McConnell claims that Serco, operator of the U.S. National Visa Center, and its protégé Base One converted the U.S Naval Research Lab’s onion router into a honeypot patent thicket where devices accessible to the State Department and Serco's Black Hand navigators, could be used to silence people such as Fuddy and scan a document conversion of the Obama birth certificate.
McConnell notes Serco (the world's largest air traffic controller) filed a tor patent application in 1998 and processed a 2 millionth patent application for the U.S. Patent and Trademark Office in March 2013 giving its Base One protégé and Black Hand navigators ample opportunities to hack Huerta’s chain of command, crash planes, kill passengers and remove evidence from crime scenes.
Black Hand* – Serco navigators’ using the British Crown's "Patent Rights to Track, Film and Kill" from the City of London's Honourable Artillery Company 1537; The Master Mariners and The Air Pilots (formerly GAPAN) 1929, and The Ancient and Honorable Artillery Company of Massachusetts 1638 – whose alumni include U.S. Presidents James Monroe, Chester Alan Arthur, Calvin Coolidge and John F. Kennedy and – perhaps – Barack 'Down Low' Obama.
McConnell (30 year airline and 22 year military pilot with 23,000 hours of safety) is offering his expert-witness services to explain the FAA role in the murder of Lorretta Fuddy and how a Base One hack of FAA administrator Michael Huerta through the onion router (tor) serves to camouflage a Black-Hand murder-for-hire service by, in or near, Serco's airport control towers.
Prequel 1: #2323: Marine Links Base One Serco ESCORT to Black Hand Death of Dog Named Bart
Prequel 2: #2298: Marine Links Serco/Base One Jarrett Clinton Emails To HSBC Black Hand HUBZone, Fuddy Snuff Film Hit
Molokai Airport Tower Reflected in the Airline Schedule Glass
Serco... Would you like to know more?
SWISSLEAKS - "HSBC developed dangerous clients:
arms merchants, drug dealers, terrorism financers"
Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! (Mobile Playback Version)
[Note that HSBC is Serco's banker and, with Allianz and Her Majesty's Government, one of Serco's major shareholders ]
"Conflicting accounts of Loretta Fuddy's
death lend credence to assassination hypothesis
Posted on November 24,
2014 by Dr. Eowyn | 8 Comments Loretta Fuddy was the woman who, as director of the State of Hawaii's Department of Health, verified the authenticity of Obama's alleged Hawaii birth certificate, an image of which he released on April 27, 2011 in an effort to silence "birthers". (Fuddy said she gave Obama's lawyer, Judith Corley, two photocopies of his original 1961 birth certificate on April 25, 2011. Obama posted a scan of that birth certificate on the White House website on April 27, 2011.)
Since then, however, numerous documents experts have determined the certificate to be a computer-generated fake.
Loretta Fuddy On December 12, 2013, news came that 65-year-old Fuddy was one of nine passengers in a small commercial Cessna plane that crashed off the coast of Molokai, Hawaii. The Coast Guard found the passengers floating in the water with life jackets on. Fuddy died at the scene, while the other eight passengers, including DOH deputy director Keith Yamamoto, all survived with only minor injuries.
Keith Yamamoto From
the beginning, news accounts of Fuddy’s death were inconsistent and
contradictory.
On Dec. 12, 2013, the
Los Angeles Times reported that Honolulu Fire Captain Terry Seelig said Fuddy
didn't get out of the plane but had "remained in the fuselage of the
plane." Lt. William Juan with the Maui Police Department also said that
Fuddy’s body had been recovered from the wreckage.
On Dec. 14, 2013, the Associated Press had a very different account. According to a priest, Rev. Patrick Killilea, who consoled Keith Yamamoto after the crash, Yamamoto told him [Killilea] he had helped Fuddy get out of the plane wreck and into her life jacket, then held her hand to help her relax. The priest said, "They were all floating together, and she [Fuddy] let go and there was no response from her." KITV reported that other eye witnesses also said Fuddy had made it out of the plane just fine and was floating in the water, in her lifejacket, with fellow passengers. Another local news source reported that Coast Guard rescue swimmers said that they had found Fuddy, dead, floating in the water after the plane sank.
The latest is that there are THREE conflicting accounts of the cause of Fuddy’s death:
cardiac arrhythmia
drowning severe internal injuries.
Linda Jordan is a self-described "ordinary" American "housewife and mom of three" living in the state of Washington. In an article for Birther Report, Nov. 10, 2014, Jordan details the three conflicting causes of Fuddy’s death.
