by
United States Marine Field McConnell
Plum City Online - (AbelDanger.net)
January 7, 2016
1. Abel Danger (AD) asserts that Serco injected news of a North Korean hydrogen bomb test into the main stream media (MSM) as part of a Resilience exercise so that Serco's US/UK Cabinet Office clients could blackmail their populations with real or perceived threats of a nuclear attacks.
2. AD asserts that Serco's 8(a) operatives of the Defense Red Switch Network extorted a white flag of surrender from former U.S. Secretary of the Navy Richard Danzig after the USS Cole triggered a bumper bomb in Aden Harbour on October 12, 2000.
3. AD asserts that Serco is injecting Resilience news on ISIS chemical, biological, radiological or nuclear (CBRN) threats through Clinton war rooms on the FS Charles de Gaulle and white-flag U.S. Navy ships after the attack on the Cole.
United States Marine Field McConnell (http://www.abeldanger.net/2010/01/field-mcconnell-bio.html) offers to show concerned Americans how to win a Resilience war.
It is now D-Day + 38.
USS Harry S. Truman First Mission In The Arabian Gulf
Hillary Clinton: A Career Criminal
Hillary Clinton : We created Al-Qaeda
Serco... Would you like to know more?
"Political fallout for Hillary Clinton after North Korea's nuke test
By Stephen Collinson, CNN
Updated 6:13 AM ET,
Thu January 7, 2016
North Korea conducts
hydrogen bomb test 01:45
Story highlights
The episode is a fresh
indication of the challenge that Clinton faces in running for the White House
on her record as secretary of state
Washington has tried
punishment and inducements repeatedly with North Korea and has failed to change
its calculations
Washington (CNN)North
Korea might not be able to reach the U.S. mainland with a nuclear weapon yet,
but the political fallout from its claimed
hydrogen bomb test is here already.
Even before the
shockwaves of the 5.1 temblor triggered by Tuesday's test wore off, Hillary
Clinton was fighting off a volley of Republican attacks, GOP presidential
candidates were talking tough and Donald Trump jumped on a chance to chastise
China.
The episode was a
fresh indication of the challenge that Clinton faces in running for the White
House on her record as secretary of state, which makes it impossible for her to
escape deficiencies in President Barack Obama's national security legacy.
"If this test is
confirmed, it will be just the latest example of the failed Obama-Clinton
foreign policy," crowed Florida Sen. Marco Rubio, who is styling himself
as a foreign policy expert. He argued that U.S. enemies were "taking
advantage of Obama's weakness."
Former business
executive Carly Fiorina, another outspoken GOP hawk, also slammed Clinton,
arguing that the volatile Stalinist state had been spurred to up the nuclear
ante by Obama administration concessions granted to Iran in return for a
freezing of its nuclear program.
"Of course, North
Korea would conduct a nuclear test after watching Iran willfully violate an
agreement they just made without consequence of any kind from this
administration," Fiorina said in a statement. "North Korea is yet
another Hillary Clinton foreign policy failure."
Political bind for
Clinton
There's no question
that as the administration in possession of the North Korea nuclear problem,
the Obama White House -- and by extension Clinton -- are in a political bind.
Their failure to turn
back North Korea's development of its nuclear arsenal is manifest in its flurry
of nuclear tests and ballistic missile engineering over the last seven years.
But there is no obvious way to deter a nation that does not respond to the
traditional carrots and sticks of diplomacy.
"What we've also seen
on the part of North Koreans is an apparent willingness to accept international
isolation," White House spokesman Josh Earnest said Wednesday, pointing
out that North Korea already had a nuclear bomb when Obama took office.
Clinton's campaign is
working to absolve her of blame for past failures and to turn her vulnerability
into a strength. So the former secretary of state offered the most detailed
plan of any of the candidates on how to respond.
Addressing multiple
audiences, as a commander-in-chief must, Clinton accused North Korea of playing
nuclear blackmail and "bullying," offered reassurance to U.S. allies
and then turned on her Republican foes, questioning their capacity to handle
the situation.
