McConnell claims that Serco tasked its Base One protégé with the destruction of the Pentagon's U.S. Navy Command Center on 9/11 and the transfer of its patented onion-router network to a Silk Road bypass command presently headed by Jarrett and Clinton's hedge-fund women.
McConnell notes that Jarrett's mentors in Chicago, Bernardine Dohrn and Bill Ayers, believed they would need to kill 25 million Americans to secure their Weather Underground revolution.
McConnell believes that Jarrett has asked Base One to structure the Jade Helm command so she could switch it from a training exercise to a Serco Black Hand ammo event and hedge against the implosion of Clinton’s presidential campaign after 25 years of pay-to-play racketeering.
Serco's Black Hand ammo drop to ISIS
"Hillary wiped her server clean: As NBC's Kristen Welker reported over the weekend, the top Republican investigating the 2012 Benghazi attack, Rep. Trey Gowdy (R-SC), revealed""
"Valerie Jarrett gets creepy in commencement speech May 20, 2014 by Joe Saunders The little liberals laughed, but Valerie Jarrett wasn't joking. In a commencement speech at Southern California's Pomona College, a tiny liberal arts school for the offspring of the well-heeled — tuition, room and board run north of $60,000 a year – President Obama's senior adviser warned her audience that the government she's a shadowy part of can shadow their every move online. … "Before I hire anybody, I always check out everything they've been doing online," Jarrett said. “And believe me, we have ways of finding out everything you've been doing online." .. Instead they laughed, happily comforted by knowing their government can literally find out about "everything" they've been doing online... Check out Jarrett's speech here (nothing groundbreaking, a mildly pathetic plug for Obamacare). The online-spying part is about the 17:20 mark. H/T: The Blaze"
"White House addresses Jade Helm 15 exercise as conspiracy theories grow even wilder
TRAVIS GETTYS 30 APR 2015 AT 11:25 ET The White House slapped down rumors that an upcoming multi-state military training exercise would lead to martial law or the violation of constitutional rights. Conspiracy theorists are warning the two-month Jade Helm 15 exercise planned for seven southwestern states is a prelude to suspension of law or possibly even a foreign invasion, and state and now federal officials have tried to alleviate their concerns. Texas Gov. Greg Abbott has asked the commander of the volunteer State Guard to monitor training exercises in the state after fearful residents voiced their concerns to a U.S. Army spokesman this week in Bastrop County. “I have no idea what he's thinking," said Josh Earnest, White House press secretary, of the Republican Abbott's request. "In no way will the constitutional rights or civil liberties of any American citizen be infringed upon while this exercise is being conducted." Utah Gov. Gary Herbert, also a Republican, assured residents in his state that Jade Helm 15 is a standard military training exercise after receiving about 25 calls from concerned citizens. A map shared by the military designates Texas, Utah, and California as "hostile" territories during the training exercise, which will be conducted on private property with consent of the landowner and involve volunteer role players. The exercise is intended to allow military special operations troops to practice unconventional warfare, officials have said, and the states were chosen due to their topographical resemblance to overseas combat zones. … "We expecting an attack on more than one Texas city or town by ISIS and/or any of their partners," the anonymous Ranger claims in a letter. Those partners, apparently, include U.S. Navy SEALs and other American elite forces, according to the website. "I will support the Feds in their preparation against ISIS," the alleged Ranger said. "But the moment that this action turns against our locals is the moment I will perform my oath of office. I am not alone in this feeling. None of my brothers trust Homeland. We will have to see where this is going but I have a bad feeling.""