Linda Jordan is a self-described "ordinary" American "housewife and mom of three" living in the state of Washington. In an article for Birther Report, Nov. 10, 2014, Jordan details the three conflicting causes of Fuddy’s death.
1. CARDIAC ARRHYTHMIA On January 6, 2014, a press release from the Maui County Police Department stated that Loretta Fuddy had died from cardiac arrhythmia after the small plane she was in had to make an emergency ocean landing due to a failed engine.
2. DROWNING Nine months later in September 2014, Jordan discovered a report by Maui police detective Jamie Winfrey stating that "On December 13, 2013, an autopsy on the body of Loretta Fuddy was performed by medical examiner Dr. Lindsey Harle within the morgue at Molokai General Hospital. The preliminary cause of death is drowning," pending final autopsy report and toxicology results.
3. INTERNAL INJURIES Then in November 2014, Jordan found a debriefing report by a commander of the United States Coast Guard (USCG) who was part of the rescue effort in the waters of Molokai. The report says Loretta Fuddy died from “severe internal injuries".
Here's the relevant
part of the debriefing report, USCG Case Report Case #665884:
Note that:
A/C Commander = the USCG commander, whose name is LT (the name after LT is blacked out) CG1720 = Coast Guard 1720 1720 = a plane identifier number for the Coast Guard’s Hercules plane
"CG1720 arrived
O/S at 0220Z …..A/C Commander did not notice if a 121.5 distress signal was
radiating. He relayed that the pilot of the downed A/C stated that he lost
engine power shortly after take-off as he was making the left turn to head
towards Honolulu, after his second attempt to restart the engine failed he
prepped passengers and crew for a water landing and had them don PFD's. He was
able to execute a good water landing and disembark passengers prior to the A/C
sinking. Mrs. Fuddy was alive but had sustained severe internal injuries during
the ditching. She succumbed to those injuries while awaiting rescue resources
to arrive."
To complicate matters, Fuddy’s entire autopsy report, in spite of it being a public record, was blacked out. No medical findings were revealed other than the official cause of death of drowning.
Jordan points out that Hawaii Revised Statute HRS 841-3 requires a full investigation into accidental and unusual deaths. HRS 841-3 states:
"As soon as any coroner or deputy coroner has notice of the death of any person within the coroner's or deputy coroner's jurisdiction as the result of violence, or as the result of any accident, or by suicide, or suddenly when in apparent health, or when unattended by a physician, or in prison, or in a suspicious or unusual manner, or within twenty-four hours after admission to a hospital or institution, the coroner or deputy coroner shall forthwith inquire into and make a complete investigation of the cause of the death.
On October 29, 2014, Maui Police Chief Janice Okubo told Jordan that they have complied with HRS 841-3 by conducting an autopsy on Loretta Fuddy.
The problem is "a complete investigation" into a "suspicious or unusual" death involves more than just an autopsy. It includes interviewing witnesses and first responders, under sworn oath, and collecting evidence. The investigation also must be conducted in a manner where said interviews and evidence can be used in a court of law.
Jordan explains why we should be concerned about the death of Loretta Fuddy:
I'll tell you why. [In his autobiography] Obama said his father was a citizen of Kenya. For 16 years he told people that he himself was born in Kenya and was raised in Indonesia and Hawaii. This was in his biography on his publisher's website. [In the] biography he wrote about himself [which] he updated…several times during those 16 years…he always left in the part about being born in Kenya. And people believed him.
This was before he had proven himself to be a consummate liar so why shouldn't they have believed him? Those familiar with the Constitution pointed out that if he was born in Kenya and if his father was a citizen of Kenya, he was not eligible to be President of the United States.
Realizing the error of his ways, Obama immediately began insisting that he was a citizen of this country. He announced his bid for the presidency in February 2007 and on April 21,2007, he changed his biography to say that he was born in Hawaii.
That's about the same time people began demanding that he produce his original birth certificate.
Fours years later, and in re-election mode, Obama announced he was tired of all the “silliness” surrounding his citizenship status and asked Loretta Fuddy for a photocopy of his original birth certificate. What Obama actually posted, however, on the White House website, was an image of a forged Hawaiian birth certificate. A month before Fuddy died she had been named in an affidavit requesting that a Grand Jury launch an investigation into Obama's forged birth certificate and Fuddy’s role, if any, in the production of it. There were nine souls on board the plane that day on December 11, 2013, and Fuddy was the only fatality. So you can see why those of us who are convinced that Obama's birth certificate was forged, suspected foul play.
