Saturday, April 18, 2015

#2325: Marine Links Dam Lubitz Way Points To Serco Base One Tor, Black Hand French Mirage

Plum City - (AbelDanger.net): United States Marine Field McConnell has linked way points which put Andreas Lubitz's Airbus 320 on a potential collision course with the Serre-Ponçon dam, to Serco's alleged use of a Base One Technologies' onion router (tor) to relay ad hoc way points via French Mirage fighters and deflect Lubitz’s plane into a crash site about 20 km from the dam.

To the idiots out there who might say "Oh, the conspiracy crowd solved this before a single investigator arrived at the crash scene:" There are only a few things you need to know to solve this one, the rest is just scammery:

1. The plane descended for 10 minutes, and NO WORD FROM THE PILOTS. How can that happen? Jamming of communications. Who could have jammed communications?

2. The fighter jets, which were following this Airbus. THEY could have jammed the communications with ease, AND shot it down. They probably did not shoot it down OR EVEN NEED TO JAM COMMUNICATIONS because:

3. The plane was equipped with remote control (for “hijack recovery”) AS A STANDARD FEATURE. That level of external control would make switching off communications via remote control a NO BRAINER.

NO CONTACT WITH THE TOWER SAYS IT ALL; A REMOTE CONTROLLED CRASH REALLY IS THE OVERWHELMING ANSWER.

Why would fighter jets be following at just the right time anyway? That alone CINCHES IT. We really do need to figure out who was on that plane.

BUSTED: CENSORSHIP OF NEWS PROVES THE FIGHTER JETS DID INDEED DOWN THIS GERMAN AIRCRAFT, IF THEY DID NOT, WHY EXPUNGE THE NEWS OF THEIR PRESENCE?"

"We may never know exactly what really happened. The memory chip of the second black box recording flight data was missing, something which in itself is very odd. .. If the plane did crash, the cause may have been the hacking of the computer system during the repairs the day prior to the flight. The three French Mirage planes could have jammed the electronic communication and control system. Also, odd is the alleged appearance of an Italian fighter jet near the alsp, which squawked on the emergency channel of the Airbus the very time when radio contact was lost.”

"ouise attaque a dit… Bonjour à tous. Il me semble que le barrage de Serre-Ponçon, le plus grand barrage en terre d’Europe qui contient la plus importante retenue d’eau de France (lac artificiel de Serre-Ponçon) se situe sur la trajectoire de vol de l’A320. Le crash a eu lieu à seulement une vingtaine de kilomètre à vol d’oiseau du barrage. Je n’ose imaginer le nombre de morts supplémentaires si l’impact avait dû avoir lieu contre le barrage."
McConnell claims that Serco and its protégé Base One converted the U.S Naval Research Lab's onion router into a patent thicket where devices accessible to State Department and Serco Black Hand navigators, could relay ad hoc waypoint into aircraft targeted for a crash (cf. United 93).

McConnell notes Serco (the world's largest air traffic controller) filed a tor patent application in 1998 and processed a 2 millionth patent application for the U.S. Patent and Trademark Office in March 2013 giving its Base One protégé and Black Hand navigators ample opportunities to hack military chains of command, crash passenger planes and remove evidence from crime scenes.

Black Hand*Serco navigators' using the British Crown's "Patent Rights to Track, Film and Kill" from the City of London's Honourable Artillery Company 1537; The Master Mariners and The Air Pilots (formerly GAPAN) 1929, and The Ancient and Honorable Artillery Company of Massachusetts 1638 – whose alumni include U.S. Presidents James Monroe, Chester Alan Arthur, Calvin Coolidge and John F. Kennedy and – perhaps – Barack 'Down Low' Obama.

McConnell (30 year airline and 22 year military pilot with 23,000 hours of safety) is offering his expert-witness services to explain the apparent role of Serco and its Base One onion router in the deflection of Lubitz's plane into a crash scene about 20 km from le barrage de Serre-Ponçon.

Prequel #1: TRIAL BY MEDIA: co-pilot Andreas Lubitz - Abel Danger In Germany - Field McConnell besucht Deutschland - Der Whistleblower der Luftfahrtindustrie, Field McConnell - The Hegelian Odyssey of Andreas Lubitz Continues - SHOT DOWN 4U9525 UNITES FRANCE & GERMANY

Prequel 2: #2324: Marine Links FAA Fuddy To Huerta Hack By Base One Tor, Black Hand Deaths By Serco Towers


Serco... Would you like to know more? 

