United States Marine Field McConnell
Plum City Online - (AbelDanger.net)
October 14, 2016
1. Abel Danger (AD) claims that prior to 9/11, Hillary Clinton's favorite New York bundler Howard Lutnick had been using 8(a) company servers on the 47th floor offices of Adjusters International in WTC#1 (North Tower) to launder pay-to-play donations to the Clinton Foundation.
2. AD claims that Hillary Clinton used convicted blackmailer Jeffrey Epstein to extort donations by child-porn transmissions to the pedophile "Friends of Bill" and targeted members of the Federal Bridge Certification Authority including Wells Fargo (master servicer of the Twin Towers leveraged lease), the UK MOD (root key custodian) and the Boeing Company.
3. AD claims that on 9/11, Hillary Clinton's 8(a) aides used Zulu timing signals from Serco operatives of the National Physical Laboratory cesium clock to put the pilots of the hijacked Boeings into a flicker-vertigo trance and planes through decoy and drone maneuvers falsely attributed to the Bin Laden Group.
4. United States Marine Field McConnell has briefed Donald Trump on how Hillary Clinton's bundlers punished slow payers on 9/11, how blackmailers and 8(a) enforcers use the federal bridge to control the pedophile 'Friends of Bill', and how her aides can put the pilots of Trump's Boeing 757 into flicker-vertigo trances at a Zulu time of choice.
Clinton Snared In Pedophile Ring, Hilliary helped provide cover
Naudet brothers 9/11 Documentary - 1st plane hits North Tower
100% WTC Drone Attack/Strike Plane PROOF (Many Witnesses)
Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! [Note British and Saudi Governments, AXA, HSBC, Teachers' and Goldman Sachs]
Defense Ammunition Center [Outsourced to Serco]
Serco... Would you like to know more?
"Digital Fires Instructor Serco - Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action."
"Christopher Rajendran Hyman CBE (born 5 July 1963 in Durban, South
Africa)[1] was
Chief Executive of Serco Group plc from 2002 to October 2013.[2]
… On graduation, he worked for Arthur
Andersen. In 1989, he won an 18-month exchange with Ernst
& Young in London, who employed him after four months.[1] Head hunted in
1994 by Serco, Hyman became European finance
director, and in 1999 was made group finance director. In 2002, Hyman
became chief executive. .. Hyman resigned from his role of Chief Executive of
Serco on 25 October 2013 following allegations that Serco had overcharged
government customers. .. He was [making a presentation to Serco shareholder,
including British and Saudi governments] on the 47th floor of the World Trade Center [North
Tower] at the time of the September 11 attacks in 2001."
"The Amazing And Heartbreaking Story Of The CEO Who Lived And Rebuilt
His Firm After 9/11: Howard Lutnick
Sep. 11, 2011,
9:37 AM
Perhaps the only
reason Cantor Fitzgerald's chief executive Howard W. Lutnick didn't perish
during the September 11th terrorist attacks on the World Trade Center is thanks
to his young son.
That Tuesday morning
happened to be the day his five-year-old son Kyle started kindergarten.
He and his wife both wanted to take him to his first day at Horace Mann School.
Lutnick was in his son's
classroom when he first heard news of the attacks that would forever
change his life and his firm.
Cantor Fitzgerald
occupied the 101st to the 105th floors of One
World Trade Center -- just above the impact zone of the hijacked
plane.
Cantor Fitzgerald
suffered the greatest loss of life of any company. The firm lost 658 of
its 960 employees, almost two-thirds of its workforce.
What's even more
heartbreaking, Cantor Fitzgerald had a policy of hiring relatives, so those who
lost someone at the firm likely lost more than one loved one.
Lutnick lost his
brother."
By Ian Mohr
November 17,
2015 | 3:47am
MORE ON:
Hillary Clinton might
not have been thrilled with the site of her Wednesday night fundraiser — next
door to hubby Bill's old buddy, Jeffrey Epstein.