"RT Home / USA / DHS won't explain its order of 450 million hollow point bullets
Published time: April 03, 2012 21:48 Edited time: May 26, 2012 19:10
After 9/11, the United States government created the Department of Homeland Security to prevent future acts of terrorism and deal with other domestic issues. Now in order to keep doing such, the agency is asking for 450 million hollow point bullets. The DHS has signed off on an "indefinite delivery" from defense contractors ATK that will include, for some reason, nearly 500 million high-power ammunition for .40 caliber firearms. The department has yet to discuss why they are ordering such a massive bevy of bullets for an agency that has limited need domestically for doing harm, but they say they expect to continue receiving shipments from the manufacturer for the next five years, during which they plan to blow through enough ammunition to execute more people than there are in the entire United States. "We are proud to extend our track record as the prime supplier of .40 caliber duty ammunition for DHS," reads an official statement from Ron Johnson, ATK's president of Security and Sporting, who adds that his group will also be giving up weaponry to the DHS subdivision of ICE, or Immigrations and Custom Enforcement."
"Defense Ammunition Center (DAC) Contract Type Fixed Price Period of Performance 10/1/2008 to 9/30/2013 Project Overview: Since 2008, Serco has assisted DAC with the analysis, design, development, implementation, management/ administration, and evaluation of integrated, enterprise-wide and component-specific training, learning, knowledge management, and strategic human resource management interventions that are critical to achieving their mission. .. Most recently, Serco proposed the inclusion of mobile application tools and games to reinforce training and provide continuous and "in the field" performance support. To date, Serco has developed six mobile apps which have been distributed for both the iOS (Apple App Store) and Android (Google Play) environments. Together, these apps have reached over 15,000 soldiers and have allowed DAC to become a center of excellence in this burgeoning training environment."
"Obamacare Serco [Spying] Scandal Grows
Arkansas office also pays people to do nothing
BY: Washington Free Beacon Staff May 20, 2014 9:09 am
More employees from the embattled Obamacare contractor Serco are stepping forward with allegations they are being paid to do nothing, KLOR-MO reports. Chris Nagus with KMOV broke the story last week of a Missouri Serco office where employees at a paper Obamacare processing office had no work to do. Following his report, Nagus spoke with employees from a Rogers, Arkansas Serco office. The employees were afraid of retribution so their identities were protected. Some of the familiar allegations include one man who said he has processed about 40 health insurance applications in six months. Moreover, the Rogers office had a day and night shift to make outbound calls. An unnamed worker told Nagus they are prohibited from calling anyone after 9 and yet are required to stay on the clock until midnight."
"Trying to shut down Silk Road, and any of its many-headed hydra reiterations, seems to be the ultimate lesson in futility. According to Motherboard, a new version of the online black market, called Silk Road Reloaded, launched today on the I2p anonymous network, dealing with several altcoin currencies. In fact, those are two of the biggest differentiators between this new Silk Road and its ancestors. Where Silk Road and Silk Road 2.0 used Tor and Bitcoin almost exclusively, Silk Road Reloaded will use a total of eight different forms of cryptocurrency, including Darkcoin, Dogecoin, and Anoncoin, with more along the way. As Motherboard mentions, Silk Road Reloaded has most of the illicit unmentionables you'd expect from an online black market, save for weapons and stolen credit card credentials. The biggest news is that Silk Road Reloaded transitions from Tor to the anonymous, decentralized I2p network. Think of it as the deeper deep web. When Silk Road 2.0 was shutdown in November last year, black markets struggled to find an alternative to set up shop, fearing that Tor had been compromised or was culpable due to its U.S. government ties (those fears have not gone away.). It would seem that Reloaded has found a possible answer."
"Dark web ethnographic method Because this is an ethnography of a dark web SNS, there were several methodological challenges. The dark web is different from the “clear web” in important ways. The dark web is part of the Internet that cannot be accessed by mainstream software.1 It includes hidden sites that end in ".onion" or ".i2p" or other Top-Level Domain names only available through modified browsers or special software. Accessing I2P sites requires a special routing program. Accessing non-mainstream Top-Level Domains through OpenNIC requires the user to change the DNS server addresses on his or her router. Accessing .onion sites requires Tor (for a tutorial on Tor and .onions, see Hoffman (2012)). Moreover, those who run dark websites that end in .onion are able to hide their identities and locations from most, if not all."
