Friday, October 14, 2016

#2806: Clinton 8(a) North Tower Bundler – Pedophile Blackmail Bridge – Serco Zulu Flicker Drones

United States Marine Field McConnell 
Plum City Online - (AbelDanger.net
October 14, 2016

1. Abel Danger (AD) claims that prior to 9/11, Hillary Clinton's favorite New York bundler Howard Lutnick had been using 8(a) company servers on the 47th floor offices of Adjusters International in WTC#1 (North Tower) to launder pay-to-play donations to the Clinton Foundation.

2. AD claims that Hillary Clinton used convicted blackmailer Jeffrey Epstein to extort donations by child-porn transmissions to the pedophile "Friends of Bill" and targeted members of the Federal Bridge Certification Authority including Wells Fargo (master servicer of the Twin Towers leveraged lease), the UK MOD (root key custodian) and the Boeing Company.

3. AD claims that on 9/11, Hillary Clinton's 8(a) aides used Zulu timing signals from Serco operatives of the National Physical Laboratory cesium clock to put the pilots of the hijacked Boeings into a flicker-vertigo trance and planes through decoy and drone maneuvers falsely attributed to the Bin Laden Group.

4. United States Marine Field McConnell has briefed Donald Trump on how Hillary Clinton's bundlers punished slow payers on 9/11, how blackmailers and 8(a) enforcers use the federal bridge to control the pedophile 'Friends of Bill', and how her aides can put the pilots of Trump's Boeing 757 into flicker-vertigo trances at a Zulu time of choice.

Clinton Snared In Pedophile Ring, Hilliary helped provide cover
 

Naudet brothers 9/11 Documentary - 1st plane hits North Tower 

100% WTC Drone Attack/Strike Plane PROOF (Many Witnesses) 
 


Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! [Note British and Saudi Governments, AXA, HSBC, Teachers' and Goldman Sachs] 

Defense Ammunition Center [Outsourced to Serco]
  

Serco... Would you like to know more? 

"Digital Fires Instructor Serco - Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action." 