The former top U.S.
diplomat also defended her own work on North Korea, saying she had been
responsible for getting Russia and China on board for the "strongest
sanctions yet" against Pyongyang while she was at the State Department.
And she fired a
warning at her Republican adversaries, particularly seeming to target the
brazen Trump and youthful Rubio.
"Threats like
this are yet another reminder of what's at stake in this election. We cannot
afford reckless, imprudent publicity stunts that risk war. We need a
commander-in-chief with the experience and judgement to deal with a dangerous
North Korea on Day One."
"Super Serco bulldozes ahead
By DAILY
MAIL REPORTER
UPDATED: 23:00 GMT, 1 September 2004
UPDATED: 23:00 GMT, 1 September 2004
SERCO has come a long way since the 1960s when
it ran [Resilience exercises and] the 'four-minute warning' system to alert the
nation to a ballistic missile attack.
Today its £10.3bn
order book is bigger than many countries' defence budgets. It is bidding for a
further £8bn worth of contracts and sees £16bn of 'opportunities'.
Profit growth is less
ballistic. The first-half pre-tax surplus rose 4% to £28.1m, net profits just
1% to £18m. Stripping out goodwill, the rise was 17%, with dividends up 12.5%
to 0.81p.
Serco runs the
Docklands Light Railway, five UK prisons, airport radar and forest bulldozers
in Florida.
Chairman Kevin Beeston
said: 'We have virtually no debt and more than 600 contracts.'
The shares, 672p four
years ago, rose 8 1/4p to 207 1/4p, valuing Serco at £880m or nearly 17 times
earnings.
Michael Morris, at
broker Arbuthnot, says they are 'a play on UK government spend' which is rising
fast."
"ISIS Sending 'Scientist Army' To West To Launch Biological War
A shocking report from
the European Parliament claims that ISIS has recruited experts with chemistry,
physics and computer science degrees to wage war with weapons of mass
destruction against the West.
According to a
briefing document, ISIS 'may be planning to try to use internationally
banned weapons of mass destruction in future attacks'. The document also claims
that weapons of mass destruction are already likely smuggled into Europe.
Dailymail.co.uk reports:
Experts fear that ISIS
will be able to exploit a failure of EU governments to share information on
possible terrorists.
Already, British
police forces have been conducting exercises on how to deal with various types
of terrorist attack. But the EU report claims that government should ‘consider
publicly addressing the possibility of terrorist attack using chemical,
biological, radiological or even nuclear materials’.
The report,
ISIL/Da’esh and 'non-conventional' weapons of terror warns: ‘At present,
European citizens are not seriously contemplating the possibility that
extremist groups might use chemical, biological, radiological or nuclear (CBRN)
materials during attacks in Europe. Under these circumstances, the impact of
such an attack, should it occur, would be even more destabilising.’
Rob Wainwright, head
of Europol said after the attacks on Paris: ‘We are dealing with a very
serious, well-resourced, determined international terrorist organisation that
is now active on the streets of Europe.
'This represents the
most serious terrorist threat faced in Europe for 10 years.'
Mr Wainwright warned
that ISIS had serious capabilities in terms of resources and manpower.'
Nomi Bar-Yaacov,
Associate Fellow in Chatham House’s International Security Department said:
‘There is a very real risk of ISIS using unconventional weapons in Europe and
beyond.'
Wolfgang
Rudischhauser, Director of the Weapons of Mass Destruction Non-Proliferation
Centre at NATO said: ‘ISIS actually has already acquired the knowledge, and in
some cases the human expertise, that would allow it to use CBRN materials as
weapons of terror.'
The report claims 'ISIL/Da'esh has recruited and continues to recruit hundreds of foreign
fighters, including some with degrees in physics, chemistry and computer
science, who experts believe have the ability to manufacture lethal weapons
from raw substances.'
EU governments have
been warned to watch out for 'other radicalised individuals, who have access
to, or work in, sensitive areas'.
