Wednesday, August 19, 2015

#2430: Expert Witness for MitM USNO – Serco Crime Time – Clinton Remote Assassination Betting

From United States Marine Field McConnell 
Plum City Online - (AbelDanger.net
August 19, 2015

1. Field McConnell is offering his support as an expert witness to class-action plaintiffs who choose to sue for wrongful deaths which can be attributed to man in the middle (MitM) attacks on the United States Naval Observatory's (USNO) positioning, navigation and timing services to the Navy and Department of Defense.

2. In 1994, various USNO positioning, navigation and timing services to the Navy's mission-critical operations, were outsourced to Serco whose 8(a) companies are allegedly pre-deployed to crime scenes build the bogus timelines needed to conceal murder-for-hire at mass-casualty events up to and including the Rwanda Genocide.

3. In 1994, Clinton insiders allegedly began using USNO servers installed by Serco's 8(a) protégé company, Base One Technologies, to support remote assassination betting on the times of wrongful deaths at mass-casualty events (cf. USS Cole, AA Flight 77, Benghazi Digital Fires and GermanWings Flight 9525)

McConnell is offering his expert-witness services to plaintiffs in wrongful-death lawsuits while he and Abel Danger Research continue to expose Serco and its alleged MitM attacks on the United States Naval Observatory in his e-book "Shaking Hands With the Devil's Clocks". (See http://www.abeldanger.net/2010/01/field-mcconnell-bio.html )

 Democratic presidential nominee Al Gore – makes a statement to the media from his Man in the Middle residence at the Naval Observatory November 17, 2000 in Washington.


US Criminal Regime: Expert 9/11 Witness, Danny Jowenko, Ordered Murdered 
 
"How much time do we have Hillary?"

Bill Clinton's betting date in Queensland hotel, Osama bin Laden's betting time in UAE hotel for the Serco 8(a) MitM attack on the Pentagon's U.S. Navy Command Center at 9:37:19 on 9/11!