SWISSLEAKS - "HSBC developed dangerous clients:
 arms merchants, drug dealers, terrorism financers"
 

Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! (Mobile Playback Version) 
[Note that HSBC is Serco's banker and, with Allianz and Her Majesty's Government, one of Serco's major shareholders ] 

"UPDATE: DID THE GERMANWINGS AIRBUS REALLY CRASH?
There are many theories circulating about why a Germanwings Airbus crashed in the French Alps.

The latest theory offered by French prosecutors, allegedly based on the retrieval of a damaged voice recorder, is that the pilot was locked out of the cockpit by a suicidal co pilot, Andreas Lubitz.

Yet this version raises many questions, especially as it has emerged that the Airbus’ glide to destruction ‘took 18 minutes and not 8′.
 
Given the total communication blackout for 18 minutes and given the disappearance of the Airbus from the radar screen in the final six minutes, can we really be sure the Airbus crashed at all? Can we really be sure the debris shown to us on TV comes from the Airbus? Crucially, the  memory card of the flight recorder black box was missing. What motive might anyone have for taking the memory card as appears to have happened? 
In addition, a mountain guide and witness reports hearing no explosion on impact. Shouldn t a plane on the start of its journey to Dusseldorf and still packed with jet fuel explode with lots of noise, smoke and fire?
 
Even if the Airbus did crash, a glide for eighteen minutes is a long time, time enough for passengers and crew to send text messages or make calls. Yet none did. How can this be explained?
 
Why didn t the pilot, who was allegedly locked out of the cockpit,  use, for example, a mobile or emergency phone to raise the alarm during those 18 minutes?

Why, in fact, did none of the 144 passengers in the plane use their phones to call or text their relatives as soon as they realised there was a problem with the cockpit and the plane was plunging towards earth at the rate of one kilometre per minute?

The claim that the passengers only realized at the last moment what was happening is not plausible. 

Passengers must have heard the pilot trying to hammer down the cockpit door if these sounds are indeed on the voice recorder retrieved from the wreckage as French prosecutors claim. They must have seen the way the  plane was rapidly losing altitude and passed through the cloud cover. They must have seen the mountain range below looming closer and closer. They must also, surely, have seen the three French Mirage fighter jets, sent up by air traffic control, and which circled the plane within minutes.

A 3D video of the Germanwings descent gives us some idea of what the passengers experienced.

Bear in mind, there were school children on board. Even if the adults remained calm, the children, unaccompanied by their parents, certainly wouldn t have. As soon as they saw the Mirage jets, the children would have started getting excited, shouting and texting their parents.

The real puzzle in all this is why none of the 144 passengers or crew sent any text messages during a plunge lasting 18 minutes.

As mentioned, in a perilous situation like this, the first instinct of everyone, especially school children is, surely, to grab their mobile phones and sms or text their relatives. But there are no reports of any messages received by relatives. The parents of the German school children heard of the crash from the director of the local school and airport officials, according to media.

The story of the co pilot Andreas Lubitz is also curious. He gave no sign of being troubled and had cleared all tests of his flightworthiness, according to his employers and German media reports.

Lubitz was allegedly treated for burnout and depression six years ago. That means, he was able to articulate feelings of burnout and depression, and recognize its symptoms. Yet he gave no warning he was so desperate as to consider not just suicide but mass murder. http://www.bild.de/news/ausland/flug-4u9525/merkel-zur-neuen-4u9525-entwicklung-40315988.bild.html

 If Lubitz was gripped by a sudden murderous, suicidal death wish, why did he choose to glide to destruction on autopilot for 18 minutes? And if he was in such inner turmoil and could hear the other pilot banging on the door to gain entry, why didn t he wrestle with the controls and computer systems and try to crash the plane headlong into the mountains more quickly? Wouldn t there have been a more erratic emergency descent, the fuel cut or some other action more likely to bring the plane down quickly to avert the risk that the other pilot, crew members and passengers would succeed in breaking down the door or cracking the code, entering the cockpit and stopping the descent in the 18 minutes that it took?

