April 12, 2014

Flt 370 Victims: Expendable Pieces On Geopolitical Chessboard?

The aircraft deviated from its flight path and was picked up by a ...

"The CIA is a state-sponsored terrorists association. You don't look at people as human beings. They are nothing but pieces on the chessboard."
  -- Verne Lyon, former CIA agent in revealing documentary Secrets of the CIA

During the early hours of March 8, 2014, a Malaysian Airlines Boeing 777 aircraft on a routine flight from Kuala Lumpur to Beijing with 239 passengers & crew on board, almost one hour into the flight abruptly lost contact with ground control and seemingly vanished into thin air never to be seen again! After the transponder was first disabled, the aircraft made a series of clearly deliberate maneuvers, starting with an abrupt turn left towards a Westerly direction, followed by two sharp right-angle turns - first, toward a Northwesterly direction, followed later by a further change bearing West/Southwest. From early on the public was fed a number of official theories, from Iranian terrorists to pilot suicide (both discredited) - to the current crash theory, conveniently located in a remote area off Antarctica!

Mainstream media, however, while continuing to promulgate every theory offered by officialdom, studiously avoids any discussion that the disappearance of flight 370 may have been due to sabotage by covert agencies for nefarious purposes, to obtain its sensitive cargo or for a later false-flag attack! Despite an acute bout of naïveté afflicting the media, unanswered questions & difficult facts abound - demanding, not ridicule of 'crazy' theories, but the increasingly rare skill of investigative journalism!
  • Given that no airplane the size of a Boeing 777 can survive the impact of a crash into the ocean without it breaking up and leaving a large, highly visible, floating debris field, together with today's sophisticated satellite technology, which can now easily detect objects as small as even a coin on the Earth's surface and even see underground bunkers, why has there been no detection of something as large as a modern commercial airliner?
  • What was so sensitive about the plane's cargo that Malaysian authorities have steadfastly refused to release any details, terming it classified information?
  • Why did the plane cover such a deliberate, though circuitous route, first making almost a U-turn to fly back over Malaysia before turning Northward to Thailand, where it just so happened that the US-run Cobra Gold and Cope Tiger military exercises were taking place - just as was the case for 9/11 and other false-flag events? Could it be to be electronically cloaked or to be flown in the shadow of a jet fighter in order to escape radar detection?
  • Why was the island of Diego Garcia - home to the secretive US military base, one of five simulations pre-loaded into the pilot's home flight simulator, later confiscated by police?
  • Why have eyewitness reports from multiple residents on the island, Kuda Huvadhoo, in the Maldives about a "low-flying jumbo jet" with the signature red stripes of Malaysian Airlines at around 6:15 am, the morning of March 8 - in the direction of Diego Garcia been ignored?
  • Why have Rolls Royce, whose engines powered the aircraft & who maintain an independent line of communication to all engines during flight, any problems immediately fed back to their technicians, one which cannot be disabled by anyone other than themselves - not been asked for information about flying times and whether any technical problems occurred during flight, especially given that such information has been used before to bring planes to a safe landing?
  • Unlike civilian radar systems, military radar does not rely on transponders being turned on, instead using electromagnetic pulses that bounce a signal off the object to track its course - why, then, have the multiple military radar systems in use in the region, in particular, the ones in use ON THAT DAY in the immediate vicinity due to the exercises underway, not been used to establish the actual flight path taken by Flight 370 and its final destination?
  • Given that it is known that the technology to fly commercial airliners by remote control (i.e. like a drone) was available for over a decade before 9/11 (likely used in the attacks), with Boeing receiving a patent for the very technology in 2006 and announcing plans to prevent on board hijackings by rolling it out to all 'fly-by-wire' aircraft, to control the aircraft remotely in order to fly it to a safe destination, what was to stop this being used for nefarious purposes?
  • Is it more than a mere coincidence that an identical twin of the missing Malaysia Airlines flight MH370 has been in storage in a hangar at the Tel Aviv airport since November 2013? Why is a supposedly Florida-based company with undenied Israeli connections - GA Telesis, keeping the only plane in its fleet in an Israeli hangar, a 15-year old plane bought to scrap, before being pulled off its dis-assembly line, and later assigned a new registration number?
  • Lone American on board Flight 370, Philip Wood, an IBM executive stationed in Malaysia, after managing to conceal one of 2 cellphones he had with him in his nether regions, was supposedly able to get a text message out to popular blog, 4chan, that he was being held captive by unknown military personnel after his flight was hijacked (blindfolded) - the self-photo he took showed only a profile as his cell was in darkness, but the EXIF data confirmed the coordinates to be Diego Garcia. While claims have been made that this data (embedded within the photo) could have been hacked (& thereby a hoax), why was it that, shortly after this story became public, the Pentagon banned all leave travel to the island?
Now, while it is possible that for each of the questions listed there may be a satisfactory explanation, only the very simple-minded would accept them all at face value, while trusting implicitly that covert intelligence agencies would never be involved in any nefarious activity in which human lives are viewed simply as collateral damage - yet, this is precisely what the establishment media would have you believe when they seek to offhandedly dismiss any such questions as kooky conspiracy theories! Could this be why they are now starting to see unprecedented levels of decline in viewership as more and more people lose confidence in their unchallenged reporting of whatever officialdom puts out, whilst now looking increasingly toward alternative news sites for a more unvarnished view of reality?