"Christopher Rajendran Hyman CBE (born 5 July 1963 in Durban, South Africa)[1] was Chief Executive of Serco Group plc from 2002 to October 2013.[2] … On graduation, he worked for Arthur Andersen. In 1989, he won an 18-month exchange with Ernst & Young in London, who employed him after four months.[1] Head hunted in 1994 by Serco, Hyman became European finance director, and in 1999 was made group finance director. In 2002, Hyman became chief executive. .. Hyman resigned from his role of Chief Executive of Serco on 25 October 2013 following allegations that Serco had overcharged government customers. .. He was [making a presentation to Serco shareholder, including British and Saudi governments] on the 47th floor of the World Trade Center [North Tower] at the time of the September 11 attacks in 2001."
"The Amazing And Heartbreaking Story Of The CEO Who Lived And Rebuilt His Firm After 9/11: Howard Lutnick
 Sep. 11, 2011, 9:37 AM
Perhaps the only reason Cantor Fitzgerald's chief executive Howard W. Lutnick didn't perish during the September 11th terrorist attacks on the World Trade Center is thanks to his young son.
That Tuesday morning happened to be the day his five-year-old son Kyle started kindergarten.  He and his wife both wanted to take him to his first day at Horace Mann School.
Lutnick was in his son's classroom when he first heard news of the attacks that would forever change his life and his firm.
Cantor Fitzgerald occupied the 101st to the 105th floors of One World Trade Center -- just above the impact zone of the hijacked plane.
Cantor Fitzgerald suffered the greatest loss of life of any company.  The firm lost 658 of its 960 employees, almost two-thirds of its workforce. 
What's even more heartbreaking, Cantor Fitzgerald had a policy of hiring relatives, so those who lost someone at the firm likely lost more than one loved one.  
Lutnick lost his brother."
November 17, 2015 | 3:47am
MORE ON:
Hillary Clinton might not have been thrilled with the site of her Wednesday night fundraiser — next door to hubby Bill's old buddy, Jeffrey Epstein.
The event was at the home of Cantor Fitzgerald's Howard Lutnick and closed to press.
But a spy pointed out the location may have been "too close for comfort" as "Howard's enormous townhouse touches Epstein's even larger townhouse."
Bubba's past flights on private planes owned by convicted sex offender Epstein have been a perennial thorn for the Clintons.
RNC chairman Reince Priebus wondered this year, "I'd like to know what he was doing with [Epstein], how many trips did he take, where was he going, what did he do when he was with this guy?"
"July 7, 2016
Clinton Threat To "Destroy Everyone" Throws Washington Into Chaos
By: Sorcha Faal, and as reported to her Western Subscribers
A stunning Foreign Intelligence Service (SVR) report circulating in the Kremlin today says that during President Putin's "telephonic conversation" with President Obama yesterday, the American leader stated that Washington D.C. was in "political chaos" after former President Bill Clinton threatened to "destroy everyone" with his "blackmail files" should his wife, Hillary Clinton, be indicted for the crimes she committed against her own government and people. [Note: Some words and/or phrases appearing in quotes are English language approximations of Russian words and/or phrases having no exact counterpart.]
According to this report, President Putin was forced to personally call President Obama after Russian military commanders attempting to finalize a US initiated agreement regarding Syria proposed by the American leader last week had been continually rebuffed by the Pentagon—and that we reported on in our 4 July report titled “Prepare For War” Warns Russian Military, "Obama Is No Longer In Charge".
Fearing President Obama was no longer in charge of his own military forces, this report continues, President Putin took it upon himself, yesterday, to personally call President Obama where an agreement on closer military cooperation between the US and Russia in regards to Syria was reached—but during that conversation, President Obama detailed to President Putin the chaos the US government was presently enduring due to former President Clinton’s threat.
Though the text of the exact words spoken between President Putin and President Obama during their call are of a higher security rating then this “general/common” SVR report allows, Russian intelligence agents contributing to it lay out a devastating timeline regarding the facts surrounding Hillary Clinton that shows:
1.)    The full knowledge that the Kremlin was in possession of all of the emails from Hillary Clinton’s private computer servers was allowed to be released to the public on 6 May—and which was confirmed this week by both the FBI and US experts.
2.)    President Putin, on 13 May, warning military commanders that if Hillary Clinton is elected to be the next US president “it means war”.  
3.)    The Investigative Committee (SLEDCOM), on 19 May, opening a war crimes file against Hillary Clinton over her illegally obtaining millions-of-dollars in bribes from the murderous Saudi regime.
4.)    The SVR reporting, on 2 June, that the husband, Shahriar Zolfaghari, of Georgia's statewide prosecutor for human trafficking Camila Wright, who was investigating former President Bill Clinton and his Clinton Foundation co-founder Jeffery Epstein for child sex charges was gunned down. [Clinton body count rises]
8.)    The SVR reporting, on 28 June, that former President Bill Clinton held a secretive meeting with US Attorney General Loretta Lynch where the final details were worked out for Hillary Clinton’s “total exoneration”.
10.)  The SVR reporting that on 1 July, the hacker known as Guccifer, who was able to obtain all of Hillary Clinton’s emails, was discovered missing from his US prison cell by FBI agents. [Potential rise of Clinton body count]
12.)  The SVR reporting that on 2 JulyHillary Clinton was interviewed by the FBI.