The event was at the
home of Cantor Fitzgerald's Howard Lutnick and closed to press.
But a spy pointed out
the location may have been "too close for comfort" as "Howard's enormous
townhouse touches Epstein's even larger townhouse."
Bubba's past flights
on private planes owned by convicted sex offender Epstein have been a perennial
thorn for the Clintons.
RNC chairman Reince
Priebus wondered this year, "I'd like to know what he was doing with [Epstein],
how many trips did he take, where was he going, what did he do when he was with
this guy?"
"July 7, 2016
Clinton Threat To "Destroy Everyone" Throws Washington Into
Chaos
By: Sorcha Faal,
and as reported to her Western Subscribers
A stunning Foreign
Intelligence Service (SVR) report circulating
in the Kremlin today says that during President
Putin's "telephonic conversation" with President Obama yesterday, the
American leader stated that Washington D.C. was in "political chaos" after
former President Bill Clinton threatened to "destroy everyone" with his "blackmail
files" should his wife, Hillary Clinton, be indicted for the crimes she
committed against her own government and people. [Note: Some words
and/or phrases appearing in quotes are English language approximations of
Russian words and/or phrases having no exact counterpart.]
According to this
report, President Putin was forced to personally call President Obama after
Russian military commanders attempting to finalize
a US initiated agreement regarding Syria proposed by the American
leader last week had been continually rebuffed by the Pentagon—and that we
reported on in our 4 July report titled “Prepare For War” Warns
Russian Military, "Obama Is No Longer In Charge".
Fearing President
Obama was no longer in charge of his own military forces, this report
continues, President Putin took it upon himself, yesterday, to personally call
President Obama where an agreement on
closer military cooperation between the US and Russia in regards to Syria was
reached—but during that conversation, President Obama detailed to President
Putin the chaos the US government was presently enduring due to former
President Clinton’s threat.
Though the text of the
exact words spoken between President Putin and President Obama during their
call are of a higher security rating then this “general/common” SVR report
allows, Russian intelligence agents contributing to it lay out a devastating
timeline regarding the facts surrounding Hillary Clinton that shows:
1.) The
full knowledge that the Kremlin was in possession of all of the emails from
Hillary Clinton’s private computer servers was allowed to be released
to the public on 6 May—and which was
confirmed this week by both the FBI and US experts.
2.) President
Putin, on 13 May, warning military commanders that if Hillary Clinton is
elected to be the next US president “it means war”.
3.) The
Investigative Committee (SLEDCOM), on 19
May, opening a war
crimes file against Hillary Clinton over her illegally obtaining
millions-of-dollars in bribes from the murderous Saudi regime.
4.) The
SVR reporting, on 2 June, that the husband, Shahriar Zolfaghari, of Georgia's
statewide prosecutor for human trafficking Camila Wright, who was investigating
former President Bill Clinton and his Clinton
Foundation co-founder Jeffery Epstein for child sex charges was gunned down. [Clinton
body count rises]
5.) The
SVR reporting, on 13 June, that Hillary Clinton had been linked to the Orlando
murders of pop singer Christina Grimmie and nearly 50 gay pride celebrants in a
false flag “massacre event”.
6.) The
SVR reporting, on 23 June, that former UN President John Ashe was discovered dead in his home
by FBI agents who were going to escort him to testify in front of a grand jury
probing Hillary Clinton. [Clinton
body count rises]
7.) The
SVR reporting, on 28 June, that the US Supreme Court, in an
unprecedented ruling, gave Hillary Clinton a "get out of jail free" card for
the many bribes she received.
8.) The
SVR reporting, on 28 June, that former
President Bill Clinton held a secretive meeting with US Attorney General
Loretta Lynch where the final details were worked out for Hillary
Clinton’s “total exoneration”.
9.) The
SVR reporting, on 30 June, that Hillary
Clinton was going to retain US Attorney General Loretta Lynch in office.