Every day that goes by without locating the remains of Flight 370 and its cargo - human & otherwise, makes it likelier that its disappearance was no accident - but rather, the calculated actions of a few! False-flags, if indeed this was one, usually have more than just a single purpose nowadays, due to the increased likelihood of detection, so this may be fueled both by the desire to acquire sensitive cargo, as well as use the aircraft in a 9/11-style attack to be blamed on Iran which was exposed beforehand!

In any event, anyone who must use commercial aircraft for travel (whether for business or pleasure) should know that they are the preferred tool for false-flag operations since the turn of this century! The ability to remotely hack into onboard guidance systems makes this even easier today than before. If, as admitted by one who was formerly on the payroll of a leading covert operations agency, we are seen as nothing but expendable "pieces on the chessboard", then we must awaken to that new reality!

Noted 18th-century author & poet, Samuel Johnson, wrote that: "The world is seldom what it seems; to man, who dimly sees, realities appear as dreams, and dreams, realities." - his sage warning seems far more appropriate to today's world, as nations engage in an increasing grab for power & resources!

Make no mistake, whether the human carnage may be due to drones killing innocents in far off lands, or hijacked aircraft whose passengers are cold-bloodedly executed to avoid detection, those involved in such operations or in their cover up are guilty of war crimes, and will one day be held accountable!
Flight 370 Summary report
(All the important facts in one place)

CIA The USA and Murder Inc.
How the CIA does it's dirty work
How the CIA does it's dirty work

This video covers a lot of ground:
1. The use of assassination as a 'tool' by the United States
2. The investment the US has made in developing covert assassination methods
3. The CIA assassination manual, originally compiled to assist the coup in democratically elected government of Guatemala
4. The actual methods the CIA recommends for killing people
5. "The most efficient 'accident' is a fall of 75 feet or more to a hard surface"


UPDATE: The original image has been destroyed by hackers, including what is posted here. The GPS format is now different. I am attempting to retrieve the original. To the people who did this, you should be dragged through the streets and LYNCHED. UPDATE: ORIGINAL EXIF FORMAT NOW RECOVERED VIA PICTURE TAKEN WITH DIGITAL CAMERA. GLITCH, IF YOU HAVE THE ORIGINAL PHOTO, PROTECT IT AND GET IT TO FARGANNE. PHOTO FORENSICS DOES NOT HAVE THE REAL PHOTO. UPDATE: ALL CORRESPONDENCE REGARDING THIS HAS BEEN HACKED AND WIPED OUT.

I could not save the original, I only transferred it to the site which subsequently got hacked to destroy the photo. This is because I am forced to work with only cyber cafe computers because mine got permanently bios hacked.

When I first confirmed the coordinates for Diego Garcia, I took a photograph of the last portion of the Exif that was in the original photo to help me easily compare it to what was online to confirm this legit. The coordinates in the original were recorded three different ways, and I only photographed the last portion of the coordinates because I did not need it three different ways. The online postings of the exif, supposedly from this photo, are fraudulent. The actual format looked like this:
===> 7 18 58.30891" ==7316197
===72 25 35.55908 ==72426544
The fact that there is no way to get the image to show this way anymore proves that someone hacked the site and destroyed the exif, so this story could be discredited. However, I have the original photo of how the exif displayed and I will NOT plug that card into this machine online, I am going home, ripping the wifi out of the laptop and preserving this. I will post it when I am done.


