Sunday, January 25, 2015

#2246: Marine Links Serco Black-Hand FEMA/Illinois Task Force To MoD Key, Incinerated Pyle

Plum City - ( United States Marine Field McConnell has linked Serco's Black-Hand* hacks of FEMA/Illinois Terrorism Task Force's Airbus notification systems to the UK MoD's alleged use of Entrust public key infrastructure ('PKI') to authorize the incineration of any evidence of the contract killing of ScienceLogic's COO Don Pyle at or near his Annapolis home.

Black Hand* – Livery company captains or journeymen with "Privy Seal Licenses to Kill, Extort and Bribe" for City of London's Honourable Artillery Company 1527, Master Mariners and Air Pilots 1929 and the Ancient and Honorable Artillery Company of Massachusetts 1638 – whose alumni include U.S. Presidents James Monroe, Chester Alan Arthur, Calvin Coolidge John F. Kennedy and whose incumbent may prove to be Barack Hussein Obama.

McConnell alleges that in 1962, the late pedophile Lord Privy Seal and commander of the Honourable Artillery Company, Lt. Col. Edward Heath, outsourced the U.K.'s four-minute warning system, the NPL cesium clock and Telstar communications to Serco's Black Hand journeymen who were then able synchronize contract-hit operations in the United Kingdom and the United States to within 1 μs of each other (previous efforts were only accurate to 2,000 μs).

McConnell claims that Lt. Col. Heath (d. 2005) groomed the present Lord Privy Seal Baroness Stowell in the use of Black Hand murder for hire networks at the UK Ministry of Defence (1986-1988), the British Embassy in the United States (1988-1991) and the U.K. Prime Minister John Major's Press Office (1993-1997) and then placed her as Head of Communications [Truth and Propaganda] for the BBC Chairmen: Gavyn Davies, Michael Grade and Michael Lyons.

McConnell alleges that Serco's V-P and National Secuity Adviser, Maureen Baginski, is having Black Hand captains and journeymen trained on war-game simulations at the MoD Defence College of Management and Technology ('DCMT') in Shrivenham, Oxfordshire and he further alleges that she used Airbus notifications and Entrust keys to authorize Mr. Pyle's murder after ScienceLogic agents discovered the Oval Office/Black Hand extortion racket.

McConnell invites rebuttal of his allegation that Serco's Maureen Baginski used Black-Hand hacks of Oval Office Airbus notification systems and associated FEMA/Illinois/MoD public key infrastructure to authorize the incineration of any evidence of contract killings (hits) at – or near – Mr. Pyle's Annapolis mansion on January 19, 2015.

Prequel 1: #2245: Marine Links Airbus Black-Hand Oval-Office Switch To Serco's Spy In Bag And Incinerated Pyle

Prequel 2: Ministry of Defence: Defence Equipment and Support (PDF File)

Serco Fire

2 more bodies recovered in Annapolis mansion 
blaze rubble; 4 of 6 victims now found

Illinois Terrorism Task Force (ITTF) 

[Airbus] Cassidian Full Circle Security 
Serco Black Hand journeymen allegedly removed the Defense Red Switch Network phone from the Oval Office in 2009

Serco Black Hand journeymen allegedly replaced Red Switch with Alcatel and Airbus Cassidian 4G communications so Oval Office identities could authorize shoot, snuff, spin and spoliation.

Serco... Would you like to know more? 

"6 Unaccounted for After Massive Blaze Destroys Mansion 
Six family members are unaccounted for after a 16,000-square-foot mansion was destroyed by a four-alarm fire Monday morning, Anne Arundel County fire officials confirmed. 

News4's Jackie Bensen reports. (Published Monday, Jan 19, 2015) Updated at 8:31 PM PST on Monday, Jan 19, 2015 

Six family members are unaccounted for after a 16,000-square-foot mansion was destroyed by a four-alarm fire Monday morning, Anne Arundel County fire officials confirmed.

"From the family, we know who's unaccounted for," Anne Arundel County Fire Department spokesman Capt. Russ Davies said, though he declined to say who specifically could not be located. "If you look at the damage, you know, it would not be a stretch to think that if there were occupants that they did not survive the fire." Earlier, Davies had said the home's occupants might have been out of town.