"[Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994.This file was obtained from the [Clinton] Secretary of State and has a file number of 1795583] .. Conducts IT Security and Risk Assessment in Federal government as well as security testing, implementing security for multiple platforms and operating systems [onion router] around the world ... Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions."
"Corporate Diversity We are a Government Certified Women-Owned Business We practice Diversity Recruitment and Staffing for IT positions Base One was founded in 1994 by a women engineer who had made a career in technology research for many years. Base One has been very successful in focusing on diversity recruiting and staffing for IT projects. It has been our experience that the greater the diversity mix, the more creative the solution. As in any field the more diverse the viewpoint the more thorough your analysis. Our engineers can think out of the box. Because of our affiliations we have access to pools of resources among more diverse groups & individuals. We work with a large pool of minority professionals who specialize in IT skills. We are able to have access to these resources through our status as a D/MWBD firm and our affiliations. These affiliations assist us in working with resources among more diverse groups & individuals. We are also partnered with firms that are 8A certified as Minority firms, Disabled Veteran firms [such as Metris the coordinator of Jade Helm, see below], Native American firms, Vietnam veteran firms, women owned firms."
"Metris is a Service-Disabled Veteran-Owned Small Business (SDVOSB) founded by current and former members of the United States Special Operations and Interagency community headquartered in Mesa, AZ. Established in order to provide the most well-rounded and realistic solutions to its clients, Metris brings the best-value proposition and true Subject Matter Expertise in all that we do. In a world gone wireless, mobile voice communications must be secure. Espionage – from state sponsors, rogue actors or global business interests represent a massive and growing threat. Conventional solutions harden devices, tunnel conversations and mask IP addresses. These approaches are problematic, expensive and limiting. Devices, networks and technologies are changing far too rapidly. Plus, this severely limits agility, thwarting a critical advantage of mobile voice communications. SAIFE's Agile Security is a revolutionary step forward in mobile communications, enabling secure person-to-person conversations on any device, any network, and in any situation. Plus, SAIFE is modular. The secure CORE supports an APP-based environment that enables integrators and innovators to craft highly customized voice environments for government, military, and civilian situations."
"Serco's Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco [and its drug hub banker HSBC] mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals."
"City A.M. Outsourcing firm Serco has finally received some good news .. After being asked last year to conduct an investigation into whether Serco staff had been misleadingly recording [tagged] prisoners as ready for court when they were not, the Crown Prosecution Service has accepted the view of the City of London Police and put Serco in the clear."
"Serco farewell to NPL after 19 years of innovation 8 January 2015 .. During that period under Serco's management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK's economy and industry .. .. NPL's caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency [hedge fund] trading in the City through NPLTime."
"The Bill, Hillary & Chelsea Clinton Foundation[2] (originally, the William J. Clinton Foundation) is a non-profit foundationestablished by former President of the United States Bill Clinton with the stated mission to "strengthen the capacity of people throughout the world to meet the challenges of global interdependence." The Foundation focuses on four critical areas: health security; economic empowerment; leadership development and citizen service; and racial, ethnic and religious reconciliation. ... They have offices located in New York City and Little Rock, Arkansas. Greater than $25,000,000[edit] Bill and Melinda Gates Foundation[12] The Children's Investment Fund Foundation UNITAID Centenary Group InternationalFrank Giustra , chief executive officer, The Radcliffe Foundation.[12] $1,000,001 to $5,000,000[edit] 100 Women in Hedge Funds … Citi Foundation (did not give in 2009[12]) Clinton Giustra Sustainable Growth Initiative – Canada .. Dubai Foundation (did not give in 2009[12]) .. Friends of Saudi Arabia Mala Gaonkar Haarmann .. Diana, Princess of Wales Memorial Fund The Al Nahyan Family of The United Arab Emirates .. State of Kuwait (did not give in 2009[12]) State of Qatar (did not give in 2009[12]) .. Swiss Reinsurance Company .. Rockefeller Foundation .. The Sultanate of Oman[12] The Wal-Mart Foundation"