Shills are now using the approach "the message is too perfect" because they can't answer to what is here. But the message is exactly what I would expect from an intelligent person who has been captured, FAKE would be: My plane was hijacked by American and British military people. I am on Diego Garcia. I have been tortured. Please help. In Philips message, he does not know where he is or who is holding him. Anyone faking the message would certainly say Diego Garcia and American/British forces. The fact that Philip does not know anything about his captors FITS TOTALLY with the message being authentic. Right now the American intelligence front is frantic on the blogs, attempting to find any way to slam this. They are testing any possible way to convince people this is not true, and will run with whatever works. Don't let that fool you, use your brain with what is here and think for yourself.


The blindfold: Philip claimed to be blindfolded when he sent the message. When the American military blindfolds someone, it is accomplished by putting a bag over the head that is locked so you can't get it off. This left the engineers hands free. This would have made it possible for him to pull his Iphone 5 (a fact confirmed by the Exif data) out of his butt as stated, and use the voice command ability of the Iphone to just talk to it to log in and post the message. This explains why he sent a black photo, he could not see what he was sending, he just knew he snapped a photo and sent whatever got taken.
The coordinates:When the coordinates are added to the fact that the photo's exif data does not match the Google coordinates or any other coordinates for Diego Garcia that are posted online, but is still within the boundaries of Diego Garcia, it proves that no one just pulled those coordinates off the web. It helps confirm that this was not just a hoax because the coordinates are exact to wherever on Diego Garcia the Iphone was when it took the photo.



UPDATE: THE SITE GOT HACKED AND THE IMAGE HAS BEEN MODIFIED. I AM WORKING ON A WAY TO RECOVER THIS. This image, which appears black was posted as taken in a dark cell by IBM engineer Philip Wood. SAVE IT TO YOUR DESKTOP. RIGHT CLICK IT. SELECT PROPERTIES. CLICK DETAILS, THAT REVEALS THE EXIF. Shills are saying I did not post the Exif. Shills pray for people to be stupid. NOTHING PROVES IT BETTER THAN THE ACTUAL IMAGE. THAT IS WHY I POSTED THE ACTUAL IMAGE. The picture is black because the cell was too dark, but a critical piece of information was embedded in the Exif data, the coordinates to Diego Garcia, where the picture was taken. And it's real, this is NOT a hoax. The coordinates in the picture indicate that the photo was taken within 3 miles of what Google officially gives for Diego Garcia. It is NOT EXACTLY what comes up on Google. It is off a couple miles, so NO ONE GOOGLED THIS, thus helping to confirm it's authenticity. I don't know how big the island is, but if it has a runway, that certainly fits. The picture posted with the following text: "I have been held hostage by unknown military personal after my flight was hijacked (blindfolded). I work for IBM and I have managed to hide my cellphone in my ass during the hijack. I have been separated from the rest of the passengers and I am in a cell. My name is Philip Wood. I think I have been drugged as well and cannot think clearly."


The retinex photo cannot be used for verification of Exif, if you check this one it will clearly say in the software tab "Gimp 2.6.12" and NOT the Iphone O.S. version, which ALL SOFTWARE DOES when it handles and saves an image. This is why I know the original is legit. Do this yourself for FREE. Download the Gimp image editor. Open the image with the Gimp. Click the colors tab. At the bottom of the list of options, you will see retinex. Set retinex to Scale: 133, Scale division 1, and dynamic to 0.0. Retinex squeezes everything out of an image that can possibly be seen, and it is my opinion that it does reveal enough.
Normally, a lens will vignette the corners, and put the least amount of light in the corners. But Retinex shows clearly that the corners of the image are brighter, and the center is dark. THAT would be caused by a black bag over Philip's head.


UPDATE: If Philip Wood´s linkdin is not embedded below exactly as stated, HERE IS THE LINK UPDATE: Jpeg now substituted due to regionally served hacks on the Linkdin account.

Image Exif data: THE SMOKING GUN

The Exif is intact. Exif data gets embedded in every image by every camera and includes the circumstances under which the photo was taken. It can be viewed by saving the image to your desktop, and then right clicking it and selecting image properties. Hit the details tab. You can see that the image was taken on March 18 with an Iphone 5, with the ISO at 3200 and a shutter of 1/15. The coordinates are included in the exif data because the Iphone knows where it is, and the coordinates are for Diego Garcia. THE FIRST TIME A BLANK PHOTO SAID IT ALL. Exif can't be rewritten with common software without a trace, ALL software leaves a note in the application tag that says the picture was modified by an application. Exif can be erased as well but NOT CHANGED WITHOUT A TRACE. Photos with the exif intact AND UNCHANGED will hold up in court. If the Exif is hacked and this is not real, the CIA or a really good hacker did this, which I doubt, I'd say it's probably real.

