Black Hand* – HSBC’s drug-hub navigators with a "License to Track, Film and Kill" for the City of London's Honourable Artillery Company 1537; The Master Mariners and Air Pilots (formerly GAPAN) 1929, and The Ancient and Honorable Artillery Company of Massachusetts 1638 – whose alumni include the United States' Presidents James Monroe, Chester Alan Arthur, Calvin Coolidge and John F. Kennedy and – perhaps – Barack ‘Choom Gang’ Obama.
McConnell warns that Clinton's Wag the Dog server may have been set up as a honeypot to identify and kill any hackers before they can expose Serco's phony visa services on the Base One Technologies server in the Bronx and the Black Hand snuff-film racket which has given HSBC control of the global drug trade.
Prequel 1: #2295: Marine Links SOS Children's Bank To Serco's Black-Hand Paid For Clintonemail Snuff-Film Trade
Prequel 2: Travels of Secretary of State Hillary Rodham Clinton
Prequel 3: Base One Technologies [Note the diversity scam]
Prequel 4: 6 The 9/11 HIJACKERS AND CONSPIRATORS
Prequel 5: From renovation to revolution: Was the Pentagon attacked from within?
Clinton: My Email Server Will Remain "Private"
RARE Footage Pentagon 9 11 Surveillance Camera Video Impact Crash 9-11 / LIVE LEAK
Hillary Emails on Personal Server Credibility Questioned
SWISSLEAKS - "HSBC developed dangerous clients: arms merchants, drug dealers, terrorism financers"
Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! (Mobile Playback Version)[Note that HSBC is Serco's banker and one of Serco's major shareholders with Her Majesty's Government and its funds]
Serco... Would you like to know more?
“The September 11 Travel Operation The success of the September 11 plot
depended on the ability of the hijackers to obtain visas [through Serco's
National Visa Center set up by Field McConnell's sister Kristine 'Con Air' Marcy, the former Senior Counsel for the Detention and Deportation Program for the INS] and pass an immigration and customs inspection in order to enter the United States. It also depended on their ability to remain here undetected while they worked out the operational details of the attack. If they had failed on either count—entering and becoming embedded—the plot could not have been executed. Here we present the facts and circumstances of the hijackers’ travel operation, including their 25 contacts with consular officers and their 43 contacts with immigration and customs authorities. We also discuss the 12
contacts with border authorities by other September 11 conspirators who applied for a visa. The narrative is chronological, retracing the hijackers’ steps from their initial applications for U.S. visas, through their entry into the United States, to their applications for immigration benefits, and up through their acquisition of state identifications that helped them board the planes. Along the way, we note relevant actions by U.S. government authorities to combat terrorism. There were a few lucky breaks for U.S. border authorities in this story. Mostly, though, it is a story of how 19 hijackers easily penetrated U.S. border security."
Hackers, probing Clinton server, cite security lapses
By James Rosen
Published March 12,
2015
What State Dept.
guidelines did Hillary Clinton violate?
Stirred by the
controversy surrounding Hillary Clinton’s use of a private email server when
she was secretary of state, a determined band of hackers, IT bloggers, and
systems analysts have trained their specialized talents and state-of-the-art
software on clintonemail.com, the domain under which Clinton established
multiple private email accounts, and uncovered serious lapses in security,
according to data shared with Fox News.
The findings call into
question Clinton's confident declaration, at a hastily arranged news conference
in New York on Tuesday, that "there were no security breaches" in her use of a
private server. One prominent figure in the hacker community, bolstered by long
experience in the U.S. intelligence community, has undertaken to build a
virtual "replica" of Clinton's server configuration in a cyberlab, and has
begun testing it with tools designed to probe security defenses. This
individual has shared details of the Clinton system not disclosed publicly but
legally obtainable.
Among other things, outside experts have managed to trace the most recent location of Clinton's server – something she did not specify during her news conference and a subject of much speculation, as the server's physical placement would provide early clues about whether the data stored on it was adequately secured against compromise by private-sector hackers and foreign intelligence services.
Fox News has previously reported that, with the aid of software named Maltego, experts had established that the server is up and running, receiving connectivity to the Internet through an Atlanta-based firm called Internap Network Services Corporation. Clinton’s stern insistence at her news conference that her server “will remain private” would appear to rest, then, at least in part, on the inviolability of Internap.
Now, working with publicly available tools that map network connectivity, experts have established that the last "hop" before the mail server’s Internet Protocol, or IP, address (listed as 64.94.172.146) is Internap’s aggregator in Manhattan (listed as 216.52.95.10).