"100 Women in Hedge Funds was formed in December 2001 when Dana Hall, Carol Kim, and Sarah Dyer decided to bring together 100 seasoned female industry leaders. Their initial goal was to form a professional community to teach women to better leverage their collective relationships [with the pay-to-play Clinton Foundation] and improve communication within the alternative investment industry .. organization's three pillars: education, professional leverage, and philanthropy. .. Today, 100WHF boasts more than 13,000 members in 19 locations across three continents. Members represent over 2,800 hedge funds, 1,000 fund of funds and 500 institutional buyers. They also represent the various roles within financial organizations; 100WHF is proud to say that its membership includes over 1,600 portfolio managers and research analysts, as well as over 1,000 senior executives including CEOs, Presidents, COOs and CCOs."Black Hand* – Serco navigators' using the British Crown's "Patent Rights to Track, Film and Kill" from the City of London's Honourable Artillery Company 1537; The Master Mariners and The Air Pilots (formerly GAPAN) 1929, and The Ancient and Honorable Artillery Company of Massachusetts 1638 – whose alumni include U.S. Presidents James Monroe, Chester Alan Arthur, Calvin Coolidge and John F. Kennedy and – perhaps – Barack 'Down Low' Obama.
McConnell wants Jade Helm cancelled and is demanding an investigation into the command chain which appears to have put Valerie Jarrett in control of Serco's Black Hand ammo caches and the Silk Road onion router for the Clinton Foundation and its 100 Women in Hedge Funds.
Prequel 1: #2337: Marine Links Clinton's Hedge-Fund Women To Serco Black-Hand Tor, Child-Porn Base-One Honeypots
Ron Paul Responds To Jade Helm
Anonymous #OpCounter JH15 Engaged
Defense Ammunition Center
Larry Grathwohl on Ayers' plan for American
re-education camps and the need to kill millions
Serco... Would you like to know more?
SWISSLEAKS - "HSBC developed dangerous clients:
arms merchants, drug dealers, terrorism financers"
Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! (Mobile Playback Version) [Note that HSBC is Serco's banker and, with Allianz and Her Majesty's Government, one of Serco's major shareholders]
"Jade Helm 15: Police State USA, The End of Posse Comitatus?
By Prof. James F. Tracy Global Research, April 28, 2015
Region: USA Theme: Law and Justice, Police State & Civil Rights Earlier this year US Retired Non-Commissioned Special Forces Officer Tom Mead addressed the Howard County Texas Board of Supervisors on the Jade Helm 15 military and law enforcement exercises that will be taking place in across the southern United States in Summer 2015.
"What is Jade Helm?" Mead asks those in attendance.
Jade Helm is a challenging eight week exercise. Truly, in the Martin and Howard County area we're only going to be here for about five-to-five and half weeks. The eight weeks comes in where there is the preparation and planning that happens back in Florida and in the Mississippi area. The exercise is a joint military and inter-agency activity. What this means is that we have units from every military service participating in the exercise with us. And we also have some of our inter-agency partners, such as the FBI and the DEA, and some of the other agencies assisting us and working with us in the exercise. (Emphasis added)
The exercise is going to be throughout seven states," Mead continues.
"Texas is the main bulk of the activity. We are spread from east to west, north to south, throughout the state of Texas. It is a Special Operations Command, General [Joseph L.] Votel-sponsored exercise to improve Special Operations forces’ ability to conduct unconventional warfare as part of the national security" (emphasis added).
In the question and answer portion of the presentation, Mead further explains to board members how Jade Helm, a new exercise he describes as also being developed by US Special Operations General Charles T. Cleveland, will now be conducted within the United States annually.
Further, Mead points out that the FBI and DEA will be involved in "questioning" individuals. It is unclear whether the individuals being interrogated are part of the exercise, or what they will be questioned about. "They will actually do some questioning for us at one of the airports in Arizona." A military or civilian airport? He doesn't elaborate.