Intelligence services
have also been warned to screen returning Jihadi fighters for 'specialist CBRN
knowledge'.
The shocking study
claims that 150 cases of nuclear or radiological trafficking are reported
annually.
Worse still: ‘CBRN
substances have been carried undetected into the European Union.
‘Interpol’s monthly
CBRN intelligence reports show numerous examples of attempts to acquire,
smuggle or use CBRN materials.'"
"The Washington Post Highlights How Trump Injected Right-Wing Fringe News Into Mainstream Coverage
Blog ››› December 11, 2015
9:51 PM EST ››› DAYANITA RAMESH
Once a small fringe, this
"alternative" information ecosystem now includes websites, talk-radio
programs, newsletters, conferences and "citizen journalists" who
promote, debate and inflate such questionable causes as vaccine
denial, climate-change skepticism , and the supposedly imminent
imposition of sharia law in America. The fringe nowadays often injects its
ideas into the mainstream by gaining the attention of sources broadly popular
among conservatives, such as Fox News and the Drudge Report, which devoted
attention to rumors that the Operation Jade Helm military
exercises last summer in the southwest U.S. were a prelude to a crackdown on
civil liberties.
"There's an
information-age tsunami out there that just keeps getting bigger and
bigger," said Steve Smith, a veteran newspaper editor who now teaches
journalism at the University of Idaho. "When you combine this digital
tsunami with the loss of quality and quantity in American journalism [due to
cutbacks and economic woes] over the years . . . journalists just don't have
the ability to keep up once a false narrative gains speed."
At the same time,
Trump has been the most aggressive in the Republican field in denouncing the
mainstream media, the erstwhile arbiter of fact. Many of his condemnations of
mainstream reporters have been echoed by Trump's army of Twitter followers and
supportive websites, such as the conservative Breitbart.com.
Trump, in
turn, cites his Twitter followers as the source for some of his
own non-facts, such as his recent claim that African Americans killed
81 percent of white homicide victims (the actual number is closer to 15
percent, according to Factcheck.org). He defended his position of not
allowing Muslims to enter the United States by citing a poll conducted by
Center for Security Policy, a think tank known for a variety of conspiracy
theories, such as that members of the Muslim Brotherhood have infiltrated the
Obama administration. The result is a kind of self-reinforcing information loop
in which Trump introduces some inaccurate statement, is called on it by the
news media, which is then denounced by Trump for its supposed bias against him.
Trump's most famously
false contention, of course, was his long, pre-campaign embrace of
"birtherism," the notion that President Obama wasn't born on American
soil and is therefore ineligible to be president. Despite ample evidence to the
contrary, including a birth certificate issued in Hawaii and a contemporaneous
newspaper birth announcement, birther sites --
from Birthers.org to Obamabirthbook.com -- are strewn
across the Internet, actively promoting a debunked thesis."
"Defense Ammunition Center (DAC)
Contract Type
Fixed Price
Fixed Price
Period of Performance
10/1/2008 to 9/30/2013
10/1/2008 to 9/30/2013
Project Overview: Since
2008, Serco has assisted DAC with the analysis, design, development,
implementation, management/ administration, and evaluation of integrated,
enterprise-wide and component-specific training, learning, knowledge
management, and strategic human resource management interventions that are
critical to achieving their mission. Serco holds an OPM TMA TO with DAC and
also a contract through GSA Millenia Lite. When the GSA contract could not
support all of DACs needs, Serco recommended the use of the OPM TMA vehicle.
Through these contracts, Serco provides training program management support to
deliver multi-faceted best practice solutions in training development and
delivery, knowledge management, portal technologies, course conversions (ILT
and CBT to WBT), mobile performance applications, and Learning Management
Systems support. Serco applies the ADDIE model to all course development
activities including ILT, WBT, and leading-edge technologies including mobile
performance applications. Serco provided LMS support and also developed and
continues to manage DAC’s Ammunition Community of Excellence.”