Another smoking gun is that the voice recognition software put the word personal instead of personnel. This is completely consistent with a blind software assisted dial out.

Surrounding this story is the fact that the man who managed to get this information to Farganne (forum member Glitch) was harassed and received many threatening voice mails over it, that is another piece of evidence pointing to this as being real. One thing is certain, once it's posted here on this site the genie is OUT OF THE BOTTLE. I cannot stress how important it is that the GPS coordinates in the photo do not perfectly match what Google says and are not posted anywhere on the web, because it proves that the source of those coordinates did not come from google or Wikipedia, they really did come from the imaging device and it HAD TO be at Diego Garcia when it took the photo.


DEBUNK ATTEMPTS AND UPDATES I did not want to post, but now have to because of the way certain people took this. Iphone won't fit? That is SILLY. From an E.R. doctor who pulled a 12 inch long 8 inch wide salami out of an idiot´s butt

OTHER DEBUNK ATTEMPTS: If anything was used to re-tag this image, it would say so in the software tag of the image. Any time software modifies any aspect of the image, the last thing to touch the image gets put in the software tag. The Iphone's standard software is in the image tag and nothing else. That means this image has NOT been re-tagged and that is the FIRST THING I checked before posting this story. And NO, YOU CANNOT MODIFY IT WITH A PROGRAMMING EDITOR UNLESS YOU ARE A MACHINE LANGUAGE GENIUS. Open notepad (which is a basic programming editor). Drag the photo into notepad. it will open as code. The Exif is all machine code. This is the NSA type hack I talked about, unless the NSA or a serious hacker wanted to do this, the photo is legit. And the surrounding circumstances also show this story to be legit. A non shill question: Diego Garcia is a military installation. Are there civilians on the island? ANSWER: YES, 1,600 of them. And they have cell phones no doubt. Civilian cell service would be there. And what about all the military spouses? They would be there too, and NOT in the military but (possibly) listed as military. They have phones as well, Diego Garcia would not be a black hole.
Non shill comment: Geosetter can modify exif. I did it, I changed the location in the picture. My comment: Did Geosetter erase the Iphone O.S. version? It should have, and that would prove the photo fake. Above, all that data is perfectly intact. All software I have seen will say it modified a photo. Since Geosetter is public domain it should say it had the image and produced it with the Iphone O.S. data either added to or removed entirely. Absent this, Geosetter would be a hacker app.
BLOCKBUSTER UPDATE AGAIN: This got posted to 4chan and was pulled immediately, but 4plebs, an independently run backup of 4chan which is NOT controlled has the original on archive, and the date of posting matches the photo. BINGO! read itHERE. This answers the question why the photo only surfaced recently. Someone surfing archives found it. 4chan would be absolutely a PRIME choice for someone in trouble.

More Debunks answered

There was no Philip wood working for IBM - this one was really poor. This was the very first debunk posted anywhere, and it's so thin and transparent well, if you get fooled by that one let's just say I am not going to help you by linking out AGAIN. Re read the article please The exif data was hacked - That would debunk the whole story, but it is not the case. Actually untraceably changing exif is not that easy. ALL LEGITIMATE SOFTWARE, EVERY LAST BIT OF IT OUT THERE, WILL SAY IT HAD THE PICTURE AND PRODUCED IT IF IT IS SAVED WITH THAT SOFTWARE. THERE ARE NO SUCH FINGERPRINTS ON PHILIP'S IMAGE. Most people do not even know what exif data is. From my experience I would say that fewer 9 out of 10 people have heard of it. Of the fewer than 10 percent who have, most will be photographers.
I have been doing photography and known about exif since the beginning of digital photography. And there have been times, for the sake of sending messages secretly embedded in Jpegs or claiming ownership of images, I have wanted to hack exif at least enough to pull entire Jpegs into programming editors to see if there was anything I could tweak. Except for a few notes in the Jpeg, the exif is machine language. That's pretty tough to work with and even most who work as professional programmers can't do it which makes that scenario highly implausible. And software like photoshop ALWAYS changes the software tag and claims full ownership of the image. So even though there are applications that can edit exif, they always leave a trace in the software tag. The photo posted by Philip had no such changes to the software tag.
If the image posted by Philip is NOT legit, it would have taken someone with an ability to write machine language to modify it without a trace, or a hacker with an obscure app to do it, and I call bunk on that because those types of people are small in number and have better things to do than hatch b.s. on the web. This was NOT done by a teenager for a week end prank. It would be a very small number of people that actually managed to do it, as I said all along - CIA/NSA types or really good hackers. And I seriously doubt that prospect.