"This is a very strong indication that the clintonemail.com server is in Manhattan," the source told Fox News.
By entering the IP
address for the Internap aggregator into existing databases, the experts
obtained the exact geolocation coordinates for the aggregator – revealed to be
on lower Broadway, at the intersection with Chambers Street, some two blocks
north of City Hall. This in turn suggests that the Clinton server itself lies
within close proximity – most likely former President Clinton's Harlem office,
and not as far away as the Clintons' home in Chappaqua, N.Y.
That outside experts could so swiftly unearth such information left them convinced that the server remains, as presently configured, highly "vulnerable" to unauthorized intrusion – even if, as most observers suspect, the server, with so much publicity now attendant on it, is no longer in active use. The hackers further concluded that Clinton’s email operation was likely not much better secured when she was secretary of state.
To test that proposition, they took the relatively simple step of examining the source code on the front page of clintonemail.com. This yielded the discovery, sources told Fox News, that the Clintons have not been using the latest version of Microsoft Outlook Web Application (OWA) to send and receive emails. The most recent version of OWA is listed as 14.3.224.2, whereas tests show clintonemail.com to be using the older 14.2.390.1.
"[It's] an indication they're not keeping up with software upgrades," one hacker told Fox News. "If I were a bad guy, I'd start looking for any vulnerabilities in that older version they're using."
Related Image
Work on the "replica"
of the Clinton system also determined that the certificate for its TLS, or
Transport Layer Security, is invalid – a lapse that "makes the site less
secure," the source said. A screen-grab provided to Fox News and shown here,
illustrating the results of this test, showed the word "FAIL" appearing twice
in a multifaceted stress-test for the security defenses of clintonemail.com.
Perhaps most
concerning, private analysts determined that clintonemail.com has been running
an older model of Microsoft Internet Information Services, or IIS –
specifically version 7.5, which has been documented to leave users exposed on
multiple fronts. The website CVEDetails.com, which bills itself as "the
ultimate security vulnerability datasource,” is awash with descriptions of serious security vulnerabilities
associated with version 7.5, including "memory corruption," "password
disclosure vulnerability," and the enabling of "remote attackers to execute
arbitrary code or cause a denial of service."
The cyberlab
technician who discovered the Clintons' use of version 7.5 marveled at "the
vulnerabilities the Clintons are ignoring” in an email to Fox News. "This is a
big deal and just the thing real-world hackers look for in a target and will
exploit to the max," the source said.
"Several of these vulnerabilities have been known since 2010 and yet HRC is running official State comms through it."
Coupled with the earlier disclosure, first reported by Bloomberg, that the Clinton system used a commercial encryption product with "a default encryption certificate, instead of one purchased specifically for Ms. Clinton's service," these latest revelations suggest a complacent approach to server security on the part of the secretary and her aides.
Representatives for Clinton have not responded to multiple requests for comment. Spokesman Nick Merrill has released a FAQ document stating that "robust protections were put in place" on the server, with "upgrades and techniques employed over time as they became available, including consulting and employing third party experts." Merrill added that "there is no evidence" that the server was ever hacked, and said there was never an unauthorized intrusion into the secretary's email.
The Merrill document stated that Clinton's server "was physically located on her property, which is protected by U.S. Secret Service," but did not address its present location.
Bruce F. Webster, an IT expert with 40 years of corporate experience -- the last 15 spent testifying on IT issues in civil litigation -- raised the question of whether Clinton's server has been moved at some point. On his blog, "And Still I Persist," Webster entitled his latest post "No, we still don't know where the Clinton server is, was, has been." In an email to Fox News, Webster referenced suggestions that the server remains in Chappaqua, where it was first registered, and stated: "I consider that the least likely location at this point."
Just the original decision to use a private email account, with Clinton's own surname embedded in it, has baffled the hacker community. The analyst with experience in the intelligence community, a "white hat" hacker -- the kind corporate firms retain to conduct “penetration testing” that exposes businesses' cybersecurity lapses -- told Fox News: "If we learned that the foreign minister of a major foreign country was using her own private server to send and receive emails, and was relying on outdated commercial software to operate and protect it, that’d be a hallelujah moment for us."
James Rosen joined Fox News Channel (FNC) in 1999. He currently serves as the chief Washington correspondent and hosts the online show "The Foxhole.""
"Contact
111 Eighth Avenue
New York, NY 10011
New York, NY 10011
Description
Base One Technologies,
Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed
on Feb 15, 1994. This file was obtained
from the Secretary of State and has a file
number of 1795583.