"Gore Planned To Tap Every Phone In The US
 By Curt  3 Comments  Thu, Jan, 19th, 2006  75 views
Interesting how Al Gore was recently screaming about Bush authorizing a wiretap program where we intercept calls made from across the ocean into the states by Al-Qaeda members, without a warrant.? But he didn’t bother to bring up his Clipper Chip program did he?
There are times when Al Gore should sit down and shut up. Former Vice President Al Gore called for an independent investigation into President Bush’s domestic spying program, insisting that the president “repeatedly and insistently” broke the law by eavesdropping on Americans without court approval.
What Al Gore forgot to tell his audience was that he not only supported eavesdropping on Americans without court approval ? he also chaired a project designed to execute just that in total secrecy. In short, Al Gore wanted to bug every phone, computer and fax in America.
In 1993 Al Gore was charged by then President Bill Clinton to run the “Clipper” project. Clipper was a special chip designed by the National Security Agency (NSA) to be built into all phones, computers and fax machines. Not only would Clipper provide scrambled security, it also contained a special “exploitable feature” enabling the NSA to monitor all phone calls without a court order.
In 1993, VP Al Gore went to work with a top secret group of Clinton advisers, called the IWG or Interagency Working Group, and delivered a report on the Clipper project.
“Simply stated, the nexus of the long term problem is how can the government sustain its technical ability to accomplish electronic surveillance in an advanced telecommunications environment,” states the TOP SECRET report prepared by Gore’s Interagency Working Group.
“The solution to the access problem for future telecommunications requires that the vendor/manufacturing community translate the government’s requirements into a fundamental system design criteria,” noted the Gore report.
“The basic issue for resolution is a choice between accomplishing this objective by mandatory (i.e., statutory/regulatory) or voluntary means.”
The documented truth is that America was to be given no choice but to be monitored by Big Brother Al. This awful conclusion is backed by several other documents. One such document released by the Justice Department is a March 1993 memo from Stephen Colgate, Assistant Attorney General for Administration.
According to the Colgate memo, Vice President Al Gore chaired a meeting with Hillary Clinton crony Webster Hubbell, Janet Reno, Commerce Secretary Ron Brown and Leon Panetta in March 1993. The topic of the meeting was the “AT&T Telephone Security Device.”
According to Colgate, AT&T had developed secure telephones the U.S. government could not tap. The Clinton-Gore administration secretly contracted with AT&T to keep the phones off the market. Colgate’s memo noted that the administration was determined to prevent the American public from having private phone conversations.
“AT&T has developed a Data Encryption Standard (DES) product for use on telephones to provide security for sensitive conversations,” wrote Colgate.
“The FBI, NSA and NSC want to purchase the first production run of these devices to prevent their proliferation. They are difficult to decipher and are a deterrent to wiretaps.”
Buried in the Colgate memo is the first reference to government-developed monitoring devices that would be required for all Americans.
According to the March 1993 Colgate memo to Hubbell, “FBI, NSA and NSC want to push legislation which would require all government agencies and eventually everyone in the U.S. to use a new public-key based cryptography method.”