Of course we could be completely wrong. But the recent discovery that there were three extremely different causes of death listed for Fuddy, first, severe internal injuries, second, drowning and third, cardiac arrhythmia, bolsters that original suspicion.When stories change red flags should go up.
At the very least I am convinced that someone is trying to hide something about the way she died. Are they hiding incompetence, confusion at the scene of rescue, murder or something else? I don't know. But I do know this, an official investigation into the demise of Loretta Fuddy is long overdue and I don't care if it proves me wrong or proves me right. I just want to get this story straight.
Thank you, Linda Jordan, for your courage and tenacity in pursuit of the truth!"
"Michael Peter Huerta (born November 18, 1956) is the Administrator of the Federal Aviation Administration.[1] He was confirmed as deputy Administrator on June 23, 2010, and became acting Administrator upon the resignation of Randy Babbitt on December 6, 2011. He was confirmed as Administrator on January 7, 2013.
Career[edit]
He received his bachelor's degree in political science from theUniversity of California, Riverside and his master's in international relations from the Woodrow Wilson School of Public and International Affairs at Princeton University.
Huerta was commissioner of New York City's Department of Ports, International Trade and Commerce from 1986 to 1989. In January 1989, he left to serve as the executive director of the Port of San Francisco until 1993. From 1993 to 1998 he held senior positions at the United States Department of Transportation in Washington, D.C., serving under Secretaries Federico Peña and Rodney E. Slater during the Bill Clinton.
Huerta worked as a Managing Director with the Salt Lake Organizing Committee for the 2002 Olympic Winter Games,[2]prepared Salt Lake City's transportation outlets for the Olympics. Huerta was involved in the planning and construction of a variety of Olympic transportation facilities, as well as the development of a highly successful travel demand management system that made sure that the transportation system operated safely and efficiently.
From 2002 to 2009,
Huerta was Group President of the Transportation Solutions Group at Affiliated Computer Services, a
company later acquired by Xerox, specializing in business processes and information
technology.[3]
Federal Aviation Administration[edit]
President Obama nominated Huerta as Deputy Administrator of the Federal Aviation Administration (FAA). On January 26, 2010, Huerta appeared before Congress[4] for his confirmation hearing,[5] but his Congressional confirmation was held up by Texas Senator John Cornyn over fighter drones patrolling the Mexico–United States border near Corpus Christi.[6] Huerta waited over five months for his congressional confirmation; on June 23, 2010, he became Deputy Administrator of the FAA.
Huerta became Acting
Administrator of the FAA upon the resignation of Randy
Babbitt on December 6, 2011.[7]As Acting
Administrator, Huerta helped oversee the operation of the National Airspace System and a
$16 billion budget.
On March 27, 2012, President Barack Obama formally nominated him to serve as the next permanent Administrator of the Federal Aviation Administration for a term of five years; the nomination was subsequently confirmed by the U.S. Senate on January 1, 2013.[8][9]
In December 2013, under Huerta's supervision, the Federal Aviation Administration selected six public entities to develop unmanned aircraft systems (UAS) research and test sites around the country.[10]
In June 2014, Huerta
was named one of 8 Most Influential People in Drones.[11]"
David Stout @david_m_stout 4:10 AM ET
You'll never complain
again about not having the Internet at 30,000 ft.
Yes, having access to Facebook on a long flight helps to pass the time, but it could also be putting passengers in the crosshairs of terrorists and hackers, according to a new report released this week by a U.S. watchdog agency.
In a dossier released Tuesday, the U.S. Government Accountability Office (GAO) said new aircraft may be susceptible to having their inflight computer systems hacked through onboard wi-fi networks or remotely by individuals elsewhere.
"According to cybersecurity experts we interviewed, Internet connectivity in the cabin should be considered a direct link between the aircraft and the outside world, which includes potential malicious actors,” read the 56-page report.
The GAO stated that planes possess firewalls designed to block cyberattacks and protect the craft’s avionics; however, that software is still susceptible to being
penetrated.
"Four cybersecurity experts with whom we spoke discussed firewall vulnerabilities, and all four said that because firewalls are software components, they could be hacked like any other software and circumvented,” the report said.
The situation is made all the worse by the prevalent use of smartphones and other mobile devices by passengers and pilots alike on flights worldwide everyday.
“The presence of
personal smartphones and tablets in the cockpit increases the risk of a
system’s being compromised by trusted insiders, both malicious and
non-malicious, if these devices have the capability to transmit information to
aircraft avionics systems,” stated the dossier.
The Federal Aviation Administration said it has already begun taking steps to make cockpits safer and is consulting security experts to single out areas of concern.