This business was created 7,695 days ago in the New York SOS Office and the registered agent is C T Corporation System that does business at 111 Eighth Avenue , New York in New York.
After conducting a search for principals and owners of Base One Technologies, Ltd., we were able to find 2 owners and/or executives. Their information is listed below.
This file was last
updated on May 14, 2013.
Principals
Liza R Zaneri
Chief Executive Officer
15 Irving Place
New Rochelle, NY 10801
Chief Executive Officer
15 Irving Place
New Rochelle, NY 10801
Liza R Zaneri
Principal Executive Office
15 Irving Place
New Rochelle, NY 10801
Principal Executive Office
15 Irving Place
New Rochelle, NY 10801
Registered Agent
C T Corporation System
111 EIGHTH AVENUE
NEW YORK, NY 10011
111 EIGHTH AVENUE
NEW YORK, NY 10011
"Serco's Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals." http://www.dtic.mil/
"Base One Technologies – Corporate Strategy – We are a Government Certified Women-Owned Business
We practice Diversity
Recruitment and Staffing for IT positions
Base One was founded in 1994 by a women engineer who had made a career in technology research for many years. Base One has been very successful in focusing on diversity recruiting and staffing for IT projects. It has been our experience that the greater the diversity mix, the more creative the solution. As in any field the more diverse the viewpoint the more thorough your analysis. Our engineers can think out of the box.
Because of our affiliations we have access to pools of resources among more diverse groups & individuals. We work with a large pool of minority professionals who specialize in IT skills. We are able to have access to these resources through our status as a D/MWBD firm and our affiliations. These affiliations assist us in working with resources among more diverse groups & individuals.
We are also partnered with firms that are 8A certified as Minority firms, Disabled Veteran firms, Native American firms, Vietnam veteran firms, women owned firms.
Our hub zone location keeps us close to the professional organizations of great diversity. We are active in recruiting from and networking with these community organizations of local IT professionals. This has given us access to a large pool of diversity talent.
Base One's staff of engineers are a diverse group of professionals. This diverse network of engineers helps us to branch out to other engineers and creates an even larger network of resources for us to work with.
The greater the diversity the more complete & thorough the analysis. The broader the spectrum of points of view the broader the scope of the analysis. We feel that a diverse team gives us a greater advantage in creating cutting edge solutions. To that end we will continue to nurture these relationships to further extend our talent pool.
The greater the diversity mix, the more creative the solution.
The more diverse the viewpoint, the more thorough the analysis.
The more diverse our team, the more our engineers can think out of the box.
This is why Base One Technologies concentrates on diversity recruitment in the belief that a diverse team gives us a greater advantage in creating cutting edge solutions."
Information Security Planning is the process whereby an organization seeks to protect its operations and assets from data theft or computer hackers that seek to obtain unauthorized information or sabotage business operations.
Key Clients Benefiting
From Our Information Security Expertise: Pentagon Renovation Program, FAA, Citigroup,
MCI.
Base One technologies
Base One technologies
Expertly researches, designs, and develops information security policies that protect your data and manage your firm's information technology risk at levels acceptable to your business.
Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report.
Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions."
"Opened in 1994 as the successor to the Transitional Immigrant Visa Processing Center in Rosslyn, Va., the NVC centralizes all immigrant visa preprocessing and appointment scheduling for overseas posts. The NVC collects paperwork and fees before forwarding a case, ready for adjudication, to the responsible post.
The center also handles immigrant and fiancé visa petitions, and while it does not adjudicate visa applications, it provides technical assistance and support to visa-adjudicating consular officials overseas.
Only two Foreign Service officers, the director and deputy director, work at the center, along with just five Civil Service employees. They work with almost 500 contract employees doing preprocessing of visas, making the center one of the largest employers in the Portsmouth area.
The contractor, Serco, Inc., has worked with the NVC since its inception and with the Department for almost 18 years.
The NVC houses more than 2.6 million immigrant visa files, receives almost two million pieces of mail per year and received more than half a million petitions from the U.S. Citizenship and Immigration Service (USCIS) in 2011. Its file rooms’ high-density shelves are stacked floor-to-ceiling with files, each a collection of someone’s hopes and dreams and each requiring proper handling.
….