10.) The
SVR reporting that on 1 July, the hacker known as Guccifer, who was able to
obtain all of Hillary Clinton’s emails, was discovered missing from his
US prison cell by FBI agents. [Potential
rise of Clinton body count]
11.) The
SVR reporting that on 1 July, US Attorney General Loretta Lynch made
a public statement that she would abide by the decision of the FBI Director
James Comey as to if charges would filed against Hillary Clinton.
12.) The
SVR reporting that on 2 July, Hillary
Clinton was interviewed by the FBI.
13.) The
SVR reporting that on 5 July, FBI Director James Comey delivered
a nationwide address in which he detailed all of Hillary Clinton’s crimes
relating to her secret emails—but then said he wasn’t recommending prosecution.
14.) The
SVR reporting that on 5 July, President Obama made a public appearance with
Hillary Clinton just hours after FBI Director Comey’s exoneration of her
stating that he was “ready
to pass the baton”.
15.) The
SVR reporting that on 6 July, US Attorney General Loretta Lynch issued a
statement that not
only wouldn’t Hillary Clinton be charged with any crimes, none of her criminal
accomplices would be either.
SVR intelligence
analysts contributing to this report note that by the Obama regime’s
exoneration of Hillary Clinton they not only nullified
6 US Federal criminal laws, but, also, disgraced
the FBI and its once stellar reputation.
Also to be destroyed by
Hillary Clinton's exoneration, this report continues, is the United States
reputation as being a nation of laws that apply to everyone equally—made
especially damning in the light ofChina
sending one its top politicians to jail for life for excepting bribes this
past week, and Russia itself, also this past week, firing two of its top
military commanders for the mere suspicion that they were negligent in their
duties.
To why the Clintons have been allowed to continue their 25-year-saga of existing outside of the laws every other
American has to live by, this report concludes, is solely due to the
massive blackmail files former President Bill Clinton has compiled on numerous
top politicians, bankers and elites (and has threatened to release if Hillary
Clinton is ever charged) containing videos and photos of them having sex with
child sex slaves kept by Jeffery Epstein—and that EVERY SINGLE American news media outlet knows about, but
are too terrified to report on."
"Digital
display device US 4788539 A ABSTRACT A digital device for visually
displaying the value of a generally continuously varying function, such as car
speed. The device displays subranges of a full scale, putting them
individually in a viewing area. The displayed subranges in the viewing area
will be replaced as required to permit representation of the input function
over the full scale. The device allows selection of a new subrange with the
property that the input function value initially will be at an interior
position in the new subrange, thereby preventing repeated rapid switching
between subranges. The subrange display can be defined using scale markers in
just a few fixed positions in the viewing area. … The flickering can be a
distracting visual flashing. For example, five of seven segments are changing
in a transition between a "1" and a "2" digit, and several
digits may be changing simultaneously. This can be dangerous, as in the case of
driving an automobile. An appropriate
rate of flashing may even induce "flicker vertigo" in some people,
and this can produce a trance-like state."
"WTC#1 North Tower 47th Floor Pacific American
Corporation (CS), American TCC International Group (?UB), G.Z. Stephens, National Futures Association, Quint Amasis, W.J. Export-Import, Adjusters International, Clear Forest Corporation, First
Union Securities[9]"
"Adjusters International, formed in 1985, is a public
adjusting and disaster recovery company, who assists clients with
financial recovery from insurance claims and U.S. Federal Emergency Management Agency (FEMA)
grants. The company's headquarters is in Utica,
New York. It has more than 40 regional offices across the United
States.[1]
Public insurance adjusters represent
clients for a small percentage of the resulting settlement money from the
insurance claim. Adjusters mostly represent clients who have been victim to
property damage or loss. Most cases involve natural disasters including:fires, floods, hurri canes, ice damage,
and earthquakes.[1]
Public
adjusters are the only type of claims
adjuster that can legally represent the rights of an insured during an
insurance claim process."