Al Gore quickly embraced the Clipper chip and the concept of monitoring America at all costs. In 1994, Gore wrote a glowing letter supporting the Clipper chip and the government-approved wiretap design.
“As we have done with the Clipper Chip, future key escrow schemes must contain safeguards to provide for key disclosures only under legal authorization and should have audit procedures to ensure the integrity of the system. We also want to assure users of key escrow encryption products that they will not be subject to unauthorized electronic surveillance,” wrote Gore in his July 20, 1994 letter to Representative Maria Cantwell.
However, Gore lied. In 1994, federal officials were keenly aware that the Clipper chip design did not have safeguards against unauthorized surveillance. In fact, NASA turned down the Clipper project because the space agency knew of the flawed design.
In 1993, Benita A. Cooper, NASA Associate Administrator for Management Systems and Facilities, wrote: “There is no way to prevent the NSA from routinely monitoring all [Clipper] encrypted traffic. Moreover, compromise of the NSA keys, such as in the Walker case, could compromise the entire [Clipper] system.”
Ms. Cooper referred to Soviet spy John Walker, who is serving life in prison for disclosing U.S. Navy secret codes. In 1993 Ms. Cooper did not know of Clinton Chinagate scandals, the Lippo Group, John Huang or Webster Hubbell, but her prophetic prediction was not so remarkable in retrospect.
Yet, Al Gore pressed ahead, continuing to support a flawed design despite warnings that the design could “compromise” every computer in the U.S.
A 1996 secret memo on a secret meeting of CIA Directer John Deutch, FBI Director Louis Freeh and Attorney General Janet Reno states, “Last summer, the Vice President agreed to explore public acceptance of a key escrow policy but did not rule out other approaches, although none seem viable at this point.”
The article then goes on to detail how the Gore team decided they would attempt to steer the Clipper chip into foreign markets.? Funny how Gore said Bush’s surveillance is “a threat to the very structure of our government” but his own plans were FAR more intrusive.? Guess he has a short memory.”
The United States Naval Observatory (USNO) is one of the oldest scientific agencies in the United States, with a primary mission[1] to produce Positioning, Navigation and Timing (PNT)[2] for the U.S. Navy and the U.S. Department of Defense. Located in Northwest Washington, D.C. at the Northwestern end of Embassy Row, it is one of the pre-1900 astronomical observatories located in an urban area; at the time of its construction, it was far from the light pollution thrown off by the (then-smaller) city center. The USNO operates the "Master Clock",[3] which provides precise time to the GPS satellite constellation run by the U.S. Air Force. The USNO performs radio VLBI-based positions of quasars with numerous global collaborators, in order to produce Earth Orientation parameters.
Aside from its scientific mission, since 1974, the official residence of the Vice President of the United States has been Number One Observatory Circle, a house on the grounds of the Naval Observatory. [Alleged base for MitM attacks on USNO and wrongful deaths of thousands of American citizens since Al Gore moved in in 1993]
 “WND EXCLUSIVE
HILLARY TIPPED MURDERED AMBASSADOR'S MOVEMENTS IN EMAILS
Secretary of state was using her unsecured private server
Published: 05/28/2015 at 7:38 PM
In the year prior to the deadly 2012 Benghazi attack, Hillary Clinton used her private email server to correspond about such highly sensitive national security matters as specific threats to the Libya hotel where Ambassador Chris Stevens was staying as well as his decision to remain at the hotel despite the threats.