The NVC also preprocesses the chief of mission (COM) application required for the fi ling of a petition for a Special Immigrant Visa (SIV). Such visas, for foreign nationals who have performed services for the U.S. government in Iraq and Afghanistan, require COM concurrence before the applicant can file a petition with USCIS. The NVC collects the requisite documents from such applicants and, when complete, forwards the package to the U.S. embassies in Baghdad or Kabul for COM approval"
"Update on Serco's Strategy Review including the Contract & Balance Sheet Reviews; capital structure and funding; latest trading and outlook
Date : 10 November 2014
THIS ANNOUNCEMENT AND THE INFORMATION CONTAINED HEREIN IS RESTRICTED AND IS NOT FOR RELEASE, PUBLICATION OR DISTRIBUTION, DIRECTLY OR INDIRECTLY, IN WHOLE OR IN PART, IN, INTO OR FROM THE UNITED STATES, CANADA, AUSTRALIA, JAPAN, SOUTH AFRICA OR ANY OTHER JURISDICTION IN WHICH THE SAME WOULD BE UNLAWFUL. PLEASE SEE THE IMPORTANT NOTICE AT THE END OF THIS ANNOUNCEMENT.
… Strategy Review: Serco's future to be as an international B2G business. A successful, innovative and market-leading provider of services to Governments. Core sectors: Justice & Immigration, Defence, Transport, Citizen Services and Healthcare.
….
In the Americas Division, our work for the US Affordable [Obama] Care Act (ACA) has begun an expanded first option year. Other awards in the period included: career transition services for US soldiers; health outreach services for the US Naval Reserve; deployable medical systems solutions also for the Navy; and two contracts for fleet maintenance services for commercial clients. In total, the ACA and all other awards in the period are valued at over $550m. Meanwhile, our contract supporting the Department of State's National Visa Center and Kentucky Consular Center (NVC/KCC) came to an end during the period, as did some Acquisition and Program Management support work for US intelligence agency customers. C4I2TSR services for the US Air Force and Naval installation task order work under the Sea Enterprise frameworks are also reducing. …
For further information please contact Serco:
Stuart Ford, Head of Investor Relations T +44 (0) 1256 386 227
Marcus De Ville, Head of Media Relations T +44 (0) 1256 386 226
Jonathan Glass, Brunswick T +44 (0) 207 404 5959
Analyst and institutional investor meeting…….
Download PDF [PDF, 387 KB] (Please note: this link will open the page in a new browser window)"
"WHY ON EARTH IS JANE GARVEY ON OBAMA’S RADAR SCREEN?
The Possible
Appointment Should Be The Last Straw For Americans
by: joan swirsky |
published: 02 06, 2009
It's no surprise that President Obama and his crack vetting team are considering Randy Babbitt as the next head of the Federal Aviation Administration. After all, Mr. Babbitt is former head of the country’s largest union representing airline pilots, and we know how near and dear to Mr. Obama’s heart unions are.
"The choice, if it goes through as anticipated," writes the Wall St. Journal’s Andy Paszfor (who reports on the FAA), "would satisfy labor leaders who have been urging the appointment of someone to the FAA sympathetic to their views. Babbitt has labor connections going back to the labor-management struggles at Eastern Airlines before the carrier folded decades ago,"
Who suggested Babbitt to the Obama administration? Why none other than Jane Garvey, the former chief of the FAA, who, Mr. Paszfor said, is now likely “to get the No. 2 job at the Department of Transportation."
To understand what a horrible – indeed, dangerous – choice Ms. Garvey would be in the sensitive position of insuring the safety of Americans' land and air travel, a little history is in order.
Four months before Sept. 11, 2001, recently retired Brian Sullivan, a former risk-management specialist (for over 10 years) in charge of physical security of air-traffic control towers and air-route traffic control facilities in New England, was so concerned about the lax security at Logan Airport that he wrote a letter to Sen. Kerry (D-MA), warning him of the potential for a terrorist disaster at the airport.
His letter held these prophetic words: "With the concept of jihad, do you think it would be difficult for a determined terrorist to get on a plane and destroy himself and all other passengers? Think what the result would be of a coordinated attack that took down several domestic flights on the same day. With our current screening, this is more than possible. It is almost likely."
Sullivan followed up by sending Kerry a videotape that showed the ease with which undercover reporters had successfully penetrated Logan's security screening 10 times with potentially deadly weapons.
For three months, Kerry did nothing with the information, finally sending it to the one agency – the Department of Transportation's Office of the Inspector General: DOT OIG – that Sullivan had specifically told him had been consistently remiss in taking action after such warnings.
Two of the four planes that attacked our nation on September 11th took off from Logan Airport and 80 of Kerry’s constituents died. Yet Kerry, who held evidence in his hands of Logan’s vulnerabilities, took no action – when his action may well have prevented the horrors of that fateful day.