"Developments
in PKI occurred in the early 1970s at the British intelligence agency GCHQ,
where James Ellis, Clifford
Cocks and others made important discoveries related to encryption
algorithms and key distribution.[19] However, as developments at GCHQ are
highly classified, the results of this work were kept secret and not publicly
acknowledged until the mid-1990s.
The public disclosure
of both secure key exchange and asymmetric
key algorithms in 1976
by Diffie, Hellman, Rivest, Sh amir, and Adleman changed secure communications
entirely. With the further development of high-speed digital electronic
communications (the Internet and its predecessors), a need became
evident for ways in which users could securely communicate with each other, and
as a further consequence of that, for ways in which users could be sure with
whom they were actually interacting.
Assorted cryptographic
protocols were invented and
analyzed within which the new cryptographic
primitives could be
effectively used. With the invention of the World Wide Weband its rapid spread, the need for authentication and secure
communication became still more acute. Commercial reasons alone (e.g., e-commerce, online access to proprietary databases from web browsers) were sufficient. Taher
Elgamal and others at Netscape developed the SSL protocol ('https' in Web URLs); it included key establishment, server
authentication (prior to v3, one-way only), and so on. A PKI structure was thus
created for Web users/sites wishing secure communications.
Vendors and
entrepreneurs saw the possibility of a large market, started companies (or new
projects at existing companies), and began to agitate for legal recognition and
protection from liability. An American
Bar Association technology
project published an extensive analysis of some of the foreseeable legal
aspects of PKI operations (see ABA
digital signature guidelines),
and shortly thereafter, several U.S. states (Utah being the first
in 1995) and other jurisdictions throughout the world began to enact laws and
adopt regulations. Consumer groups raised questions about privacy, access, and
liability considerations, which were more taken into consideration in some
jurisdictions than in others.
The enacted laws and
regulations differed, there were technical and operational problems in
converting PKI schemes into successful commercial operation, and progress has
been much slower than pioneers had imagined it would be.
By the first few years
of the 21st century, the underlying cryptographic engineering was clearly not
easy to deploy correctly. Operating procedures (manual or automatic) were not
easy to correctly design (nor even if so designed, to execute perfectly, which
the engineering required). The standards that existed were insufficient.
PKI vendors have found
a market, but it is not quite the market envisioned in the mid-1990s, and it
has grown both more slowly and in somewhat different ways than were
anticipated.[20] PKIs have not solved some of the problems they were expected to,
and several major vendors have gone out of business or been acquired by others.
PKI has had the most success in government implementations; the largest PKI
implementation to date is the Defense
Information Systems Agency (DISA)
PKI infrastructure for the Common Access
Cards program.”
"Custodial Services
Serco is a leading
provider of custodial services to governments around the world. In the UK, we
operate six adult prisons under contract to the Ministry of Justice's National
Offender Management Service and the Scottish Prison Service. We also run a
Secure Training Centre for juveniles on behalf of the Youth Justice Board of England
and Wales.
In addition, Serco
operates three prisons in Australia (Acacia, Wandoo Reintegration Facility and
Southern Queensland Correctional Centre) and two in New Zealand (Auckland South
Corrections Facility and Mt Eden Corrections Facility).
Our contracts include:
HMP Dovegate
HMP & YOI Doncaster
HMP Lowdham Grange
HMP Kilmarnock
HMP Ashfield
HMP Thameside
Acacia Prison"
HMP & YOI Doncaster
HMP Lowdham Grange
HMP Kilmarnock
HMP Ashfield
HMP Thameside
Acacia Prison"
"Base
One Technologies – Corporate Strategy – We are a Government Certified Women-Owned
Business
We practice Diversity
Recruitment and Staffing for IT positions
Base One was founded
in 1994 by a women engineer who had made a career in technology research for
many years. Base One has been very successful in focusing on diversity recruiting
and staffing for IT projects. It has been our experience that the greater the
diversity mix, the more creative the solution. As in any field the more diverse
the viewpoint the more thorough your analysis. Our engineers can think out of
the box.