Read more at http://www.wnd.com/2015/05/hillary-tipped-murdered-ambassadors-movements-in-emails/#EUvukudJZq0eLFMR.99The emails, released May 22 by the State Department, also contained the exact movements of Stevens while he was stationed in arguably one of the most dangerous zones in the world for any American diplomat, a WND review has found.
On April 24, 2011, Clinton’s senior aide, Huma Abedin, forwarded to Clinton’s personal email an internal State email from that same day written by Timmy Davis and sent to Abedin as well as to the State email addresses of other employees, including Clinton’s then-foreign policy aide, Jacob Sullivan.
The email cited a local report stating hotels in Benghazi were being targeted.
The email, which ran through Clinton’s personal server, stated the interim Libyan government “conducted a raid on a house/storage facility and found and arrested an Egyptian cell reportedly there for the purpose of attacking hotels.”
Despite the threat, the email revealed Stevens “still feels comfortable in the hotel,” meaning the email exposed that the ambassador would continue to stay there.
“They are looking into the idea of moving into a villa, but that is some way off,” the email continued. “Based on discussion with DS yesterday, the hotel remains the safest location.”
Startlingly, the email contained information about Stevens’ exact movements, including that he “will be meeting with MFA in one hour and will make a written request for better security at the hotel and for better security-related coordination.”
On June 10, 2011, Sullivan sent an email to Clinton’s personal address informing that “there is credible threat info against the hotel that our team is using – and the rest of the Intl community is using, for that matter.”
That email divulged: “DS going to evacuate our people to alt locations. Info suggested attack in next 24-48 hours. Will keep you posted.”
Yet another sent to Clinton from Abedin detailed Stevens’ movements regarding his hotel stay
The envoy’s delegation is currently doing a phased checkout (paying the hotel bills, moving some [Marine Corps?] comms to the boat, etc.),” wrote Abedin. “He (Stevens) will monitor the situation to see if it deteriorates further, but no decision has been made on departure. He will wait 2-3 more hours, then revisit the decision on departure.”
"Digital Fires Instructor Serco - Camp Pendleton, CA Posted 377 days ago Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action."
Serco Wins Position on $199 Million Air Traffic Control Engineering and Technical Support Services Multiple Award Contract
August 18, 2015
RESTON, VIRGINIA – August 18, 2015 – Serco Inc., a provider of professional, technology, and management services, announced today that the Company has received one of three awards on a new Multiple Award Contract (MAC) supporting SPAWAR Systems Center (SSC) Atlantic with Air Traffic Control (ATC) engineering and technical support services for Navy and Marine Corps ATC Systems. This MAC has a ceiling value of $199 million over a one-year base period and four one-year options periods, if all options are exercised.
Serco will bid on task orders to provide ATC engineering and technical support services to support SPAWAR Systems Center Atlantic. The company will deliver specialized ATC technical and integration support, configuration data management, and systems maintenance for a broad range of complex ATC, Meteorology and Oceanography (METOC) and Aviation Command, Control, Communications, Computers, Combat, Intelligence Surveillance, and Reconnaissance (C5ISR) Systems. Work under the contract will be performed at a Serco facility in Charleston, SC; and at Navy and Marine Corps shore facilities worldwide including Antarctica and Southwest Asia.
“Serco takes pride in the work and solutions we deliver to our customers and we are proud to continue our support of SSC Atlantic Air Traffic Control operations,” said Kent Brown, Vice President of Serco’s C4ISR Business unit. “We are honored to have been awarded this contract and look forward to delivering shore-based Air Traffic Control systems for the U.S. Navy and U.S. Marine Corps.”
About Serco Inc.: Serco Inc. is a leading provider of professional, technology, and management services. We advise, design, integrate, and deliver solutions that transform how clients achieve their missions. Our customer-first approach, robust portfolio of services, and global experience enable us to respond with solutions that achieve outcomes with value. Headquartered in Reston, Virginia, Serco Inc. has approximately 10,000 employees and annual revenue of $1.2 billion. Serco Inc. is a wholly-owned subsidiary of Serco Group plc, a $5.9 billion international business that helps transform government and public services around the world. More information about Serco Inc. can be found at www.serco-na.com.”
EXPERT WHO CONCLUDED WTC 7 WAS A CONTROLLED DEMOLITION KILLED IN CAR ACCIDENT
Infowars.com
July 22, 2011
A Dutch building demolition expert who went on record as saying he believed that World Trade Center building Seven was brought down in a controlled demolition, has been reported killed in a car accident.
Bloggers in the Netherlands have reported that Danny Jowenko was killed instantly on Saturday when his car veered off the road and collided head on into a tree. The reports state that Jowenko’s dog was found alive in the car.
Jowenko was said to have been driving home from church. It is not clear at this time what caused the car to leave the road, according to the reports.
Jowenko is best known in the 9/11 truth community for appearing in a video that first surfaced in 2006 on a Dutch television news program called, Zembla investigates 9/11 theories.