The only thing I have a question for with regard to how this got done is WHY 10 days?

This posted on the 18th, and that's quite a while after the event. There is no doubt the Iphone was NOT up philip's butt the entire time. So now we get into guessing games about why it took 10 days. My guess? Somehow for a period of time Philip was tied up under close supervision but not having his butt watched at the toilet. After the initial search he put the phone in a more comfortable position in his pants but did not call. And it took 10 days for him to finally get separated from the other people as stated in the message and have enough privacy to send a message out.

Why post to 4chan rather than call home?

That's pretty easy to explain. The NSA would have blocked that particular number from reaching anyone of importance in Philip's life. They do it to my phones all the time, to such an extent I gave up on cell phones, they are useless for me. And even Claudia's phones have been cut off from receiving calls from family members, the NSA does that just to isolate people who are dissenters. Flight 370 would have been handled. E-mails? Ditto. Facebook and others that require log in? DITTO. That left only totally public blogs that did not require log in to get a message out, and 4chan is one of those. Those are the TWO legitimate questions I can think of that people could actually ask about how and why, the rest - such as you could never get a phone up your ass when you are a really smart guy who would have noticed the plane turned around and the pilot on the intercom saying the plane has been hijacked and now you have FIVE FULL HOURS TO THINK OF SOMETHING BEFORE THE PLANE LANDS, come on now, ONE guy out of 230 figured something out. The whole argument about how the phone made it is in my opinion silly.
The bottom line is that the arguments against the story are a whole lot weaker than the arguments supporting it, and when you add to that the fact that the web site got hacked repeatedly and someone even managed to get a back ground image of a bloody body strewn all the way through it for a few hours Saturday night, well, hackers don't have my log ins, only the NSA or other high level gov types would because I am too good with passwords (they are typically un hackable ones like N532r689$^// and with hackers they won't fix it right when they think I am going to log on, they will leave it up. It got fixed without me doing anything, I never knew about it until someone told me. That would be a back stab by an intelligence agency, WHY WOULD THIS STORY BE THAT IMPORTANT IF IT WAS B.S.? They don't just pull that type of stunt out of the blue.
And the shillage was MASSIVE on this one, with outright lies that were very weak early on, evolving into other lies that were harder to dismiss, and now they are focusing on the exif and whether or not it can be changed without a trace. Well, my answer is above and was always in the original post, and it is the RIGHT ANSWER, YES, BY HACKERS AND INTELLIGENCE AGENCY TYPES, BUT NOT BY WEEKEND JOE AND THAT MAKES THAT ARGUMENT WEAK. Ultimately I guess anyone who worked in the right places could do anything, including walking up to you cloaked by the latest technology and hitting you in the head with a bean bag. But the preponderance of evidence weighs heavily in favor of this all being legit, and that is what I am sticking with.
Exif not reliable?
Ultimately you could say it is not reliable because yes, a really good programmer could hack it, and that is ABSOLUTELY TRUE, but that DOES NOT mean that the photo is automatically fake.
And look at what a Retinax filter pulled out of the darkness - Hard to see, but sure looks like it could be like THIS image from Abu Ghraib:
On 2014-03-31 11:52, Mary wrote:
Jim, I am a longtime reader and supporter. Philip Wood was my husband Todd's client - my husband is a realtor in Keller, TX and we sold Philip's home on Lazy Lane in Keller several years ago. When he and his wife divorced, we also sold Elaine a new home just a couple of years ago. We kept in touch with him from time to time.
I have had trouble sleeping since the info came out about him being held in a cell with a bag over his head. Philip is a very nice guy, a man who lived a simple life, and he was just doing his job for IBM. He was involved with "data storage" for IBM - at least that's what he told us, and he was so excited to get over there to Beijing and the surrounding areas to see the world and help IBM.
Thank you for the work you are doing, my God - our world is so evil it's unimaginable.
Best Regards,
My response:
I am stunned. And doing data storage for IBM would be a great reason to have him kidnapped - the large companies are moving to protect themselves from the NSA, and Philip would have been right in the middle of the NSA's attempts to breach IBM's security. There is no way to confirm whether or not Philip would have been important to them, but it is a curiosity.
Thanks for writing,

No comments:

Post a Comment