Significantly, Sullivan also filed a complaint with the Hotline of the Federal Aviation Administration's chief administrator Jane Garvey (a Clinton holdover) and had the incriminating videotape delivered to her office.
WHO IS JANE GARVEY?
In the mid-'90s, Garvey was the former top administrator at Logan Airport, where it was no secret that the airport’s security system was riddled with problems. Strangely, however, the unremarkable job she did at Logan was thought worthy of reward by the Clinton administration.
In a gesture that
served to affirm the validity of the Peter Principle – in which people are
promoted until they reach their ultimate level of incompetence – Clinton
appointed Garvey to be director of the FAA in 1997.
During her tenure, Sullivan said, "FAA security personnel were placed in key management positions despite their limited experience in air security and their apparent ideological aversion to prescreen high-suspect people": i.e., Arab males from the Middle East between the ages of 20-40.
Two years after Garvey took the helm, the FAA fined the Massachusetts Port Authority $178,000 for 136 security violations at Logan that included failure to screen baggage properly and allowing easy access to restricted areas and parked planes. On one occasion, a 17-year-old man cut the razor wire on a perimeter fence surrounding Logan and walked for two miles across restricted areas, finally stowing away on a British Airways Boeing 747.
Did Garvey's FAA follow up on those fines? No. In the criminal indictment she never received, surely Exhibit A would have been September 11!
It is public knowledge that during the spring and summer of 2001, Garvey’s FAA sent out a CD-ROM of potential terrorist threats prepared by her security chief, Mike Canavan, to 700 airlines and airport executives. The FAA also had extensive data about Al Qaida and bin Laden in its Criminal Acts Against Civil Aviation Reports for 1999 and 2000. For instance:
In a May 1998 interview, Bin Ladin suggested that he could use a shoulder-fired surface-to-air missile to shoot down a military passenger aircraft transporting U.S. military personnel, adding that his attacks would not distinguish between U.S. civilians and military personnel… an exiled Islamic leader in the United Kingdom proclaimed in August 1998 that Bin Ladin would "bring down an airliner or hijack an airliner to humiliate the United States."
Ramzi Yousef masterminded the 1994 conspiracy to place explosive devices on as many as 12 U.S. airliners flying out of the Far East. In September 1996, Yousef was convicted for this plan and for placing a device on a Philippine Airlines plane in December 1994 as a test for his more elaborate scheme. Although Yousef is currently in prison, at least one other accused participant in the conspiracy remains at large. There are concerns that this individual or others of Yousef's ilk who may possess similar skills pose a continuing threat to civil aviation interests.
The terrorist threat remains. The most recent significant aviation-related terrorist action was the December 1999 hijacking of an Indian Airlines plane by members of a Kashmiri separatist group. There continues to be concern that the hijacking may either be copied or spur others to commit acts because this incident succeeded in gaining the release of prisoners and the hijackers have never been caught. Another threat is attributed to terrorist financier Usama Bin Laden…[who] has both the motivation and the wherewithal to do so.
But when I-don't-know-nuthin' Garvey testified before the 9/11 Commission, she claimed ignorance of any threats – saying that she hadn’t seen the CD-ROM until after September 11!
The 9/11 Commission didn't believe her. On page 83, its report states: "… the FAA's intelligence unit did not receive much attention from the agency's leadership. Neither Administrator Jane Garvey nor her deputy routinely reviewed daily intelligence, and what they did see was screened for them. She was unaware of a great amount of hijacking threat information from her own intelligence unit, which, in turn, was not deeply involved in the agency's policymaking process. Historically, decisive security action took place only after (my emphasis) a disaster had occurred or a specific plot had been discovered."
Further, according to Kevin Berger of Salon.com, commenting on reaction to the 9/11 Commission's Report: "But all of the international intrigue, not to mention partisan sniping over what president or government agency was at fault, has deflected attention from the one culprit that gets a universal thrashing in the 9/11 report: the Federal Aviation Administration." Translation: Jane Garvey!.
Berger documented the 9/11 Commission's findings of the grievous failings of the FAA under Garvey:
Each layer of the FAA
that was relevant to hijackings – intelligence, passenger prescreening,
checkpoint screening, and onboard security – was seriously flawed.
Although government
watch lists contained the names of tens of thousands of known terrorists,
including a State Department TIP-OFF list with 60,000 names, the FAA's own
"no-fly" list contained names of just 12 terrorist suspects.