After being shown the footage of WTC 7 collapsing Jowenko stated “This is a controlled demolition carried out by a team of experts.”
At the time Jowenko did not know that he was watching footage from September 11th 2001 and responded in disbelief when the reporters explained what the footage was.
In 2007 reports began to circulate that Jowenko had retracted his stance on the footage of WTC7, however, he reaffirmed his previous opinion in a phone call with blogger Jeff Hill, noting “When the FEMA makes a report that it came down by fire, and you have to earn your money in the States as a controlled demolition company and you say, ‘No, it was a controlled demolition’, you’re gone. You know?”
The original interview with Danny Jowenko appears below, along with the 2007 phone call:
Telephone interview with Jeff Hill 2/22/07:
Jeff Hill: I was just wondering real quickly, I know you had commented on World Trade Center Building 7 before.
Danny Jowenko: Yes, that’s right.
Jeff Hill: And I’ve come to my conclusions, too, that it couldn’t have came down by fire.
Danny Jowenko: No, it — absolutely not.
Jeff Hill: Are you still sticking by your comments where you say it must have been a controlled demolition?
Danny Jowenko: Absolutely.
Jeff Hill: Yes? So, you as being a controlled demolitions expert, you’ve looked at the building, you’ve looked at the video and you’ve determined with your expertise that –
Danny Jowenko: I looked at the drawings, the construction and it couldn’t be done by fire. So, no, absolutely not.
Jeff Hill: OK, ’cause I was reading on the Internet, people were asking about you and they said, I wonder — I heard something that Danny Jowenko retracted his statement of what he said earlier about World Trade Center 7 now saying that it came down by fire. I said, “There’s no way that’s true.”
Danny Jowenko: No, no, no, absolutely not.
Jeff Hill: ‘Cause if anybody was — Like when I called Controlled Demolition here in North America, they tell me that , “Oh, it’s possible it came down from fire” and this and that and stuff like that –.
Danny Jowenko: When the FEMA makes a report that it came down by fire, and you have to earn your money in the States as a controlled demolition company and you say, “No, it was a controlled demolition”, you’re gone. You know?
Jeff Hill: Yeah, exactly, you’ll be in a lot of trouble if you say that, right?
Danny Jowenko: Of course, of course. That’s the end of your — the end of the story.
Jeff Hill: Yeah, ’cause I was calling demolitions companies just to ask them if they used the term, “Pull it” in demolition terms and even Controlled Demolitions, Incorporated said they did. But the other people wouldn’t — didn’t want to talk to me about Building 7 really because obviously ’cause they knew what happened and they didn’t want to say it.”
Benghazi consulate attackers used military-style tactics, say US officials
Experts still unsure whether assault that killed 4 Americans in Libya could have been prevented
BY MATT APUZZO AND KIMBERLY DOZIER September 22, 2012, 1:44 am 
… Wanis al-Sharef, who was Libya’s deputy interior minister until he was fired after the attacks, said a small group of lightly armed gunmen were the first to gather outside the compound. They were then joined by a crowd of civilians protesting the film. Finally, a larger group of heavily armed men arrived with gun vehicles and grenade launchers. That final group was responsible for the siege.
Ansar al-Shariah has repeatedly denied being any part of the attack, but eyewitnesses and security officials said the group’s militiamen were among the gunmen who joined the demonstration outside the compound. The group claimed its fighters were only in the Benghazi area providing security at Jalaa Hospital. But that’s more than three miles from the US compound, which lies on the outskirts of the city in a rural area.
One witness said he was detained by Ansar al-Shariah members during the protest because he was taking pictures of one of their leaders.
Whoever they were, the attackers stormed the main building and set it on fire. One US official described the militants striking the front of the building first, distracting security, while a second group struck then from the rear. Many people escaped and fled to an annex to the east.
About an hour after the assault began, American and Libyan forces retook control of the compound and brought everyone to the annex. Rescue teams headed their way.
Intelligence indicates the gunmen broke off into teams to block certain roads away from the compound, officials said. Whether that changed the route or otherwise influenced how the Americans moved through the streets remains unclear, but one US official said the tactic was being looked at as an indication of battlefield strategy and sophistication.
As the Americans waited to be rescued from the annex, that building came under mortar fire. Mortars are short-range bombs that launch in high arcs. Aiming them can be a matter of trial and error. But US officials said mortars were landing directly on the roof of the annex.
That, officials said, indicated an experienced fighter, a well-planned assault or both.
___
Copyright 2012 The Associated Press.”
 "April 22, 2015 WASHINGTON--(BUSINESS WIRE)--The American Council for Technology and Industry Advisory Council (ACT-IAC), the premier public-private partnership in the government IT community, today honored Jackie Robinson-Burnette, Associate Administrator of 8(a) Business Development, HQ Small Business Administration (SBA), and Darryl Scott, Director of Partner Relations, Serco, with the annual Small Business Advocacy Award.