An alarm monitoring company and a neighbor who saw flames reported the fire in the 900 block of Childs Point Road about 3:30 a.m., according to Capt. Russ Davies, spokesman for the Anne Arundel County Fire Department. When firefighters arrived, they found heavy smoke and flames through the first floor, second floor and roof of the home.

"We heard two thuds and this shot of flame went shooting high in the sky, and we thought, Oh my God, what's that?” neighbor Azalea Leckszas said. Eighty-five firefighters from the county, the city of Annapolis and other jurisdictions battled the blaze, Davies said. Because there was not a fire hydrant in the area, firefighters shuttled water tankers to the site and stationed a fire boat at a pier near the property to bring in water. ……The Bureau of Alcohol, Tobacco, Firearms and Explosives is sending 15-20 agents to investigate because of the size and scope of the scene, News4’s Darcy Spencer reported. They will begin their work image: Wednesday morning.

Special Agent David Cheplak, a spokesman for the ATF’s Baltimore field office, said local fire officials asked for help.

"The Anne Arundel County Fire Department had asked for our assistance, and so we’ve activated our national response team, which is a team comprised of special agents, certified fire investigators from across the country, and they respond to large-scale fires nationally," Cheplak said. ..

Eighty-five firefighters from the county, the city of Annapolis and other jurisdictions battled the blaze, Davies said. Because there was not a fire hydrant in the area, firefighters shuttled water tankers to the site and stationed a fire boat at a pier near the property to bring in water.

The intensity of the fire, the size of the house and the failure of the roof and floors prevented firefighters from searching the structure, Davies said.

The home, which resembled a castle, was owned by IT executive and philanthropist Don Pyle, chief operating officer of ScienceLogic, and his wife, Sandra." 

"[Serco Runs] Simulation Employment Training – SIMET [For U.K. MoD]

The course is principally designed to prepare selected military officers for future technical and management appointments within the field of defence simulation. However the course is appropriate to all candidates from Air, Land and Maritime domains, including civilians and defence industry. It provides an overarching understanding of the capability and application of defence modelling and simulation systems, underpinned by an appreciation of the domain’s underlying technologies and tools. A broad range of applications of modelling and simulation are addressed; including training and education, acquisition, analysis and experimentation. The course is capability focused and underpinned by extensive practical work using the Simulation and Synthetic Environment Laboratory (SSEL)

Suitable For Primarily intended for officers taking up Grade 2 staff appointments involving a modelling and simulation component, across all career fields. It will also suit a broader range of delegates working in or alongside modelling and simulation in defence who wish to understand the technologies, methodologies and challenges involved. ..

PRICE FOR NON-MOD DELEGATES [Black Hand]: £8000.00
Delivery Method
Course Contact Details
Tel: 01793 785053
Mil: 96161 785053
Course Objectives
Understand the role of models, simulations and synthetic environments within Defence.
Understand the fundamental principles of Defence models, simulations and synthetic environments.
Understand the role of hardware and software in the creation of modelling and simulation solutions.
Be aware of the key defence modelling and simulation organisations, their structure, capabilities and activities.
Comprehend the methods and principles of combat modelling and wargaming in analysis and training.
Critically evaluate methodologies and techniques used in analysis through experimentation.
Comprehend the principles of Computer Generated Forces (CGFs) and Semi-Automated Forces (SAFs)
Comprehend the enabling technologies and methodologies underpinning real time graphics (RTG).
Consider the challenges and opportunities in the use of commercial off the shelf products (COTS) for Defence modelling and simulation.
Comprehend the role of Defence synthetic environments (networked, federated and distributed simulations) and the technology used to create them.
Participate in the design, develop, construct and use of a synthetic environment. 
Develop an awareness of issues in the practical development and acquisition of modelling and simulation through case studies of real programmes and visits to selected sites.
Course Components 
Principles of modelling and simulation 
Simulation languages and packages
Overview of software and hardware in modelling and simulation
Wargaming, combat modelling and Computer Generated Forces
Real-time 3D Graphics and virtual environments
3D modelling and terrain database generation
Commercial Off The Shelf Technologies (COTS)
Networked, distributed and federated simulations”
"[Airbus] Cassidian Communications, an EADS North America company, today announced the successful use of its emergency notification technology, specifically The Communicator!® NXT™ emergency notification system, during the Federal Emergency Management Agency's (FEMA) National Level Exercise (NLE) the week of May 16-20. This high-level event, conducted in accordance with the National Exercise Program (NEP) and Department of Homeland Security (DHS) guidelines, simulated a catastrophic earthquake along the New Madrid Seismic Zone (NMSZ), validating the independent and collaborative emergency response capabilities of four FEMA regions; federal, state and local governments; and other participants.

