Wednesday, February 19, 2014

#1855: Marine Links Serco 007 Defence Academy to Mycroft MI-3 Travelling Criminals, Obama Bullets at Sandy Hook

Plum City – ( United States Marine Field McConnell has linked Serco’s U.K. Defence Academy hacking of the U.S. Marshals Warrant Information Network (USM-007) to Mycroft Warrants allegedly issued to criminals traveling as guests of the MI-3 Innholders Livery Company who added realism to Obama cyber-war exercises by leaving 154 bullet casings at the Sandy Hook Elementary School, Newtown, CT, on December 14, 2012.

Mycroft Warrant = A writ issued by a competent but blackmailed or extorted officer, usually a judge or magistrate, which permits an otherwise illegal act that would violate individual rights and affords the person executing the writ protection from damages if the act is performed.

MI-3 = Kristine Marcy + Norman Inkster + Interpol + Intrepid (William Stephenson)

McConnell claims that Serco root companies extorted Mycroft warrants from the Prince of Wales (later Edward VII) and hacked the telegraph services of London’s Langham Hotel to blackmail pedophile Innholder guests in Australia, Canada, New Zealand and the United States.

McConnell also claims that Serco’s National Security Agency director Maureen Baginski and its Head of Defence Academy War-gaming, Phil Taylor, use bugged Herman Miller chairs in local hotel rooms and call centers to coordinate the USM-007 travelling criminals who allegedly hacked Connecticut’s lone-gunman exercises, triaged witnesses, planted evidence and decoyed public attention from the role of Mycroft MI-3 Innholders in the evolving Obama cyberwars.

McConnell invites key word Googlers to read excerpts below and ask why “The List of Sherlock Innholders – The Wrist That Didn’t Bleed” book has a new title at

Prequel 1: #1854: Marine Links Serco to MI-3 Mycroft’s Dick, Obama USM-007 Sandy Hook Bullets

EP1398-Former FL state trooper Wolgang Halbig on the Sandy Hoax.

Newtown: 154 bullet casings recovered

Sandy Hook School To Be Demolished To Hide Lack of Evidence

Retracing what happened December 14
The carnage began in that house.

Before embarking on his rampage at Sandy Hook, Adam Lanza killed his 52-year-old mother by shooting her in the forehead as she lay in bed, a search warrant states.

"There was no indication of a struggle" between mother and son, Sedensky said.

Timeline of Sandy Hook shooting

From there, he drove to the elementary school -- leaving a 12-gauge shotgun in the car, police would discover -- and shot through the front entrance.

The information detailed Thursday dispelled some earlier reports on what happened, Sedensky noted. Lanza wasn't wearing a bulletproof vest, for one. And besides the hallway, he fatally shot students and teachers in two classrooms, not three.

When police found Lanza's body -- killed by a single, self-inflicted shot from a Glock 10 mm handgun -- they also discovered that the Bushmaster rifle was loaded with 14 bullets in its 30-round capacity magazine, plus one round in a chamber.

This was one of 10 of this firearm's 30-round capacity magazines at the scene, Sedensky explained. More ammunition for the Glock and a Sig Sauer P226 9 mm handgun was also found. Three such magazines still contained 30 rounds. There were six more magazines nearby -- three of them were empty, while the others had 10, 11 or 13 live rounds in them. 

"One-hundred-and-fifty-four spent .223 casings were recovered from the scene," the state's attorney wrote, indicating that Lanza had fired at least that many bullets from what Connecticut authorities had described as an "assault-type rifle."

A lot of bullets fired in not a lot of time. Sedensky said, "It is currently estimated that the time from when the shooter shot his way into the school until he took his own life was less than five minutes."”