"The 2012 Benghazi attack took place on the evening of September 11, 2012, when Islamic militants attacked the American diplomatic compound in Benghazi, Libya, killing U.S. Ambassador J. Christopher Stevens and U.S. Foreign Service Information Management Officer Sean Smith.[7]Stevens was the first U.S. Ambassador killed in the line of duty since 1979.[8] The attack has also been referred to as the Battle of Benghazi.[9]
Several hours later, a
second assault targeted a different compound about one mile away, killing CIA
contractors Tyrone S. Woods and Glen Doherty.[10][11] Ten others were also injured in the attacks.
Many Libyans condemned
the attacks and praised the late ambassador. They staged public demonstrations
condemning the militias (formed during the civil war to oppose leader Colonel Muammar Gaddafi),[12][13][14] which were suspected of the attacks.
The United States
immediately increased security worldwide at diplomatic and military facilities
and began investigating the Benghazi attack.[15][16] In the aftermath of the attack,State
Department officials were
criticized for denying requests for additional security at the consulate prior
to the attack. As Secretary of State, Hillary Clinton subsequently took responsibility for the security lapses.[17]
..
Location
|
|
Date
|
|
Target
|
United States
consulate and second location (annex)
|
Attack type
|
Coordinated attack,
armed assault, rioting, arson
|
Weapons
|
Rocket-propelled grenades,
hand grenades, assault rifles, 14.5 mm anti-aircraft machine guns, truck
mounted artillery, diesel canisters, mortars
|
Deaths
|
US Ambassador J.
Christopher Stevens and Sean
Smith; CIA contractors Tyrone S. Woods and Glen Doherty; approx. 100 Libyan attackers[1]”
|
"The Welsh Security Contractor Behind America's Benghazi Consulate Guards
OCT 18, 2012
A new report reveals
the local Libyans it hired weren't armed and didn't have security experience.
It is, as my
colleague Jeffrey Goldberg has noted, to be lamented that the conversation
around the attack on the U.S. consulate and nearby annex in Benghazi, Libya,
has become so focused on who said what when instead of on the underlying
security and foreign-policy issues. Today, American Crossroads, the Karl
Rove-backed Republican super PAC, is out with a Web video criticizing the Obama
administration's repeated mentions of an American anti-Muslim video that
sparked riots and protests in dozens of cities around the globe, leading to at least 49 deaths in 10 days and injuries to hundreds.
The video focuses on
the administration's repeated repudiations of the anti-Muslim video that
sparked a riot in front of the American embassy in Cairo, including statements
made after the attack on the consulate in Libya when the film was continuing to
roil international waters.
Meanwhile, the story
of what happened with the consular security in Libya is continuing to come into
view as journalists, such as a most excellent team at Reuters, have dug into
the practices of Welsh security contractor the
Blue Mountain Group, which was
brought on by the State Department to oversee the new and potentially temporary
consular compound in Benghazi. What the reporters found is astonishing, considering how many
armed guards one finds in much less dangerous environs in the United States:
"Blue Mountain guards patrolled with flashlights and batons instead of
guns."
According to its website, Blue Mountain, run by a former member of
the British special forces named David Nigel Thomas, had
"recently operated in Afghanistan, Iraq, Pakistan, the Caribbean and
across Europe," and worked with corporate clients, such as "BAT, BG
Group, Cadburys, Cannon, CapGemini, DHL, Excel, Google, Jaguar Landrover,
Lufthansa, Motorola, Orange, OSCE, Romec, Sealed Air, Sony and Viacom."
Reuters' key passage:
The State Department
contract for "local guard" services in Benghazi took effect in March
2012. Several of Blue Mountain's Libyan employees told Reuters that they had no
prior security training or experience.
"I was never a
revolutionary or a fighter, I have never picked up a weapon during the war or
after it," said Abdelaziz al-Majbiri, 28, who was shot in the legs during
the September 11 assault.