At Logan's check-in counters, airline clerks tagged four of the five hijackers on American Flight 11 (the first jet to hit the World Trade Center) as suspect, yet they were allowed to board the plane.
Two of the hijackers on American Flight 77 from Dulles, which crashed into the Pentagon, set off the security gate alarm but the screeners didn't bother to investigate further and, again, allowed the hijackers to board the plane.
And most damning, Jane
Garvey did not review daily intelligence and so was "unaware of a great
amount of hijacking threat information from her own intelligence unit."
It was also under Garvey that the then-Computer Assisted PassengerProfiling System, or CAPPS I was neutered. After 9/11, the program was renamed the Computer Assisted Passenger Prescreening System, or CAPPs II, because, according to Sullivan, "of overzealous liberals, the American Civil Liberties Union and the diversity crowd who are hell-bent on insuring that political correctness is always implemented at the expense of our basic security."
And Sullivan cites
additional flaws in Garvey's FAA, all of them omittedfrom the 9/11
Commission’s report. For instance:
A memo dated April 2001 from Joe Lawless, director of security at the Massachusetts Port Authority, citing terrorist ties to Logan Airport and the need to address the airport’s known vulnerabilities.
The rejection of another Lawless memo by the Logan Airline Managers Council (LAMCO) and the FAA's federal security manager at Logan, proposing that the Mass. State Police begin undercover testing of screening checkpoints in July '01.
Reported sightings of Mohammed Atta at Logan in May and early September '01, involved in suspicious activity on the Air Operations Area and surveillance of checkpoints.
INCOMPETENCE INCARNATE
Yet all this is not where Garvey's egregious mismanagement of the FAA ends. According to NY Times reporter Matthew L. Wald, Garvey ignored both past incidents and those under her watch, including:
1994: The hijacking of two jetliners (one by an Islamic "militant" group) with the intent of "crashing them into buildings."
1994: A man stormed the cockpit of a domestic flight with the intention, according to his fellow employees, of crashing the plane into a building in Memphis.
1994: A lone pilot crashed a stolen single-engine Cessna into a tree on the White House grounds near the president's bedroom.
1996: The crash of T.W.A. Flight 800, which to this day many people believe was a terrorist attack.
1999: A report of an exiled Islamic leader in Britain who said in August 1998 that bin Laden would ''bring down an airliner or hijack an airliner to humiliate the United States.''
2000: The FAA's annual report saying that although Osama bin Laden ''is not known to have attacked civil aviation, he has both the motivation and the wherewithal to do so…bin Laden's anti-Western and anti-American attitudes make him and his followers a significant threat to civil aviation, particularly to U.S. civil aviation."
"But aviation security officials," Wald said, "never extrapolated any sort of pattern from those incidents." That includes the top official – the FAA's Jane Garvey.
Yet in spite of mountains of evidence pointing to Garvey’s complete incompetence, and in spite of the all the security experts in the United States – which include former or active police chiefs, retired FBI and CIA operatives and private companies that spend 24/7/365 assessing threats and formulating "coping" strategies – Kerry chose Garvey as an "expert" consultant IN CHARGE OF SECURITY for the 2004 Democratic National Convention.
That's right, Jane Garvey, who was singled out by the "we won't point fingers" 9/11 Commission as taking action "only after a disaster had occurred …" and whose FAA got "a universal thrashing" in the report.
A commentary in Aviation Insight & Perspectives said that: "Appointing Garvey head of convention security is like making John Gotti the head of the FBI."
Sadly, according to Brian Sullivan, "one single recommendation from the Gore Commission in 1997 to harden cockpit doors and enforce rules to keep them closed would have stopped the 9/11 attack cold. If the FAA's Garvey and DOT's chief Norman Mineta hadn’t been asleep at the wheel, 9/11 wouldn't have happened, plain and simple."
But it did happen and now we're left to ponder how on earth the Obama administration could be considering Garvey for the No. 2 spot at the FAA.
After less than three weeks in office, the woefully inexperienced Mr. Obama has offered our country the services of three tax cheats (Geithner, Daschle, and Killefer), a man under criminal investigation (Richardson), and a host of leftist policymakers that would do the Marxist-Leninist Politburo proud.
The possible
appointment of the incompetent Jane Garvey to the deputy's job at the DOT – which
has oversight of the FAA – should be the last straw for Americans of every
political stripe, or at least those who care about the still-looming terrorist
threat and their own safety on our roads and rails, and in the skies."
Yours sincerely,
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year
airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.