14.)  The SVR reporting that on 5 July, President Obama made a public appearance with Hillary Clinton just hours after FBI Director Comey’s exoneration of her stating that he was “ready to pass the baton”.
15.)  The SVR reporting that on 6 July, US Attorney General Loretta Lynch issued a statement that not only wouldn’t Hillary Clinton be charged with any crimes, none of her criminal accomplices would be either.
SVR intelligence analysts contributing to this report note that by the Obama regime’s exoneration of Hillary Clinton they not only nullified 6 US Federal criminal laws, but, also, disgraced the FBI and its once stellar reputation
Also to be destroyed by Hillary Clinton's exoneration, this report continues, is the United States reputation as being a nation of laws that apply to everyone equally—made especially damning in the light ofChina sending one its top politicians to jail for life for excepting bribes this past week, and Russia itself, also this past week, firing two of its top military commanders for the mere suspicion that they were negligent in their duties.
To why the Clintons have been allowed to continue their 25-year-saga of existing outside of the laws every other American has to live by, this report concludes, is solely due to the massive blackmail files former President Bill Clinton has compiled on numerous top politicians, bankers and elites (and has threatened to release if Hillary Clinton is ever charged) containing videos and photos of them having sex with child sex slaves kept by Jeffery Epstein—and that EVERY SINGLE American news media outlet knows about, but are too terrified to report on."
"Digital display device  US 4788539 A ABSTRACT A digital device for visually displaying the value of a generally continuously varying function, such as car speed. The device displays subranges of a full scale, putting them individually in a viewing area. The displayed subranges in the viewing area will be replaced as required to permit representation of the input function over the full scale. The device allows selection of a new subrange with the property that the input function value initially will be at an interior position in the new subrange, thereby preventing repeated rapid switching between subranges. The subrange display can be defined using scale markers in just a few fixed positions in the viewing area. … The flickering can be a distracting visual flashing. For example, five of seven segments are changing in a transition between a "1" and a "2" digit, and several digits may be changing simultaneously. This can be dangerous, as in the case of driving an automobile. An appropriate rate of flashing may even induce "flicker vertigo" in some people, and this can produce a trance-like state."
"Adjusters International, formed in 1985, is a public adjusting and disaster recovery company, who assists clients with financial recovery from insurance claims and U.S. Federal Emergency Management Agency (FEMA) grants. The company's headquarters is in Utica, New York. It has more than 40 regional offices across the United States.[1]
Public insurance adjusters represent clients for a small percentage of the resulting settlement money from the insurance claim. Adjusters mostly represent clients who have been victim to property damage or loss. Most cases involve natural disasters including:firesfloodshurricanesice damage, and earthquakes.[1]
Public adjusters are the only type of claims adjuster that can legally represent the rights of an insured during an insurance claim process."
 "Developments in PKI occurred in the early 1970s at the British intelligence agency GCHQ, where James EllisClifford Cocks and others made important discoveries related to encryption algorithms and key distribution.[19] However, as developments at GCHQ are highly classified, the results of this work were kept secret and not publicly acknowledged until the mid-1990s.
The public disclosure of both secure key exchange and asymmetric key algorithms in 1976 by DiffieHellmanRivestShamir, and Adleman changed secure communications entirely. With the further development of high-speed digital electronic communications (the Internet and its predecessors), a need became evident for ways in which users could securely communicate with each other, and as a further consequence of that, for ways in which users could be sure with whom they were actually interacting.
Assorted cryptographic protocols were invented and analyzed within which the new cryptographic primitives could be effectively used. With the invention of the World Wide Weband its rapid spread, the need for authentication and secure communication became still more acute. Commercial reasons alone (e.g., e-commerce, online access to proprietary databases from web browsers) were sufficient. Taher Elgamal and others at Netscape developed the SSL protocol ('https' in Web URLs); it included key establishment, server authentication (prior to v3, one-way only), and so on. A PKI structure was thus created for Web users/sites wishing secure communications.
Vendors and entrepreneurs saw the possibility of a large market, started companies (or new projects at existing companies), and began to agitate for legal recognition and protection from liability. An American Bar Association technology project published an extensive analysis of some of the foreseeable legal aspects of PKI operations (see ABA digital signature guidelines), and shortly thereafter, several U.S. states (Utah being the first in 1995) and other jurisdictions throughout the world began to enact laws and adopt regulations. Consumer groups raised questions about privacy, access, and liability considerations, which were more taken into consideration in some jurisdictions than in others.
The enacted laws and regulations differed, there were technical and operational problems in converting PKI schemes into successful commercial operation, and progress has been much slower than pioneers had imagined it would be.