The Libyan commander
in charge of the local guards at the mission was a former English teacher who
said he heard about Blue Mountain from a neighbor. "I don't have a
background in security, I've never held a gun in my life," he said,
speaking on condition of anonymity out of fear for his safety.
When hired, the
commander said he was told "you have great English and get along with
everyone and are punctual; we want you to be a guard commander."
The unarmed guards
were told to sound the alarm over the radio and then run for cover if there was
an attack, a Libyan who acted as a supervisor for the Blue Mountain local guard
team at the mission said during an interview with Reuters ....
Despite their
inexperience, the Blue Mountain guards said they feared the Americans were not
concerned enough about security.
"We used to tell
the Americans who spoke to us on many occasions that we needed more support in
security, because it felt thin on the ground. But they didn't seem to be so
worried, and (were) confident that no one will dare to come close to the
consulate," one guard said.”
"CASE STUDY
24th Air Force Cyber Operations Support
The 24th Air Force (24
AF) is the operational warfighting organization that establishes, operates,
maintains and defends Air Force networks and conducts full-spectrum operations
in cyberspace. It establishes, operates and defends Air Force networks to ensure
warfighters can maintain the information advantage as they fulfill military
operations. The unit is responsible to conduct a full range of cyber
operations.
The new 24 AF
Headquarters (HQ) facility in San Antonio was outfitted to provide the
infrastructure and technological resources needed to continue operating this
important mission. Serco developed a comprehensive IT solution guided by three
points:
Develop a holistic
solution to integrate and standardize the IT architecture across multiple
networks and functions,
Utilize the latest
technology in virtualization and remote desktops to reduce clutter, maintenance
requirements and power/cooling requirements,
Ensure the technology
provides the performance and mobility needed to perform the 24 AF mission and
facilitate reliable collaboration among mission critical planning cells and
throughout the wider enterprise.
Serco designed and
implemented server-based computing systems that utilize Virtual Desktop
Infrastructure (VDI) to deliver a major advancement in remote desktop
performance over what had previously been possible with standard thin client
systems. The architecture consists of zero client devices at the desktop that
employ Personal Computer over Internet Protocol (PCoIP), which is capable of
delivering high volume data or real time audio and video without jitter or
delay. Zero client refers to ultrathin clients that deliver services with no
software and minimal hardware requirements.
The zero clients
connect to virtual desktops on a server for excellent performance meeting 99%
of the 24 AF mission needs. For the remaining 1%, those users needing
graphics-intensive computing, the same zero client can also connect to a
blade-based graphics workstation via login options derived from user
credentials and permissions.
Serco also integrated
voice, video teleconferencing capabilities and situational awareness displays,
along with the VDI, into the facility's network distribution system across
multiple networks. The result is an integrated IP-based total capability that
is centrally managed and consistent across all platforms. Serco also implemented Defense Red Switch
Network (DRSN), completed a structured fiber optic and Category 6
cabling system, and participated in the construction design working group to
ensure supporting systems (e.g. Power and HVAC) were able to support the 24
AF's IT needs.
As a result of Serco’s
support, 24th Air Force enjoys a true state-of-the-art environment that has
delivers the high level of performance and security requires to continue
fulfilling the important missions protecting the nation’s security."
"How Hillary Clinton's Server Makes Her An Object of Blackmail
And Why She Can Never
Be Considered an Honest Agent of the United States - Ever….
By: drevildoer
(Diary) | March 14th, 2015 at 05:53 PM |
In days past, I was
the proud holder of a Top Secret clearance. What I did is unimportant,
but how I got my clearance is, and why total transparency was critical to
making it work. To get my clearance, I was required to divulge and
discuss issues that were, shall we say, part of a foolish and somewhat misspent
youth as a grad student.