Presented at ACT-IAC’s Small Business Conference (SBC) luncheon, the award recognizes Ms. Robinson-Burnette and Mr. Scott for their work in promoting the growth and development of small businesses in the federal marketplace. The Small Business Advocacy Award is an honor ACT-IAC awards to one government and one industry professional who have made substantial contributions to small businesses in the IT community.


Ms. Robinson-Burnette was named the Associate Administrator, SBA in December 2014. Prior to joining the SBA, she served in the Pentagon as a Deputy Director, Office of the Secretary of the Army, Office of Small Business Programs. In this position with over $16 billion in annual contract awards to small firms, Ms. Robinson-Burnette managed the largest federal small business program in the country. During her time with the Army, she provided leadership and guidance to a network of over 200 military and civilian small business specialists.

Mr. Scott has consistently championed the cause of small business within Serco by encouraging executive leadership to make it a priority to meet or exceed all small business commitments. Since Mr. Scott took on the role of Director of Small Business Partner Relations in 2009, Serco has consistently met or exceeded the Government's small business subcontracting goals in ALL small business categories. Through his 30-year career, he has tirelessly worked towards advancing the interests of the small business community.

Launched in 2007, SBC is the unrivaled forum for new and established small and large businesses to come together to further align with the needs of government agencies.

ACT-IAC is the premier public-private partnership in the government IT community and an example of how government and industry work together. ACT-IAC is a nonprofit educational organization created to advance government through collaboration and education. The organization provides an objective, vendor and technology-neutral and ethical forum where government and industry are working together to develop innovative strategies, effective and efficient solutions and best practices. Headquartered in the Greater Washington, D.C. area, ACT-IAC also has chapters in Pacific region (based in San Diego) and the Rocky Mountain region (based in Denver).”
EXCLUSIVE: Hillary's email firm was run from a loft apartment with its servers in the BATHROOM, raising new questions over security of sensitive messages she held
Democratic White House front-runner used Platte River Networks of Denver, Colorado, to maintain her controversial 'home brew' server
Up to 60 emails with classified material have been found in a sample of those she did not delete - meaning there could be many more
Now Daily Mail Online reveals new questions over security of her emails when Platte River was involved in maintaining server
'Mom and pop' firm used converted residential apartment and had its own servers in a bathroom closet 
Links between 'local' IT company and Clinton remain unclear but its VP of sales and marketing, who was sued for 'fraud' is said to be 'big Democrat'
PUBLISHED: 13:12 GMT, 18 August 2015 | UPDATED: 14:17 GMT, 18 August 2015”
Jamie Bartlett
I have heard rumors about this website, but I still cannot quite believe that it exists. I am looking at what I think is a hit list.
There are photographs of people I recognize—prominent politicians, mostly—and, next to each, an amount of money. The site’s creator, who uses the pseudonym Kuwabatake Sanjuro, thinks that if you could pay to have someone murdered with no chance—I mean absolutely zero chance—of being caught, you would.
That’s one of the reasons why he has created the Assassination Market.
There are four simple instructions listed on its front page:
Add a name to the list
Add money to the pot in the person’s name
Predict when that person will die
Correct predictions get the pot
The Assassination Market can’t be found with a Google search. It sits on a hidden, encrypted part of the internet that, until recently, could only be accessed with a browser called The Onion Router, or Tor. Tor began life as a U.S. Naval Research Laboratory project, but today exists as a not-for-profit organization, partly funded by the U.S. government and various civil liberties groups [100 Women in Hedge Funds], allowing millions of people around the world to browse the internet anonymously and securely.
To put it simply, Tor works by repeatedly encrypting computer activity and routing it via several network nodes, or “onion routers,” in so doing concealing the origin, destination, and content of the activity. Users of Tor are untraceable, as are the websites, forums, and blogs that exist as Tor Hidden Services, which use the same traffic encryption system to cloak their location.
The Assassination Market may be hosted on an unfamiliar part of the net, but it’s easy enough to find, if you know how to look. All that’s required is simple (and free) Tor software. Then sign up, follow the instructions, and wait. It is impossible to know the number of people who are doing exactly that, but at the time of writing, if I correctly predict the date of the death of Ben Bernanke, the former chairman of the Federal Reserve, I’d receive approximately $56,000. It may seem like a fairly pointless bet. It’s very difficult to guess when someone is going to die. That’s why the Assassination Market has a fifth instruction:
Making your prediction come true is entirely optional”
 “Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. In operation since before 1985, NTP is one of the oldest Internet protocols in current use. NTP was originally designed by David L. Mills of the University of Delaware, who still oversees its development.  … While no one doubts the contribution of NTP to network performance, several security concerns have arisen in late 2014. Previously, researchers became aware that NTP servers can be susceptible to man-in-the-middle attacks unless packets are cryptographically signed for authentication.[27] The computational overhead involved can make this impractical on busy servers, particularly during denial of service attacks.[28] NTP message spoofing can be used to move clocks on client computers and allow a number of attacks based on bypassing of cryptographic key expiration.[29]