Cyber Warfare and the Notion of Direct Participation in Hostilities David Turns* Senior Lecturer in International Laws of Armed Conflict, Defence Academy of the UK (Cranfield University). Opinions and interpretations expressed in this article are solely those of the author and do not necessarily represent those of the Armed Forces, Ministry of Defence or Government of the UK. Email: Abstract The domain of cyber warfare being relatively new, it is not yet matched by any comparatively novel international legal paradigm; the cyber conflicts of the present and (probably) the future therefore fall to be regulated under the existing lex lata. This article, assuming a scenario of international armed conflict, seeks as a specific example to apply the notion of direct participation in hostilities from Additional Protocol I (1977) to cyber war. This aspect of the topic is likely to assume particular importance in light of the contemporary tendency in many developed, Western armed forces to outsource technical specialist work (like information technology) to civilians. Whether or not such civilians can be said to be directly participating in hostilities—based on the accepted constitutive elements of threshold of harm, direct causation and belligerent nexus identified in the International Committee of the Red Cross’ Interpretive Guidance (2005)—will also have implications for the objects and places that could lawfully be targeted in future cyber conflicts.” 

The Joint Services Command & Staff College (JSCSC) was built on the Shrivenham campus in 2000 to house the UK’s joint staff training facility for officers from the British armed forces. .. All teaching facilities, including lecture theatres, are equipped with a wide range of high-tech audio-visual facilities that are managed and supported by Serco staff. Syndicate rooms: • Three rooms can accommodate up to 30 students each. These rooms have movable partitions to accommodate large groups. • Each syndicate room is equipped with mobile LCD video/data projectors Synthetics: • Two flood-wired syndicate rooms and synthetic environments used for wargaming Vehicle park: • Vehicle park is also ducted with IT and electrical services to allow external static vehicles access to the building IT network”

Is Your Office Bugged? Detecting Electronic Eavesdropping Electronic Eavesdropping Detection Sweeps is otherwise referred to as: Technical Surveillance Countermeasures Electronic Countermeasures Debugging sweeps Electronic sweeps. Whatever you call it, electronic eavesdropping has never been more accessible to the general public. Bug and eavesdropping devices can be placed in computers, telephone, furnishings, false ceilings and several other places and they may be compromising your privacy at work, home or inside your vehicle. We are fully equipped and experienced and have everything we need in-house; we never use sub-contractors and only use equipment manufactured by the world's leading companies. Furniture has been moved slightly, and no one knows why. A very popular location for the installation of eavesdropping device is either behind, or inside furniture (couch, chair, lamp, etc.) People who live or work in a targeted area tend to notice when furnishings have been moved even a fraction of an inch. Pay close attention to the imprint which furniture makes on rugs, and the position of lampshades. Also watch the distance between furniture and the wall as eavesdroppers are usually in a hurry and rarely put the furniture back in the right place.” 

Phil Taylor .. Head of Service Desk and Wargames at Serco
Swindon, United Kingdom  
Defense & Space
Head of Service Desk and Wargames at Serco
Application Support Analyst at Serco
Configuration Analyst at Serco
International IT Customer Liaison at Herman Miller
Phil Taylor's Experience
Head of Service Desk and Wargames
Public Company; 10,001+ employees; SRP; Outsourcing/Offshoring industry
April 2011 – Present (2 years 11 months)
Service Desk

The day to day management of the Defence Academy Service Desk staff and resources, ensuring that all incidents and requests reported to the desk are responded to and resolved in accordance with the relevant contractual agreements. Also responsible for the production of statistics to feed into the performance monitoring monthly report as required.
Exercises and Simulation (War-gaming)

The co-ordination of the delivery of Theatre Wargames to the various courses in the JSCSC and Army Division by ICT staff including acting as the main escalation point and interface with the customer and their other contractors. Application Support Analyst

Public Company; 10,001+ employees; SRP; Outsourcing/Offshoring industry
December 2009 – April 2011 (1 year 5 months) United Kingdom xxxxConfiguration Analyst
Public Company; 10,001+ employees; SRP; Outsourcing/Offshoring industry
June 2009 – December 2009 (7 months) United Kingdom
International IT Customer Liaison
Herman Miller
Public Company; 5001-10,000 employees; MLHR; Furniture industry
September 2007 – May 2009 (1 year 9 months) Chippenham, UK
Service Desk Team Leader
Public Company; 10,001+ employees; SRP; Outsourcing/Offshoring industry
2004 – 2007 (3 years)”

Reston, VA (Vocus) December 8, 2009
Serco Inc., a provider of professional, technology, and management services to the federal government, announced today that Maureen Baginski has been named Vice President of the intelligence business and National Security Advisor at Serco. Ms. Baginski has a distinguished background with almost three decades of service in the United States Intelligence Community.