Why did I have to
disclose past foolishness? Because to not do so would leave me open to
blackmail. By keeping it secret, it places me in a position where
I wish to continue that secrecy. This desire, on my part, to
keep that past behavior secret opens me up to the threat of blackmail by
foreign intelligence agencies or criminal organizations. This is not
fantasy – it is very real. Non-disclosure is a typical reason to deny
clearance. The Government, in denying clearances, can state as part of
the denial that the Applicant is ineligible due to conduct involving
questionable judgment, untrustworthiness, unreliability, lack of candor,
dishonesty, or an unwillingness to comply with rules and regulations. All
things that even liberals will agree that Hillary was guilty in creating her
server (and the pitiful pack of lies that she exhibited at the UN press
conference).
Being elected to
office can make you eligible for security clearance (often undeserved, with
many of our officials). So getting a clearance is not an issue here.
If Hillary is elected, she will hold the highest clearance in the land, and
there is no agency that can or will deny her.
But then there is the
deleted “personal” email.
When someone uses an
official email account, whether it be a business or government, where they have
proper email backups, your actions in an official duty are backed up by that
history. No one can claim that you used your official email, if you in
fact didn’t, for personal gain or for other aspects or actions of corruption.
Hillary has no
protection. There are no official copies of her email, under government
control, to protect her from being accused of using her office for corruption.
So what is there to keep a foreign government from “creating” an email
that infers that she received funds to the Clinton Foundation in return for
some then or future favor. What if this government, when she is
President, threatens her with releasing multiple emails that implicate her in
all sorts of skullduggery? What protection does Hillary Rodham Clinton
have against such a threat?
None. To avoid a
scandal, perhaps at an inopportune time requiring all her political capital,
she would have to give the foreign government what they wanted, or have a slew
of emails released showing all sorts of communications. How could she
deny them? She can’t. She used her own server, and she has no
defense to say that such messages did not come from her. Indeed, she has
deleted, in what it appears to be a guilty and transparent attempt to hide
possible transgressions, all the email that she could use to possibly show that
she was innocent, and she further refuses to turn over the server to a third
party that could hold it incorruptible (not that she would be believed, even
now).
We assume from her
desire to keep her email separate, and under her control, that she did in fact
intend to keep things hidden. She has further wiped out a substantial
amount of her email history. And if her email server, as many experts are
now stating, was as insecure as we guess it was, it has almost certainly been
hacked. So what if she actually did have communications showing evidence
of corruption and quid pro quo between some nation and the Clinton Foundation.
Lets say that Russia, or Iran, or China, or Korea want their own quid pro
quo? Once again, she has no defense. Had she used the State
Department server, and there was no evidence that she had ever used an outside
server, she would have a much better chance of defending herself. But
now, it looks like she has something to hide.
Any outside enemy of
the United States can use that against her, as President. Which means she
can never be trusted to be acting in the best interest of the United States
ever again. That’s why the Server is a class A-1 scandal. Will
conservatives recognize this, and point out this threat before she gains power
and is blackmailed into acting against the interests of the United States?
We can only hope.
In the meantime, her
actions in reference to the server and emails totally destroys her credibility.
This is no minor scandal. And this is no minor threat."
"Contact 111 Eighth Avenue New York, NY 10011 Description Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994. This file was obtained from the Secretary of State and has a file number of 1795583. This business was created 7,695 days ago in the New York SOS Office and the registered agent is C T Corporation System that does business at 111 Eighth Avenue , New York in New York.
After conducting a search for principals and owners of Base One Technologies, Ltd., we were able to find 2 owners and/or executives. Their information is listed below.
This file was last
updated on May 14, 2013.