By the first few years of the 21st century, the underlying cryptographic engineering was clearly not easy to deploy correctly. Operating procedures (manual or automatic) were not easy to correctly design (nor even if so designed, to execute perfectly, which the engineering required). The standards that existed were insufficient.
PKI vendors have found a market, but it is not quite the market envisioned in the mid-1990s, and it has grown both more slowly and in somewhat different ways than were anticipated.[20] PKIs have not solved some of the problems they were expected to, and several major vendors have gone out of business or been acquired by others. PKI has had the most success in government implementations; the largest PKI implementation to date is the Defense Information Systems Agency (DISA) PKI infrastructure for the Common Access Cards program.”
"Custodial Services
Serco is a leading provider of custodial services to governments around the world. In the UK, we operate six adult prisons under contract to the Ministry of Justice's National Offender Management Service and the Scottish Prison Service. We also run a Secure Training Centre for juveniles on behalf of the Youth Justice Board of England and Wales.
In addition, Serco operates three prisons in Australia (Acacia, Wandoo Reintegration Facility and Southern Queensland Correctional Centre) and two in New Zealand (Auckland South Corrections Facility and Mt Eden Corrections Facility).
Our contracts include:
"Base One Technologies – Corporate Strategy – We are a Government Certified Women-Owned Business
We practice Diversity Recruitment and Staffing for IT positions
Base One was founded in 1994 by a women engineer who had made a career in technology research for many years. Base One has been very successful in focusing on diversity recruiting and staffing for IT projects. It has been our experience that the greater the diversity mix, the more creative the solution. As in any field the more diverse the viewpoint the more thorough your analysis. Our engineers can think out of the box. 
Because of our affiliations we have access to pools of resources among more diverse groups & individuals. We work with a large pool of minority professionals who specialize in IT skills. We are able to have access to these resources through our status as a D/MWBD firm and our affiliations. These affiliations assist us in working with resources among more diverse groups & individuals. We are also partnered with firms that are 8A certified as Minority firms, Disabled Veteran firms, Native American firms, Vietnam veteran firms, women owned firms.
Our hub zone location keeps us close to the professional organizations of great diversity. We are active in recruiting from and networking with these community organizations of local IT professionals. This has given us access to a large pool of diversity talent.
Base One's staff of engineers are a diverse group of professionals. This diverse network of engineers helps us to branch out to other engineers and creates an even larger network of resources for us to work with.
The greater the diversity the more complete & thorough the analysis. The broader the spectrum of points of view the broader the scope of the analysis. We feel that a diverse team gives us a greater advantage in creating cutting edge solutions. To that end we will continue to nurture these relationships to further extend our talent pool. 
The greater the diversity mix, the more creative the solution.
The more diverse the viewpoint, the more thorough the analysis.
The more diverse our team, the more our engineers can think out of the box.
This is why Base One Technologies concentrates on diversity recruitment in the belief that a diverse team gives us a greater advantage in creating cutting edge solutions.”
Information Security Planning is the process whereby an organization seeks to protect its operations and assets from data theft or computer hackers that seek to obtain unauthorized information or sabotage business operations. 
Key Clients Benefiting From Our Information Security Expertise: Pentagon Renovation Program, FAA, Citigroup, MCI.
Base One Technologies 
Expertly researches, designs, and develops information security policies that protect your data and manage your firm's information technology risk at levels acceptable to your business. 
Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report. 
Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions."
"Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994. This file was obtained from the Secretary of State and has a file number of 1795583.” "Serco's Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals." http://www.dtic.mil/whs/directives/corres/pdf/100515p.pdf
 "Serco chief quits before investigation into electronic tagging charges
Chris Hyman says he is leaving the services company because it is the best way to mend relationship with UK government
Friday 25 October 2013 19.20 BSTLast modified on Tuesday 19 July 201616.43 BST
The boss of government outsourcing group Serco quit to allow a new boss to be appointed from outside the troubled company.
Serco is scrambling to restore its reputation following a series of debacles ranging from failing to provide enough doctors in Cornwall to charging the government for electronic tags on dead prisoners.
Chris Hyman, left with immediate effect on Friday after 20 years with the operator of hospitals, prisons and railways. He said he would "step back" from his chief executive role, held for 11 years, to allow relations with the government to be rebuilt."
"Opened in 1994 as the successor to the Transitional Immigrant Visa Processing Center in Rosslyn, Va., the NVC centralizes all immigrant visa pre-processing and appointment scheduling for overseas posts. The NVC collects paperwork and fees before forwarding a case, ready for adjudication, to the responsible post. 