Mead also provides a conflicted response when asked by the county officials if only US military and law enforcement personnel will be involved in the exercise. "Do you use any personnel from NATO, the UN or DHS?" one board member asks (at 12:56 in the above video). "Currently for Jade Helm it is US only. We, ah, that has been one of the discussions that, uhm, I’m not sure if it has occurred yet."
A sober observer might conclude (as a portion of the public already has) that Jade Helm is likely a means to acclimate America for eventual martial law. Since September 11, 2001 US citizens have experienced a steady erosion of their civil liberties associated with the dubious rationale of the "war on terror." The increased militarization of law enforcement and now operations like Jade Helm being carried out on domestic soil further indicate how the Posse Comitatus Act, introduced in 1878 and intended to prevent the federal government from using the military for domestic law enforcement, is being steadily eviscerated, though it is important to note that as recently as 2002 the US Congress reaffirmed the significance of the law.
Even the Rand Corporation has suggested that the US military has no clear criteria concerning when and how Posse Comitatus applies to exercises such as Jade Helm. "[I]t is critical," Rand researchers observe in one study, "that the Army develop doctrine, leadership, and training programs that can provide clear and specific guidance on when and how the Posse Comitatus Act—as well as any other laws that proscribe Army activities in the domestic arena—applies and when it does not."
The US military also wants to revisit Posse Comitatus, although it appears to regard it as a quaint formality, particularly in light of its cavalier insistence that Jade Helm go forward unhindered and on an annual basis. "The Posse Comitatus Act is an artifact of a different conflict-between freedom and slavery or between North and South," one military official argues. "Today's conflict is also in a sense between freedom and slavery, but this time it is between civilization and terrorism. New problems often need new solutions, and a new set of rules is needed for this issue" (emphasis added). Given Jade Helm's active collaboration between military and law enforcement such a remark is especially chilling.
Indeed, elected leaders and the federal law enforcement agencies involved in "partnering" with the military in Jade Helm routinely regard the civilian population as if it were a prolific spawning ground for "terrorists" (e.g. here, here, here, here and here).
The confusion over what should be a clear firewall between civil society and military exploits does not bode well for the US citizenry, who will soon be getting a glimpse in the "homeland" of what NATO and its military do on a routine basis to would be terrorists and their loved ones throughout the world."
"Thomas Mead
Site Lead at Metris
Fayetteville, North Carolina
Area Defense & Space
Previous
NEK Advanced Securities Group, Inc.,
DynCorp International,
US Army Education
Methodist College
Background
Summary
A goal oriented executive that understands the theory and implementation of strategic and operational planning to grow and satisfy a targeted customer base. An effective leader who has a reputation for applying pragmatic and innovative solutions to the coordination of cross functional skill sets in support of local, national and strategic importance complex issues. Proven to work well under pressure with an exceptional ability to communicate ideas clearly and effectively.
Specialties:
• Project management
• Professional written correspondence
• Experienced briefer
• Personnel management
• Strategic planning
• Goal oriented Cleared for Top Secret information
• Systems design
• Interagency cooperation
• Training management
• Advanced problem solving
• Bilingual - Spanish
Experience
Site Lead
Metris July 2012 – Present (2 years 11 months)
Fayetteville, North Carolina Area
IW Instructor
NEK Advanced Securities Group, Inc.
March 2012 – October 2012 (8 months)
Camp Lejeune, NC
Customer Account Executive
DynCorp International
September 2010 – February 2012 (1 year 6 months) MSG, Special Forces
US Army October 1990 – November 2010 (20 years 2 months)"
"City A.M. Outsourcing firm Serco has finally received some good news after a disastrous year.
After being asked last year to conduct an investigation into whether Serco staff had been misleadingly recording prisoners as ready for court when they were not, the Crown Prosecution Service has accepted the view of the City of London Police and put Serco in the clear.
No charges will be brought against Serco or their staff. It was also found that the information gathered for the City of London Police was sound enough to conclude that there was "no evidence of any corporate-wide conspiracy or an intention to falsify figures to meet the DRACT contract requirement by senior Serco management or at the board level of the company".