As indicated on FEMA's website,, the NLE is a White House-directed, Congressionally-mandated exercise that offers agencies and jurisdictions a way to test their plans and skills in a real-time, realistic environment and to gain the in-depth knowledge that only experience can provide. The exercise encompasses all areas of disaster preparation and response including critical resource logistics and distribution; emergency operations center (EOC) management; public information and warning; long term recovery and communications.

During the weeklong exercise, FEMA activated The Communicator! NXT system eight different times—the first of which took place at the event’s start. Within 2½ minutes, over 1,000 individuals in 17 different groups were contacted via email and phone, each receiving details regarding NLE activities. Reports indicate 1,032 emails were sent in the first 35 seconds of the activation and 819 calls immediately followed over the next two minutes.

Subsequent activations of The Communicator! NXT system provided secure, multimodal notification (i.e., via work phones, landlines, numeric pagers, etc.) to FEMA personnel, quickly mobilizing teams and gathering crucial feedback.

"We are fortunate to provide such a valuable tool to FEMA and the Department of Homeland Security," said Bob Freinberg, vice president and general manager, Cassidian Communications. "We know our solutions must at all times be prepared to perform during any threat or emergency and be able to effectively resume Agency-essential operations if they are interrupted."

FEMA, part of the U.S. Department of Homeland Security since 2003, first deployed the notification system in 1999. Since that time, the Agency has diligently worked to improve communications across its ten regions, helping ensure that as a nation, we work together to build, sustain and improve our capability to prepare for, protect against, respond to, recover from and mitigate all hazards.

The Communicator! NXT system is also used by hundreds of public and private sector organizations globally, including US military operations. The industry-renowned application is proven to support simple to highly complex communications, meet even the most stringent IT/security requirements and provide comprehensive reporting for greater accountability and a full audit trail. Notable uses include 9/11, numerous Atlantic hurricane seasons and California wildfires, the H1N1 pandemic and most recently, the Joplin, Mo. tornado.

"Cassidian Communications is honored to support FEMA and other mission critical organizations worldwide in meeting their crisis communications objectives," concluded Freinberg.

Cassidian Communications continues to serve clients ranging from public safety operations to Fortune 1000 corporations to federal agencies. Collectively, the company has more than 40 years of experience deploying 9-1-1 call processing solutions, notification solutions and first-responder digital trunked radio networks. About Cassidian Communications (

As the largest and most trusted source of mission critical communications solutions, Cassidian Communications, an EADS North America company, is leading the way in standards-based NG9-1-1 call center applications, notification solutions and services and P25 land mobile radio systems. Headquartered in Temecula, California. About EADS North America (

EADS North America is the North American operation of EADS, a global leader in aerospace, defense and related services. As a leader in all sectors of defense and homeland security, EADS North America and its parent company, EADS, contribute over $11 billion to the U.S. economy annually and support more than 200,000 American jobs through its network of suppliers and services. Operating in 17 states, EADS North America offers a broad array of advanced solutions to its customers in the commercial, homeland security, aerospace and defense markets."

"FEMA 'Spring Ahead' — Entrust's PKI is Muscle Behind State of Illinois FRAC Application
FRAC solutions provide emergency response officials with critical information in times of crisis
DALLAS, May 21 /PRNewswire-FirstCall/ — Facilitated by digital identities and public key infrastructure from Entrust, Inc. (NASDAQ: ENTU), the Illinois Terrorism Task Force (ITTF) and their First Responder Authentication Credential (FRAC) application successfully participated in the nationwide Federal Emergency Management Agency (FEMA), Office of National Capital Region Coordination (NCRC), "Spring Ahead" event this week.