The Duke and Duchess of Cambridge and the £1.3 trillion hedge fund women
In their elegant ballgowns, they could be among the guests at any charity reception hosted by the Duke and Duchess of Cambridge.
 By David Harrison and Claire Duffin
8:00AM BST 23 Oct 2011
In fact, these are some of the most powerful and influential individuals to have gathered at St James's Palace. All leading figures in finance, they help to control assets totalling £1.3 trillion.
The 14 women posed with the royal couple at a gala evening this month which raised £675,000 for charity. Now their identities and the extraordinary wealth for which they are responsible can be revealed.
They range from the senior executive at one of the world's biggest banks who competes in triathlons in her spare time, to the investment consultant who admits to owning 110 pairs of shoes.
The event marked a rare foray into the public arena for the women. Several are heads of hedge funds, the secretive investment vehicles which put money into complex financial schemes and can profit in a downturn by effectively betting on markets falling.
Others are executives at banks or asset management companies. Among them are chief executives, presidents, directors, and consultants. Members cover a range of nationalities, reflecting the cosmopolitan nature of the industry.
All are senior figures in 100 Women in Hedge Funds, a philanthropic organisation. The duke became a patron last year, and 100WHF will raise money for charities he is associated with; this month's gala supported the Child Bereavement Charity.
The link-up suggests that the Duke and Duchess are following the lead of the Prince of Wales in ensuring that their charitable initiatives win support from wealthy and influential figures.
100WHF, which has branches around the world, has raised millions of pounds for causes including women's health, education and mentoring.
Anne Popkin, chair of the organisation's global board, flew over from San Francisco for the London event. She said: "It is wonderful to raise such an amount. The reason we work so well with His Royal Highness is our aims and his aims are the same."
In a letter to 100WHF, the Duke wrote: "It is a privilege for me to be Patron of this exciting endeavour."
Left-to-right in photograph:
1) Anne Popkin, 46: President of San Francisco-based Symphony Asset Management, founded in 1994, which manages assets of £5.65 billion. Lives in San Francisco and chairs 100WHF's global board. Previously a managing director at Lehman Brothers. Studied maths and economics at Harvard, has an MBA from Northwestern University and studied for a diploma in art history at Oxford University in 1991.
2) Amanda Pullinger. 45: Chief executive of Pullinger Management in New York. Executive director of 100WHF. Studied modern history at Oxford University where she was a contemporary of David Cameron. Originally from Solihull, has lived in New York for 24 years. Fan of Downton Abbey.
3) Effie Datson, 41: Head of foreign exchange and global macro prime brokerage for Deutsche Bank, which has managed assets of £480 billion. Previously worked at IKOS and Goldman Sachs. London Board Chair of 100WHF. Has a degree in social sciences and MBA, both from Harvard. Lives with husband Edwin, a venture capitalist, in a £1 million flat in Battersea, southwest London. Competes in triathlons.
4) Claire Smith, 48: Research analyst and partner with Albourne Partners, independent global advisers whose 200 clients worldwide have an estimated £145 billion invested in hedge funds. Works from home in Geneva.
5) Kathryn Graham, 39: Director of BT Pension Scheme Management in London, BT's pensions advisory arm, the largest scheme in the UK at £34 billion. Has an MA in economics and mathematics from Edinburgh University. Trustee of hedge fund standards board in London.
6) Roxanne Mosley Sargent, 43: Previously co-head of sales and marketing at Armajaro Asset Management, formerly head of hedge fund capital group for Europe at Deutsche Bank. MBA from Harvard. Married with young children, lives in Notting Hill, west London.
7) Kristen Eshak Weldon, 33: Managing director of Blackstone Group International Partners which has £99 billion of managed assets. 100WHF London board member. Previously worked at JP Morgan. Studied at Georgetown University, Washington DC. Originally from Houston, Texas and now living in London. Likes designer fashion labels including Diane von Furstenberg, Max Mara and Donna Karan.
8) Natasha Sai, 35, a managing director with the banking giant Goldman Sachs, America's 5th largest bank by revenue, which has £515 billion of managed assets. Lives in Hammersmith, west London. Featured in a 2001 Sky One series called The Real Sex in the City, about the lives of single girls in New York.
9) Sonia Gardner, 49: Moroccan-born president and co-founder, Avenue Capital Group, a global investment firm with £12.5 billion of managed assets. Made a donation to Hillary Clinton's New York Senate re-election campaign. Mrs Clinton's daughter Chelsea joined Ms Gardner's Avenue Capital Group in 2006. [Steering Trump Entertainment Resorts Inc. out of bankruptcy protection; allegedly with the proceeds of online assassination betting!!!]
10) Stephanie Breslow: partner and co-head of the investment management group at Schulte Roth & Zabel, a New York law firm with an office in London. Lives in New York with husband and two stepchildren. Graduate of Columbia University School of Law. Is on the advisory board of the Columbia Law School's Gender and Sexuality Centre.
11) Mindy Posoff, 51: Founder, Traversent Capital Partners, a consultancy for hedge funds and asset managers. Also managing director of Golden Seeds, dedicated to investing in young companies founded or led by women. Former director of Credit Suisse. Likes Queen Latifah, the American rapper.
12) Carol Kim: managing director, the Blackstone Group, based in Hong Kong. Previously based in New York as a Vice President in the Absolute Return Strategies Group at Lehman Brothers. 100WHF co-founder and board director. Has a BA in Urban and Economic Studies from the University of Toronto.”
"Serco's Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals." http://www.dtic.mil/whs/directives/corres/pdf/100515p.pdf