"This threat will continue to evolve and it is something that needs to be at the forefront of our thinking," Michael Huerta, the FAA’s administrator, told a Senate oversight panel this week, according to Reuters.
Following the
publication of the report, lawmakers demanded that the federal agencies act
fast to counter any potential threats to the aviation industry.
"[The FAA] must focus on aircraft certification standards that would prevent a terrorist with a laptop in the cabin or on the ground from taking control of an airplane through the passenger wi-fi system," Representative Peter DeFazio told CNN."
"Base One Technologies …. N/WAN Design
Provide an IP based
Network Solution in response to an RFI from the FAA (Federal Aviation Agency)
to re-engineer their existing networks (FTI 2000).
Responsible for
providing and demonstrating the capabilities of an IP Network Architectural
Design including a Disaster Recover Solution in response to an RFI for the
FAA to upgrade or replace their current Mission Critical Network in the
United States.
Responsible for
providing a solution and a plan to transition the FAA's current X.25
environment to the proposed IP (BGP/OSPF) network.
Challenging performance requirements, such high availability (99.9997%) with very strict and aggressive Mean-Time-To-Recover (6 seconds), were exceeded or met. Using Networking solutions from Nortel Networks and Cisco Systems, we provided a highly scaleable, deterministic and secured IP network running over ATM. FT1/T1 was provided in areas where ATM was not available. ISDN dial backup and dial-on-demand routing were used to increase availability and enhance MTTR. User connectivity was provided with Hot-Standby-Routing-Protocol (HSRP) through robust and highly available Cisco Catalyst switches.
Responsible for
providing a security solution included for the entire network using
technologies such as Nokia/CheckPoint Firewall, Cylink ATM DS3, T1/FT1 &
ISDN Encryptors, and Dragon LAN based Intrusion
Detection Systems.
Network Design and Installation
Provided an
integrated Network Management Platform solution to monitor the entire
proposed network. Management solution included HP OpenView, HP NetMetrix, NAI
Distributed Sniffers, CiscoWorks2000, Preside Multiservice Data Manager, etc.
Provided a prototype
lab using loaned equipment from major network device vendors. The equipment
included Nortel Networks WAN Passport Switches, Cisco Systems Routers and LAN
Switches, Adtran ISDN PRI/BRI simulators/switches, in addition to security
and network management hardware and software.
Provided a
Proof-of-Concept presentation to MCI/WorldCom and the FAA representatives to
demonstrate the capabilities of the proposed Network Architecture.
Carefully reviewed
the RFI submitted by the Federal Agency of Aviation. Produced lists of
questions on items that needed clarifications and submit to FAA. Reviewed all
responses and adjust our proposals accordingly.
Managed all loaned
personnel who assisted in installing, maintaining, configuring and
documenting loaned hardware and software.”
|
"Serco Awarded $187 Million Federal Aviation Administration Contracts
Date : 16 April 2015
Serco Inc., a provider of professional, technology and managed services, announced today the award of two contracts to continue its 20-plus years of supporting the Federal Aviation Administration's (FAA) Contract Tower (FCT) Program. Serco will provide air traffic control specialists, safety managers, and program management services in support of 58 Air Traffic Control Towers (ATCTs) in 11 western states, including Alaska, California and Colorado. The two five-year contracts each have one base year and four one-year option periods, with a combined value of $187 million, if all options are exercised.
Under these contracts, Serco's Air Traffic Controllers will be responsible for the safe and efficient movement of commercial, general aviation and military aircraft on the airport and in the airspace surrounding the airport. The Company will also provide risk management, quality assurance and program management to meet FAA service standards and quality metrics. Serco will utilise its Aviation Safety Management System to improve safety and mitigate risks in the National Airspace System.
"Air Traffic Control Towers provide vital services ensuring that airports are safer for pilots and passengers at airports across the country." said Dan Allen, Serco Inc.'s Chairman and Chief Executive officer. "As experts in aviation and management solutions, we are honored and eager to continue supporting the FAA in 2015 and beyond."
As part of Serco Group, one of the largest contracted providers of Air Navigation Services worldwide, the company is responsible for more than 960,000 miles of airspace and handles more than seven million aircraft movements a year. Serco employs more than 700 air traffic control specialists at over 75 airports - located in the U.S., U.K. and Middle East - who help maintain flight safety. In the US, the company has also been honored with the prestigious Willie F. Card Federal Aviation Administration (FAA) Contract Tower Award at towers in Lewiston, ID, Phoenix-Mesa Gateway, AZ, Jackson Hole, WY, Goodyear, AZ, and San Luis Obispo, CA.”