The Illinois Terrorism Task Force joined local, public, private, state and federal agencies and organizations in this multi-jurisdictional electronic validation demonstration leveraging Federal Information Processing Standard (FIPS) 201-compliant and FIPS 201-interoperable credentials.

"The interoperability of seamlessly authenticating credentials from different local, state and federal agencies is a tremendous asset during times of unfortunate emergency or tragedy," said Entrust President and Chief Executive Officer Bill Conner.

"Standards-based credentialing projects are critical to the safety and security of this country, and we're eager to see how Entrust PKI and digital certificates can help better prepare our states and country for unforeseen disasters or tragedy. Other states should look to the State of Illinois as an example of technology leadership and innovation."

Although Spring Ahead featured eight separate scenarios throughout the week, the interoperability of the State of Illinois FRAC solution was on display during a three-hour session Thursday. The credentials of up to 25 emergency response officials and other individuals were authenticated as part of Illinois’ participation in FEMA NCRC's nationwide demonstration.

Fifteen were specific emergency response official credentials, but others included U.S. Department of Defense Common Access Cards (CAC) and basic state-issued driver’s licenses — all of which helped prove the program’s interoperability to authenticate credentials from various agencies.

More than 30 organizations, in 20 locations across the United States, simultaneously authenticated and uploaded digital certificates to a repository. Participants and observers viewed a Web-enabled mapping application that provided local, regional and national emergency operation centers with near-real-time situational awareness of on-scene personnel during simulated emergencies.

This repository provides the capability to electronically validate emergency response officials’ digital identities and attributes — including qualifications, authorizations, certifications, or privileges — to strengthen the decision-making process for granting access to the incident scene, and provide secure electronic manifests of those who respond.

Including digital identities provided by PKI technology, the FRAC solution enables local, state and federal agencies to confidently make access decisions at any incident by quickly authenticating and validating — via a smart credential and certified handheld credential reader — the identities and roles of individuals wishing to enter or exit a secure or restricted area. Verified knowledge of roles, identities and privileges enables agencies to manage emergency response officials and allows incident command to adjust quickly to emergencies by distributing personnel where the're needed most.

Entrust's First Responder Authentication Credential solution is FIPS 201-compatible and interoperable with numerous smart credentials issued by various government entities. Further interoperability comes through cross-certification with the U.S. Federal Bridge Certification Authority (FBCA) so credentials can be verified across federal, state and local agencies, and among jurisdictions.

Entrust's hosted Non-Federal Shared Service Provider PKI solution is also cross-certified to the Federal Bridge Certification Authority (FBCA) and is appropriate for various non-Federal entities, organizations and agencies. This solution enables specific organizations to use digital certificates for authentications, encryption, digital signatures and physical and/or logical access, but without expensive upfront investments, in-house experts or secure facilities.

The Illinois Terrorism Task Force (ITTF) is charged with the task of assuring that Illinois is ready to respond to an act of terrorism. Due to the commitment of the members of the Task Force and the ability of the associated agencies to come together in a spirit of cooperation and teamwork, Illinois has plans in place to deal with a terrorist attack in our state.

About Entrust

Entrust provides trusted solutions that secure digital identities and information for enterprises and governments in 2,000 organizations spanning 60 countries. Offering trusted security for less, Entrust solutions represent the right balance between affordability, expertise and service. These include SSL, strong authentication, fraud detection, digital certificates and PKI. For information, call 888-690-2424, e-mail or visit

Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All Entrust product names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited. All other company and product names are trademarks or registered trademarks of their respective owners.

SOURCE: Entrust, Inc. Web site:"

"UK Ministry of Defence Standardizes on Entrust PKI 
Entrust’s technology selected to be the foundation for the MoD’s PKI ecosystem DALLAS – In an effort to enforce their strategy of centrally controlling policy to maintain a trusted network environment, the United Kingdom's Ministry of Defence (MoD) sought a public key infrastructure (PKI) solution to manage authentication, digital signatures and encryption capabilities. Entrust, Inc. [NASDAQ: ENTU] proudly announces that the company has licensed its Entrust Authority™ Security Manager to the the UK’s MoD where it is to be used as the MoD root certification authority (Root CA).