"Base One Technologies – Corporate Strategy – We are a Government Certified Women-Owned Business
We practice Diversity Recruitment and Staffing for IT positions

Base One was founded in 1994 by a women engineer who had made a career in technology research for many years. Base One has been very successful in focusing on diversity recruiting and staffing for IT projects. It has been our experience that the greater the diversity mix, the more creative the solution. As in any field the more diverse the viewpoint the more thorough your analysis. Our engineers can think out of the box. 

Because of our affiliations we have access to pools of resources among more diverse groups & individuals. We work with a large pool of minority professionals who specialize in IT skills. We are able to have access to these resources through our status as a D/MWBD firm and our affiliations. These affiliations assist us in working with resources among more diverse groups & individuals.

We are also partnered with firms that are 8A certified as Minority firms, Disabled Veteran firms, Native American firms, Vietnam veteran firms, women owned firms.

Key Clients Benefiting From Our Information Security Expertise: Pentagon Renovation Program, FAA, Citigroup, MCI.

Base One technologies

Expertly researches, designs, and develops information security policies that protect your data and manage your firm's information technology risk at levels acceptable to your business. 

Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report. 

Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions."


"The 8(a) Business Development Program assists in the development of small businesses owned and operated by individuals who are socially and economically disadvantaged, such as women and minorities. The following ethnic groups are classified as eligible: Black Americans; Hispanic Americans; Native Americans (American Indians, Eskimos, Aleuts, or Native Hawaiians); Asian Pacific Americans (persons with origins from Burma, Thailand, Malaysia, Indonesia, Singapore, Brunei, Japan, China (including Hong Kong), Taiwan, Laos, Cambodia (Kampuchea), Vietnam, Korea, The Philippines, U.S. Trust Territory of the Pacific Islands (Republic of Palau), Republic of the Marshall Islands, Federated States of Micronesia, the Commonwealth of the Northern Mariana Islands, Guam, Samoa, Macao, Fiji, Tonga, Kiribati, Tuvalu, or Nauru); Subcontinent Asian Americans (persons with origins from India, Pakistan, Bangladesh, Sri Lanka, Bhutan, the Maldives Islands or Nepal). In 2011, the SBA, along with the FBI and the IRS, uncovered a massive scheme to defraud this program. Civilian employees of the U.S. Army Corps of Engineers, working in concert with an employee of Alaska Native Corporation Eyak Technology LLC allegedly submitted fraudulent bills to the program, totaling over 20 million dollars, and kept the money for their own use.[26] It also alleged that the group planned to steer a further 780 million dollars towards their favored contractor.[27]"

"On October 6, 2000, the NMCI contract was awarded to Electronic Data Systems (EDS), now HP Enterprise Services (HP).[11] Secretary of the Navy Gordon England summed up the Navy's IT Environment prior to the commencement of NMCI: "We basically had 28 separate commands budgeting, developing, licensing, and operating IT autonomously. It was inefficient and from the larger Department perspective, produced results that were far from optimal."[12]
 
NMCI consolidated roughly 6,000 networks—some of which could not e-mail, let alone collaborate with each other—into a single integrated and secure IT environment. HP updated more than 100,000 desktop and laptop PCs in 2007.[13] The program also consolidated an ad hoc network of more than 8,000 applications to 500 in four years and 15,003 logistics and readiness systems to 2,759 over a two-year period.[14

Sub-contractors to HP include:
Harris Corporation (which acquired Multimax formerly known as Netco Government Services and WAM!NET), which provided enterprise network infrastructure design and support until its contract expired in 2014.[16]
Verizon, which provides wide area network (WAN) connectivity. 

HP also provides the security services once provided by Raytheon.
   
"HP also has worked with more than 400 small businesses, with 5 percent for small disadvantaged businesses, 5 percent for women-owned small businesses and 1.5 percent for HUBZone small businesses. Since its inception, NMCI has exceeded the minimum 40% small business objective set for the contract.[17]
  …
The Department of the Navy has shown no desire to scale back or cancel the program. On 24 March 2006 the Navy exercised its three-year, $3 billion option to extend the contract through September 2010.[1] In April 2006, users began to log on with Common Access Cards (CACs), a smartcard-based logon system called the Cryptographic Log On (CLO). In October 2008, NMCI’s prime contractor HP posted a set of procedures so Apple Mac users can access NMCI's public-facing Web services, such as the e-mail and calendar functions, using their CAC readers with their Macs. The workaround also works with other Defense Department CAC-enabled networks.[27] Alternatively, NMCI and all other CAC-authenicated DoD websites may be accessed using LPS-Public." 

"Government still paying G4S and Serco millions for tagging despite ban Alan Travis Home affairs editor 
Thursday 25 June 2015 00.01 BST 
The Ministry of Justice is still paying security firms G4S and Serco millions of pounds every month for supplying electronic tagging equipment, more than a year after both companies were barred from running the contract.
Both companies faced criminal investigations by the Serious Fraud Office over allegations of overcharging that led to them repaying nearly £180m. 

The continuing monthly payments to the two companies were uncovered by an analysis of Ministry of Justice (MoJ) data by the Centre for Crime and Justice Studies which shows that G4S was paid a total of £8.7m between March 2014 – when it lost the tagging contract – and February 2015. Serco was paid £4.5m over the same period.
 
The electronic monitoring tags are used to enforce curfews on more than 100,000 offenders each year. The outsourcing giant Capita took over the contract on an interim basis in April last year. 

In July 2014, Capita and three other companies were named as the winners of a £265m six-year contract to supply the next generation of satellite tracking tags, which would allow dangerous and repeat offenders to be monitored around the clock."




Serco... Would you like to know more?



SWISSLEAKS - "HSBC developed dangerous clients: arms merchants, drug dealers, terrorism financers"



Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! (Mobile Playback Version) [HSBC is Serco's drug-hub Silk Road banker and a major shareholder with the 9/11 8(a) lenders including Her Majesty's Government and JPMorgan]

 


Yours sincerely,


Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222

David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Looking into our circumstances...