The City of London Police will not be continuing their investigation. The controversy began after the police were asked to investigate allegations of fraud at the FTSE 250 company over a £285m prison contract with the ministry of Justice last year."
"Serco farewell to NPL after 19 years of innovation 8 January 2015
Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco's management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK's economy and industry. Some of the key achievements during that time have been: .. It has been estimated that [scams] carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade. .. NPL's caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading in the City through NPLTime."
"Serco's Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco [and its drug hub banker HSBC] mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals."
"Dark web ethnographic method Because this is an ethnography of a dark web SNS, there were several methodological challenges. The dark web is different from the "clear web" in important ways. The dark web is part of the Internet that cannot be accessed by mainstream software.1 It includes hidden sites that end in ".onion" or ".i2p" or other Top-Level Domain names only available through modified browsers or special software. Accessing I2P sites requires a special routing program. Accessing non-mainstream Top-Level Domains through OpenNIC requires the user to change the DNS server addresses on his or her router. Accessing .onion sites requires Tor (for a tutorial on Tor and .onions, see Hoffman (2012)). Moreover, those who run dark websites that end in .onion are able to hide their identities and locations from most, if not all."
"Base One Technologies "[DOMESTIC BUSINESS CORPORATION, located in New Rochelle, NY and was formed on Feb 15, 1994. This file was obtained from the [Clinton] Secretary of State and has a file number of 1795583] …. N/WAN Design Provide an IP based Network Solution in response to an RFI from the FAA (Federal Aviation Agency) to re-engineer their existing networks (FTI 2000). .. Responsible for providing and demonstrating the capabilities of an IP Network Architectural Design including a Disaster Recover Solution in response to an RFI for the FAA to upgrade or replace their current Mission Critical Network in the United States [allegedly to prepare for the attacks of 9/11] … Responsible for providing a security solution included for the entire network using technologies such as Nokia/CheckPoint Firewall, Cylink ATM DS3, T1/FT1 & ISDN Encryptors, and Dragon LAN based Intrusion Detection Systems. .. Managed [Clinton war room for] all loaned personnel who assisted in installing, maintaining, configuring and documenting loaned hardware and software."
"Onion routing network for securely moving data through communication networks US 6266704 B1 ABSTRACT The onion routing network is used to protect Internet initiators and responders against both eavesdropping and traffic analysis from other users of the Internet. In the onion routing of the invention, instead of making connections directly to a responding machine, users make connections through onion routers. The onion routing network allows the connection between the initiator and responder to remain anonymous. Anonymous connections hide who is connected to whom and for what purpose from outside eavesdroppers."
"The best security: A trip through The Onion Router
How TOR works. Courtesy TOR Project. Published: April 24, 2013, 11:38 am .. Before the Internet, people flocked to secret and well-hidden underground markets to purchase either illegal or morally questionable items. With the birth of the Internet, unlimited access to these items from around the world became a reality. The issue was creating a tunnel to transfer anything from heroin to full libraries of downloaded books, from one part of the world to the next securely and secretly. Enter Tor. The U.S Naval Research Lab created Tor, or The Onion Router, as an experiment in 1996. The lab has been studying different methods of carrying out anonymous communication between governments for years. The result was the original Tor network. .. Perhaps what Tor has become most well known for, though, is the Silk Road. Run by an anonymous individual who refers to themselves only as the Dread Pirate Roberts, the Silk Road is a highly illegal and highly profitable passageway for very illegal items. Buyers can purchase pounds of heroin or an arsenal and have it delivered to their home without leaving a trace. Discussions take place on a huge number of Tor forums daily between drug dealers from around the world discussing the latest trends and their future purchases. .. It may have been underground at one point, but it is no longer just a whisper in the dark forums of the Internet's underbelly. It's become a tool for activists, hackers, drug dealers, and curious minds. It's the beginning of a line of networks that will become commonplace very soon. .. © COPYRIGHT - POSTMEDIA NEWS"
Yours sincerely,
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.