining to situations that gravely affect the security of national and Allied forces. Listed below are some examples of immediate calls:

Reconstitution of forces in a post-attack period
Intelligence essential to national security
Conduct of diplomatic negotiations to reduce or limit threat of war
Implementation of federal government actions essential to national survival
Situations that gravely affect the security of the United States
Civil defense actions concerning the direction of the population and their survival
Disaster or events serious enough to have an immediate and detrimental effect on the welfare of the population
Vital information having an immediate effect on aircraft, spacecraft, or missile operations
Distress assistance


Priority calls preempt routine calls and are reserved for communications requiring expeditious action by called parties furnishing essential information for conducting government operations.


The routine precedence applies to official government communications that require rapid transmission by telephonic means, but do not require preferential handling. A routine call does not preempt any other call.  


Access to a level of precedence must be determined only by mission requirements and must not be used as a means of improving a GOS above that provided to ROUTINE users. Appropriate restoration priority or TSP should be considered with all special C2 precedence requirements. Any change in the assignment of precedence levels must be reviewed by DISA to ascertain the network impact and to size the DSN architecture to accommodate the change. All precedence requirements must be validated by the appropriate CINC, Service Chief, or director of Defense agency, who also approves requirements for immediate and priority service. Requests for precedence are not restricted by MCA. The Joint Staff is the approval authority for flash and flash override calling capabilities. With the exception of new missions, requests for flash and flash override should normally be accompanied by a tradeoff of equal precedence.  


The CINCs, Service Chiefs and directors of Defense agencies must establish and maintain policy to control use of precedence access through operator-assisted calls. EO switch users/subscribers are authorized precedence and long-distance DSN service only when a means is provided to positively control the number of simultaneous outgoing calls for each precedence level entering the DSN e.g., instrument classmarks. DISA provides criteria for the EO switch processing of precedence calls to and from DSN to achieve the stated GOS and will determine the appropriate trunk sizing and switch configuration based on CINC, Service, or agency requirements and traffic-engineering analysis. Traffic-engineering and trunk-sizing requirements are based on business hours between DSN locations.


Local commanders are responsible for both the control and approval of the calling area capabilities available to their DSN users.


When NM capabilities, per paragraph 9, are available, classmarking of the user lines is employed to technically activate, manage, and control calling capabilities. When NM capabilities are not available, PATs or classmarking of access lines are employed to control access to the DSN.


Temporary DSN service upgrading to support the NCA, Chairman of the Joint Chiefs of Staff, CINCs, Service Chiefs, or other equivalent personnel during travel is authorized for all precedence levels for up to 30 days. Temporary upgrading is also authorized for emergencies and exercises. Requests should follow the procedures in Enclosure C and must be coordinated with DISA and approved by the CINC or the Service Chief concerned. Approvals of flash override and flash access must be provided to DISA and the Joint Staff. The CINC or Service Chief must identify source of funding to cover additional costs prior to approval.


The CINCs, Service Chiefs, and directors of Defense agencies must develop implementing policies and procedures for the provisions of this policy. The policies and procedures must be coordinated with and provided to DISA to ensure that they do not adversely affect network operation.”

1 comment:

  1. HELP!
    I'm trapped in a world where nothing is as it seems, and everybody takes a pride in their lying skills.


Note: Only a member of this blog may post a comment.

Who's visiting Abel Danger
view a larger version of the map below at