Because of our
affiliations we have access to pools of resources among more diverse groups
& individuals. We work with a large pool of minority professionals who
specialize in IT skills. We are able to have access to these resources through
our status as a D/MWBD firm and our affiliations. These affiliations assist us
in working with resources among more diverse groups & individuals. We are
also partnered with firms that are 8A certified as Minority firms, Disabled
Veteran firms, Native American firms, Vietnam veteran firms, women owned firms.
Our hub zone location
keeps us close to the professional organizations of great diversity. We are
active in recruiting from and networking with these community organizations of
local IT professionals. This has given us access to a large pool of diversity
talent.
Base One's staff of
engineers are a diverse group of professionals. This diverse network of
engineers helps us to branch out to other engineers and creates an even larger
network of resources for us to work with.
The greater the
diversity the more complete & thorough the analysis. The broader the
spectrum of points of view the broader the scope of the analysis. We feel that
a diverse team gives us a greater advantage in creating cutting edge solutions.
To that end we will continue to nurture these relationships to further extend
our talent pool.
The greater the
diversity mix, the more creative the solution.
The more diverse the
viewpoint, the more thorough the analysis.
The more diverse our
team, the more our engineers can think out of the box.
This is why Base One
Technologies concentrates on diversity recruitment in the belief that a diverse
team gives us a greater advantage in creating cutting edge solutions.”
Information Security
Planning is the process whereby an organization seeks to protect its operations
and assets from data theft or computer hackers that seek to obtain unauthorized
information or sabotage business operations.
Key Clients Benefiting
From Our Information Security Expertise: Pentagon Renovation Program, FAA,
Citigroup, MCI.
Base One
Technologies
Expertly researches,
designs, and develops information security policies that protect your data and
manage your firm's information technology risk at levels acceptable to your
business.
Performs architectural
assessments and conducts both internal and external penetration testing. The
results of these efforts culminate in an extensive risk analysis and
vulnerabilities report.
Develops, implements
and supports Information Security Counter measures such as honey-pots and
evidence logging and incident documentation processes and solutions."
"Base One Technologies, Ltd. is a DOMESTIC
BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994. This
file was obtained from the Secretary of State and has a file number
of 1795583.” "Serco's Office of
Partner Relations (OPR) helps facilitate our aggressive small
business utilization and growth strategies. Through the
OPR, Serco mentors four local small businesses under formal Mentor
Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services,
Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and
HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for
exceeding our mentoring goals." http://www.dtic.mil/ whs/directives/corres/pdf/ 100515p.pdf
"Serco
chief quits before investigation into electronic tagging charges
Chris Hyman says he is
leaving the services company because it is the best way to mend relationship
with UK government
Friday 25 October
2013 19.20 BSTLast modified on Tuesday 19 July 201616.43 BST
The boss of government
outsourcing group Serco quit to allow
a new boss to be appointed from outside the troubled company.
Serco is scrambling to
restore its reputation following a series of debacles ranging from failing to
provide enough doctors in Cornwall to charging the government for electronic
tags on dead prisoners.
Chris Hyman, left with
immediate effect on Friday after 20 years with the operator of hospitals,
prisons and railways. He said he would "step back" from his chief
executive role, held for 11 years, to allow relations with the government to be
rebuilt."
"Opened in 1994 as the successor to the
Transitional Immigrant Visa Processing Center in Rosslyn, Va., the NVC
centralizes all immigrant visa pre-processing and appointment scheduling for
overseas posts. The NVC collects paperwork and fees before forwarding a case,
ready for adjudication, to the responsible post.
The center also handles immigrant and fiancé visa petitions, and while it does not adjudicate visa applications, it provides technical assistance and support to visa-adjudicating consular officials overseas.