"Onion routing network for securely moving data through communication networks
US 6266704 B1 ABSTRACT The onion routing network is used to protect Internet initiators and responders against both eavesdropping and traffic analysis from other users of the Internet. In the onion routing of the invention, instead of making connections directly to a responding machine, users make connections through onion routers. The onion routing network allows the connection between the initiator and responder to remain anonymous. Anonymous connections hide who is connected to whom and for what purpose from outside eavesdroppers."
"The best security: A trip through The Onion Router How TOR works. Courtesy TOR Project. Published: April 24, 2013, 11:38 am .. Before the Internet, people flocked to secret and well-hidden underground markets to purchase either illegal or morally questionable items. With the birth of the Internet, unlimited access to these items from around the world became a reality. The issue was creating a tunnel to transfer anything from heroin to full libraries of downloaded books, from one part of the world to the next securely and secretly. Enter Tor. The U.S Naval Research Lab created Tor, or The Onion Router, as an experiment in 1996. The lab has been studying different methods of carrying out anonymous communication between governments for years. The result was the original Tor network. .. Perhaps what Tor has become most well known for, though, is the Silk Road. Run by an anonymous individual who refers to themselves only as the Dread Pirate Roberts, the Silk Road is a highly illegal and highly profitable passageway for very illegal items. Buyers can purchase pounds of heroin or an arsenal and have it delivered to their home without leaving a trace. Discussions take place on a huge number of Tor forums daily between drug dealers from around the world discussing the latest trends and their future purchases. .. It may have been underground at one point, but it is no longer just a whisper in the dark forums of the Internet’s underbelly. It’s become a tool for activists, hackers, drug dealers, and curious minds. It’s the beginning of a line of networks that will become commonplace very soon. .. © COPYRIGHT - POSTMEDIA NEWS"
"Hillary wiped her server clean: As NBC's Kristen Welker reported over the weekend, the top Republican investigating the 2012 Benghazi attack, Rep. Trey Gowdy (R-SC), revealed that Hillary Clinton had wiped her server clean of her emails. "Clinton’s attorney, David Kendall, said Gowdy was looking in the wrong place," the AP says. "In a six-page letter released late Friday, Kendall said Clinton had turned over to the State Department all work-related emails sent or received during her tenure as secretary of state from 2009 to 2013. ‘The Department of State is therefore in possession of all Secretary Clinton's work-related emails from the (personal email) account,' Kendall wrote." Here's the "Meet the Press" discussion over the Clinton emails."
"[Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994.This file was obtained from the Secretary of State and has a file number of 1795583] Expertly researches, designs, and develops information security policies that protect your data and manage your firm's information technology risk at levels acceptable to your business. Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report. Develops and implements multi-layer Information Security Solutions, practices and procedures. We deploy Intrusion Detection Systems (IDS) and IP Security with VPN solutions using Cisco routers, Frame Relay, firewalls, address and port translation, obscurity standards and authentication technologies (AAA, 3DES, TACACS, etcŠ), to enhance and meet the level of Data Security required for global organizations. Conducts IT Security and Risk Assessment in Federal government as well as security testing, implementing security for multiple platforms and operating systems around the world. Ability to conduct business process analysis to provide technical security countermeasures, risk management and data communications security planning for large organizations. Provides computer security integration for web server and traditional client-server based applications. We secure environments up to as many layers as required by our clients' policies, industry practices, and regulating bodies - including the desktop and user experience as required. Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions."
"SOURCE: Base One Technologies September 02, 2008 09:00 ET Base One Technologies, Inc. Continues Operations in Government Space NEW ROCHELLE, NY--(Marketwire - September 2, 2008) - Base One Technologies, Inc. is pleased to announce that it has sold its affiliate, Base One Technologies Ltd., to Apptis Inc. Base One Technologies, Inc. will continue to compete in the government space as an 8(a), HubZone and Woman Owned Small Disadvantage Company. Base One Technologies, Inc. is an IT Engineering and Technical Services company founded in 1994. Base One has a Top Secret Facilities Clearance and specializes in: Enterprise Architecture, Network Infrastructure Support, Data Security, Software & Database Services, Disaster Recovery & Contingency Planning, and Independent Validation & Verification. Base One is a privately-held organization with headquarters in New Rochelle, NY. For more information visit: www.base-one.com. Contact Information: Liza R. Zaneri Base One Technologies 914 633-0200 x205 “www.base-one.com”
"Serco's Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals."
Yours sincerely,
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.