Principals
Liza R Zaneri
Chief Executive Officer
15 Irving Place
New Rochelle, NY 10801
Chief Executive Officer
15 Irving Place
New Rochelle, NY 10801
Liza R Zaneri
Principal Executive Office
15 Irving Place
New Rochelle, NY 10801
Principal Executive Office
15 Irving Place
New Rochelle, NY 10801
Registered Agent
C T Corporation System
111 EIGHTH AVENUE
NEW YORK, NY 10011
111 EIGHTH AVENUE
NEW YORK, NY 10011
"Serco's Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals." http://www.dtic.mil/
"Serco Combined Resilience Exercising
Types of Exercise
Workshop Exercises These are structured discussion events where participants
can explore issues in a less pressurised environment. They are an ideal way of
developing solutions, procedures and plans rather than the focus being on
decision making. Table Top Exercises These
involve a realistic scenario and will follow a time line, either in real-time
or with time jumps to concentrate on the more important areas. The
participants would be expected to be familiar with the plans and procedures that
are being used although the exercise tempo and complexity can be adjusted to
suit the current state of training and readiness. Simulation and media play can
be used to support the exercise. Table-top exercises help develop teamwork and
allow participants to gain a better understanding of their roles and that of
other agencies and organisations. Command/Control Post Exercises These are
designed primarily to exercise the senior leadership and support staff in
collective planning and decision making within a strategic grouping. Ideally
such exercises would be run from the real command and control locations and
using their communications and information systems. This could include a mix of
locations and varying levels of technical simulation support. The Gold Standard
system is flexible to allow the tempo and intensity to be adjusted to ensure
maximum training benefit, or to fully test and evaluate the most important
aspects of a plan. Such exercises also test information flow, communications,
equipment, procedures, decision making and coordination.
Simulation and Media
Support The method of delivering an exercise is flexible and will be designed
with the client to meet their requirements with options ranging from simple
paper-based delivery through to full use of their real communications systems [Red
Switch Network and Hawkeye onion router surveillance aircraft] and advance
computer simulation [In Trump's death pool and war room suites]. In addition, media
play can also be added in the form of news injects and the provision of
experienced journalists and television crews to help test procedures and also
assist in training key staff.
Gold Standard
Emergency Planning College The Hawkhills, Easingwold, York North Yorkshire,
YO61 3EG +44(0) 1347 821406
"Digital Fires Instructor Serco - Camp Pendleton, CA .. Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.
•Works directly with customers and team members to determine project scope and specifications.
•Provides research and analysis to support military organizations.
•May support development and analysis of products, including training modules, evaluation tools, etc.
•Presents analysis or products to customers.
•May support policy and procedure development for agency, interagency, or community-wide support.
•May interact with outside customers and functional peer groups.
• Participates in the development, testing, maintenance and delivery of training and educational programs and related materials in support of complex products and/or procedures.
• Knowledge on the operational employment and TTPs of the following C2 systems and software applications in the COC operating environment is required:, AFATDS, FBCB2-BFT, JADOCS, and supporting C2 systems/software applications found available for use the regimental/battalion Combat Operations Center (COC).
• Conducts training sessions and assists in evaluating the effectiveness of training activities.
• May assist with updating course documentation on a continuous basis to ensure timeliness and relevance.
• May work with engineering, technical support and manufacturing to ensure that course material reflects current product features. Desired Skills and Experience
•Requires a bachelor's degree in a related field; graduate degree preferred, plus 3 years' experience as a Military Analyst and/or formal military training. Appropriate clearance level required.
•Work is usually performed at a government site, some of which may be remote.
•Working conditions may vary.
•Travel may be required.
• Have attended DoD formal instructor courses, such as the Marine Corps' Formal School's Instructor's Course, or service equivalent
• Four years of documented experience instructing and employing their respective C2 system in support of MAGTF operations
• Background as an 0844 or 0848 MOS (USMC MOS, or equivalent USA MOS appropriate), with formal training and experience utilizing AFATDS (Advanced Field Artillery Target Data System), EMT (Effects Management Tool), PSS-SOF (Precision Strike Suite – Special Ops Forces)
• Active Secret Clearance or the ability to obtain a Secret clearance is required.
• Formal AFATDS Training required, Strike-Link, PSS-SOF, JADOCS experience desirable"
"Our global reach
Unrivalled
international experience
EPC is a global leader
in training, exercising and consultancy, providing service to the resilience
community world-wide.
We have operated in over 25 countries around the world and, over the past 8 years, have built strong relationships and partnerships within the Gulf States. We have designed and delivered bespoke and contextualised courses in Arabic for; the United Arab Emirates, Qatar, Bahrain, Oman and Saudi Arabia, both in the UK and in-country.