Most recently, Ms. Baginski was President of the National Security Systems Sector for Sparta Inc. and prior to that a Director in Bearing Point’s Intelligence Sector. She also served on SI International’s Board of Directors until it was acquired by Serco in December 2009.

From 2003 to 2005, Ms. Baginski served as the FBI’s Executive Assistant Director for Intelligence where she was responsible for establishing and managing the FBI’s first-ever intelligence program. Her mission was to adapt FBI intelligence capabilities with information technologies to create an intelligence-sharing operation that could identify threats before they became attacks.

From 1979 to 2003, Ms. Baginski served at the National Security Agency (NSA), where she held a variety of positions, including Signals Intelligence (SIGINT) Director, Senior Operations Officer in the National Security Operations Center; Executive Assistant to the Director of NSA/Central Security Service, Chief Officer of the Director; Assistant Deputy Director of Technology and Systems; and lead analyst for the Soviet Union. As SIGINT Director, Ms. Baginski successfully established and directed a unified program to exploit encrypted or denied information on global networks. Leading the NSA’s Signals Intelligence Directorate, the Nation’s high technology cryptology organization, she managed a complex and geographically dispersed distributed information production enterprise.”

Meetings Morph One of the unexpected findings of the Herman Miller/Gensler research was that spaces adjacent to teams are used for information exchange rather than idea generation. Adding display capabilities to make information visible (e.g., a whiteboard) may shift use toward idea generation. *35 This is one reason why war rooms (spaces in which team members not only meet but also do their individual work during the lifespan of the project) can double the productivity of project teams. *36 There are other reasons, as well: the ability to problem solve around a whiteboard, coordinate team members’ actions around artifacts, and leave out and visible the “information we put in the environment that we wish to re-consult and that helps us get situated” so it’s easier to remember where we left off (referred to as “persistent state” *37). “The aesthetic of clutter promotes the flow of ideas,” says Bill Dowell, director of Research at Herman Miller. *38” 

[Herman Miller] Eight Inclusiveness Resource Teams (IRTs) organize our grass-roots efforts: Asian; Black; disAbility Advocacy; Women’s Initiatives Network; Lesbian, Gay, Bisexual, and Transgender (LGBT); Hispanic; Male; and Generational Outreach. Two additional IRTs (disability and remote workers) organize our efforts in the UK. Each IRT is charged with implementing initiatives that not only benefit our employees and communities, but also help Herman Miller to meet our business objectives. In the past year, IRTs grew to 170 members. Our I&D scorecard measures our efforts in several critical areas including Who We Sell to (customers), Who Does the Work (Talent), Where We Work (Employee Engagement), and Who We Sell to (Supplier Diversity). Scorecard results are reviewed regularly by the company’s senior-level leadership and the Board of Directors. This past year, we improved our results by 15 points, a 32% increase over the previous fiscal year. We have always worked to build a strong and diverse supplier network. Supplier sourcing and qualification, Tier 2 reporting, mentoring, community and business outreach, and training and education are among the strategies we use to strengthen our supplier diversity efforts.”

Serco to pay back £69m over fraudulent tagging contracts. Serco on Thursday agreed to repay the Government £68.5m. The scandal concerned the Ministry of Justice being charged for tagging people who were found to be dead, back in prison or overseas [allegedly deployed by Mycroft Dick on the Barack Obama’s U.S. Marshals Warrant Information Network (USM-007)]. Both Serco and G4S are currently being investigated by the Serious Fraud Office.”

Yours sincerely,

Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222

David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation

1 comment:

  1. This comment has been removed by a blog administrator.


Who's visiting Abel Danger
view a larger version of the map below at