Only two Foreign Service officers, the director and deputy director, work at the center, along with just five Civil Service employees. They work with almost 500 contract employees doing preprocessing of visas, making the center one of the largest employers in the Portsmouth area.
The contractor, Serco, Inc., has worked with the NVC since its inception and with the Department for almost 18 years.
The NVC houses more than 2.6 million immigrant visa files, receives almost two million pieces of mail per year and received more than half a million petitions from the U.S. Citizenship and Immigration Service (USCIS) in 2011. Its file rooms' high-density shelves are stacked floor-to-ceiling with files, each a collection of someone’s hopes and dreams and each requiring proper handling. ….
The NVC also preprocesses the chief of mission (COM) application required for the filing of a petition for a Special Immigrant Visa (SIV). Such visas, for foreign nationals who have performed services for the U.S. government in Iraq and Afghanistan, require COM concurrence before the applicant can file a petition with USCIS. The NVC collects the requisite documents from such applicants and, when complete, forwards the package to the U.S. embassies in Baghdad or Kabul for COM approval"
The center also handles immigrant and fiancé visa petitions, and while it does not adjudicate visa applications, it provides technical assistance and support to visa-adjudicating consular officials overseas.
Only two Foreign Service officers, the director and deputy director, work at the center, along with just five Civil Service employees. They work with almost 500 contract employees doing preprocessing of visas, making the center one of the largest employers in the Portsmouth area.
The contractor, Serco, Inc., has worked with the NVC since its inception and with the Department for almost 18 years.
The NVC houses more than 2.6 million immigrant visa files, receives almost two million pieces of mail per year and received more than half a million petitions from the U.S. Citizenship and Immigration Service (USCIS) in 2011. Its file rooms' high-density shelves are stacked floor-to-ceiling with files, each a collection of someone’s hopes and dreams and each requiring proper handling. ….
The NVC also preprocesses the chief of mission (COM) application required for the filing of a petition for a Special Immigrant Visa (SIV). Such visas, for foreign nationals who have performed services for the U.S. government in Iraq and Afghanistan, require COM concurrence before the applicant can file a petition with USCIS. The NVC collects the requisite documents from such applicants and, when complete, forwards the package to the U.S. embassies in Baghdad or Kabul for COM approval"
"Serco farewell to NPL after 19 years of innovation 8 January 2015 Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco's management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK's economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade…. NPL's caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading [for Serco's front running banks] in the City through NPL [Zulu] Time."
“UK Cabinet Office – Emergency Planning College – Serco …..Types of
Exercise Workshop Exercises These are structured discussion events where
participants can explore issues in a less pressurised environment. They are an
ideal way of developing solutions, procedures and plans rather than the focus
being on decision making. Table Top Exercises These involve a realistic
scenario and will follow a time line, either in real-time or with time jumps to
concentrate on the more important areas. The participants would be expected to
be familiar with the plans and procedures that are being used although the
exercise tempo and complexity can be adjusted to suit the current state of
training and readiness. Simulation and media play can be used to support the
exercise. Table-top exercises help develop teamwork and allow participants to
gain a better understanding of their roles and that of other agencies and
organisations. Command/Control
Post Exercises These are designed primarily to exercise the senior leadership
and support staff in collective planning and decision making within a strategic
grouping. Ideally such exercises would be run from the real command and control
locations and using their communications and information systems [Feeling
lucky, Punk?]. This could include a mix of locations and varying
levels of technical simulation support. The Gold Standard system is flexible to
allow the tempo and intensity to be adjusted to ensure maximum training
benefit, or to fully test and evaluate the most important aspects of a plan.
Such exercises also test information flow, communications, equipment,
procedures, decision making and coordination. Live Exercises These can range
from testing individual components of a system or organisation through to a
full-scale rehearsal. They are particularly useful where there are regulatory
requirements or with high-risk situations. They are more complex and costly to
organise and deliver but can be integrated with Command Post Exercises as part
of a wider exercising package."
Yours sincerely,
Yours sincerely,
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.