We have also taken our services into North Africa with training and consultancy packages being delivered in Morocco, Mauritania, Mali and Algeria. Lately EPC has added to its capability with brand new cyber training suite and experience in the nuclear emergency management arena. Combined with a sophisticated exercising capability, EPC is able to replicate organisational resilience situations from every perspective; from preparing and recovering from crises through to 'bouncing back' to normality.
We would be delighted to:
We have operated in over 25 countries around the world and, over the past 8 years, have built strong relationships and partnerships within the Gulf States. We have designed and delivered bespoke and contextualised courses in Arabic for; the United Arab Emirates, Qatar, Bahrain, Oman and Saudi Arabia, both in the UK and in-country.
We have also taken our services into North Africa with training and consultancy packages being delivered in Morocco, Mauritania, Mali and Algeria. Lately EPC has added to its capability with brand new cyber training suite and experience in the nuclear emergency management arena. Combined with a sophisticated exercising capability, EPC is able to replicate organisational resilience situations from every perspective; from preparing and recovering from crises through to 'bouncing back' to normality.
We would be delighted to:
discuss your aims and objectives
draft a course outline
produce bespoke training and delivery
create comprehensive training materials in different languages
deliver your program at a place and time to suit your needs
We have the flexibility, expertise and experience to deliver wherever our services are required. Please contact us for more information."
"Serco farewell to NPL after 19 years of innovation [outsourced by David Cameron at Treasury] … 8 January 2015 Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. .. · It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit [bullshit] over the next decade. .. · NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency [Hawkeye death-pool] trading in the City through NPLTime.”
"Spectre – On a mission in Mexico City, unofficially ordered by the previous M by way of a posthumous message, James Bond kills two men arranging to blow up a stadium and gives chase to Marco Sciarra, an assassin who survived the attack. In the ensuing struggle, Bond kills Sciarra and steals his ring, which is emblazoned with a stylised octopus. On his return to London Bond is indefinitely suspended from field duty by the current M, who is in the midst of a power struggle with C, the head of the privately-backed [Serco] Joint Intelligence Service, which consists of the recently merged MI5 and MI6. C also campaigns for Britain to join "Nine Eyes", a global surveillance and intelligence co-operation initiative between nine member states [Five Eyes + BRIC]. C uses his influence to close down the '00' section, believing it to be outdated."
"8(a) [and Protegee] Business Development Program[edit] The 8(a) Business Development Program [controlled through Serco protégée Base One Technologies] assists in the development of small businesses owned and operated by individuals who are socially and economically disadvantaged, such as women and minorities. The following ethnic groups are classified as eligible: Black Americans; Hispanic Americans; Native Americans (American Indians, Eskimos, Aleuts, or Native Hawaiians); Asian Pacific Americans (persons with origins from Burma, Thailand, Malaysia, Indonesia, Singapore, Brunei, Japan [Mineta interned in WWII], China (including Hong Kong), Taiwan, Laos, Cambodia (Kampuchea), Vietnam, Korea, The Philippines, U.S. Trust Territory of the Pacific Islands (Republic of Palau), Republic of the Marshall Islands, Federated States of Micronesia, the Commonwealth of the Northern Mariana Islands, Guam, Samoa, Macao, Fiji, Tonga, Kiribati, Tuvalu, or Nauru); Subcontinent Asian Americans (persons with origins from India, Pakistan, Bangladesh, Sri Lanka, Bhutan, the Maldives Islands or Nepal). In 2011, the SBA, along with the FBI and the IRS, uncovered a massive scheme to defraud this program. Civilian employees of the U.S. Army Corps of Engineers, working in concert with an employee of Alaska Native Corporation Eyak Technology LLC allegedly submitted fraudulent bills to the program, totaling over 20 million dollars, and kept the money for their own use.[26] It also alleged that the group planned to steer a further 780 million dollars towards their favored contractor.[27]"
Yours sincerely,
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.