"The functionality and comprehensive nature of Entrust's PKI solution definitely meets our need to seamlessly manage the different capabilities we need for our secure network environment," said Lieutenant Colonel Keith Bell, Head of Defence Interoperable Network Services Authority. "We now have fully deployed the root certificate authority(CA) technology and look forward to extending this chain of trust to all departments and business partners."

Entrust Authority™ Security Manager, a world-leading PKI, is designed to manage the digital keys and certificates that make up the digital identities used to transparently automate security-related processes in an organization. As an organization's Certification Authority (CA) system, Entrust Authority Security Manager software can help enable the use of digital signature, digital receipt, encryption and permissions management services across a wide variety of applications and solutions.

"Having a secure PKI infrastructure is at the heart of building a trusted network environment," said Entrust Chairman, President and Chief Executive Officer Bill Conner. “Because the MoD has to service a variety of different internal agencies, it is important that their PKI offers security and functionality to support this vast network. We are pleased to help them in their quest to securely communicate with both internal constituencies, as well as extend this security network to Defence contractors and other outside parties."

The MoD will use the Entrust Authority Security Manager to support authentication, digital signatures and encryption. The PKI system also will allow the issuance of digital credentials to internal devices, as well as provide security for collaboration with industry partners. In addition, the PKI system will provide a root CA to the Defence Information Infrastructure DII(F) that will help create a single, efficient information infrastructure within the MoD."

"UCS Central governs multiple UCS domains 
By Jim Duffy 
Network World | Nov 1, 2012 2:38 PM PT 
Cisco this week unveiled a new management system for its UCS servers that is designed to simplify management of thousands of servers spread across geographies and data centers, from a single pane of glass.

UCS Central lets IT managers control a globally distributed UCS infrastructure comprised of multiple domains, with the ability to ensure service and configure service profiles, ID pools, policies and firmware, Cisco says. UCS Central also has an XML API for integration with third-party systems management and cloud orchestration tools. .. Third parties writing to the UCS Central API include Compuware, for control of application performance across data centers, private, public, and hybrid clouds; Cloupia, for the ability to replicate between multiple sites for disaster recovery; Zenoss, for discovery, monitoring and managing UCS performance and capacity utilization; ScienceLogic, for surveillance of multi-tenant data centers [including White House and NSA]; and Splunk, for gleaning operational intelligence from Big Data generated by thousands of UCS servers."

"[MoD Defence Academy] History[edit]

The college traces its history to a school founded in 1772 to provide technical training for the military. In 1840 the Royal Artillery Institution was founded to train artillery officers "for the study of science and languages". It was established as a response to the technological advances brought on by the Industrial Revolution. During the 1880s, the institution expanded, becoming the Ordnance College while the advanced classes formed the Artillery College, and a Commandant was appointed. In 1927 it became the Military College of Science. After the Second World War it moved from Woolwich to its current location in Shrivenham. In 1953, the college was granted its "Royal" title and became the "Royal Military College of Science" ('RMCS').[1]

In 1984 Cranfield University became the main academic provider of the college.[2] In 2004 the Defence College of Management and Technology ('DCMT') was established bringing together RMCS and the Defence Leadership Centre. Then in 2009 DCMT became the Defence Academy - College of Management and Technology (DA-CMT).[3] A contract entered into in November 2005 extended the Cranfield relationship with DA-CMT to 2028.[2]


The college is based, like the majority of Defence Academy institutions, at MOD (Ministry of Defence) Shrivenham, located between the villages of Shrivenham and Watchfield in the south-west corner of Oxfordshire (Vale of White Horse), and has training centres around the country. DA-CMT facilities at Shrivenham are run by Serco Defence. The departments are: Centre for Defence Acquisition and Technology, Centre for Defence Leadership and Management, Defence Centre for Languages and Culture (formerly The Defence School of Languages[4]), Nuclear Department and the Defence Technical Officer and Engineer Entry Scheme."

Yours sincerely,

Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222

David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation


Who's visiting Abel Danger
view a larger version of the map below at