The center also handles immigrant and fiancé visa petitions, and while it does not adjudicate visa applications, it provides technical assistance and support to visa-adjudicating consular officials overseas. 

Only two Foreign Service officers, the director and deputy director, work at the center, along with just five Civil Service employees. They work with almost 500 contract employees doing preprocessing of visas, making the center one of the largest employers in the Portsmouth area. 

The contractor, Serco, Inc., has worked with the NVC since its inception and with the Department for almost 18 years. 

The NVC houses more than 2.6 million immigrant visa files, receives almost two million pieces of mail per year and received more than half a million petitions from the U.S. Citizenship and Immigration Service (USCIS) in 2011. Its file rooms' high-density shelves are stacked floor-to-ceiling with files, each a collection of someone’s hopes and dreams and each requiring proper handling. …. 

The NVC also preprocesses the chief of mission (COM) application required for the filing of a petition for a Special Immigrant Visa (SIV). Such visas, for foreign nationals who have performed services for the U.S. government in Iraq and Afghanistan, require COM concurrence before the applicant can file a petition with USCIS. The NVC collects the requisite documents from such applicants and, when complete, forwards the package to the U.S. embassies in Baghdad or Kabul for COM approval" 


"Serco farewell to NPL after 19 years of innovation  8 January 2015  Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco's management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK's economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade….  NPL's caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading [for Serco's front running banks] in the City through NPL [Zulu] Time." 
UK Cabinet Office – Emergency Planning College – Serco …..Types of Exercise Workshop Exercises These are structured discussion events where participants can explore issues in a less pressurised environment. They are an ideal way of developing solutions, procedures and plans rather than the focus being on decision making. Table Top Exercises These involve a realistic scenario and will follow a time line, either in real-time or with time jumps to concentrate on the more important areas. The participants would be expected to be familiar with the plans and procedures that are being used although the exercise tempo and complexity can be adjusted to suit the current state of training and readiness. Simulation and media play can be used to support the exercise. Table-top exercises help develop teamwork and allow participants to gain a better understanding of their roles and that of other agencies and organisations. Command/Control Post Exercises These are designed primarily to exercise the senior leadership and support staff in collective planning and decision making within a strategic grouping. Ideally such exercises would be run from the real command and control locations and using their communications and information systems [Feeling lucky, Punk?]. This could include a mix of locations and varying levels of technical simulation support. The Gold Standard system is flexible to allow the tempo and intensity to be adjusted to ensure maximum training benefit, or to fully test and evaluate the most important aspects of a plan. Such exercises also test information flow, communications, equipment, procedures, decision making and coordination. Live Exercises These can range from testing individual components of a system or organisation through to a full-scale rehearsal. They are particularly useful where there are regulatory requirements or with high-risk situations. They are more complex and costly to organise and deliver but can be integrated with Command Post Exercises as part of a wider exercising package."

Yours sincerely,























Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222

David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Looking into our circumstances...