Cabin crew can gain entry to the cockpit in an emergency. A pilot can only override this access for between five to 20 minutes, according to media.

So, the glide to destruction took almost the maximum time that Lubitz could conceivably have overriden the emergency access code. Would he have taken the risk of the door springing open?

In addtion, for all Lubitz knew the door could have slid open any moment, allowing people to enter the cockpit. In this high pressure situation, surely the instinct of any suicidal, impulsive maniac is to shift to manual control and point the nose of the plane straight down. A suicidal, impulsive maniac with people hammering on the cockpit door and his ability to override the emergency access code restricted to at most 20 minutes  would not choose to glide down for 18 minutes. That does not add up.

According to the French officials, Lubitz said nothing. That s possible but more likely is that he would shout out something in the heat of the moment, especially as the impact with sheer rock face was imminent  like 

"What have I done?"

The official version is like a one dimensional film script. People behave differently in real life.
T
he complete lack of all communications from the pilot and passengers suggests, more than anything else, that the plane s computer system was indeed hacked. If the electronic communications systems were jammed that would explain why there were no communications from the pilot and co pilot, passengers or crew.
 
Yet, the French investigators are claiming that is what happened until the last moments when screaming can be heard.
 
We may never know exactly what really happened. The memory chip of the second black box recording flight data was missing, something which in itself is very odd.
 
If the plane did crash, the cause may have been the hacking of the computer system during the reparis the day prior to the flight. The three French Mirage planes could have jammed the electronic communication and control system.
 
Also, odd is the alleged appearance of an Italian fighter jet near the alsp, which squawked on the emergency channel of the Airbus the very time when radio contact was lost.

Well, check back through FR24. MM7168 at 09.35 (GMT) shouted 7700 near the alps. M7168 (NOT the Airbus) squawks 7700 at 09:35 GMT, which is 10:35am Central European Time (Promise!) just to the East in Northern Italy.

Another theory is that CERN was involved. CERN shut down hours after Germanwings crash. Is there a connection asks Kev Baker?https://www.youtube.com/watch?v=obuDgxn49fE "Smashing protons at such high energy and speed causes electro magnetic lightnings which can travel far. The plane was hit by abnormally strong electro magnetic pulse which disabled crafts engines. US army already have this as a weapon in smaller version. " Reply · 7

Whatever the explanation, the French prosecutors’ version does not add up. It assumes complete passivity and silence on the part of 148 other people on board the plane as they crashed with terrifying speed to their death in the Alps.

In real life, danger releases adrenaline, which converts into action, sending an sms, talking, planning, crying, screaming banging on a door, finding a lever to smash a door etc.

Just imagine how you ould react. Imagine it s you who are in a plane plunging into the Alps with a pilot banging furiously at the cockpit door and shouting at the co pilot to open it in German, a language you understand. What would you do? Imagine you look outside the window and see the plane entering the clouds, and then exiting the clouds. Imagine you hear a roar and see Mirage fighter jets flying parallel, so close you can see the markings on the fusilage and the pilot in his cockpit. The mission of the Mirage fighter jets was to ascertain what was wrong with the plane, so these planes would have flown close to the Airbus to make a visual inspection of the cockpit area especially. Imagine that as the plane drops down into the valley, you start to see peaks towering above you. Would you really sit in silence through all this and for 18 minutes just screaming seconds before impact?"

"Base One Technologies …. N/WAN Design
Provide an IP based Network Solution in response to an RFI from the FAA (Federal Aviation Agency) to re-engineer their existing networks (FTI 2000).
Responsible for providing and demonstrating the capabilities of an IP Network Architectural Design including a Disaster Recover Solution in response to an RFI for the FAA to upgrade or replace their current Mission Critical Network in the United States.
Responsible for providing a solution and a plan to transition the FAA’s current X.25 environment to the proposed IP (BGP/OSPF) network.
 
Challenging performance requirements, such high availability (99.9997%) with very strict and aggressive Mean-Time-To-Recover (6 seconds), were exceeded or met. Using Networking solutions from Nortel Networks and Cisco Systems, we provided a highly scaleable, deterministic and secured IP network running over ATM. FT1/T1 was provided in areas where ATM was not available. ISDN dial backup and dial-on-demand routing were used to increase availability and enhance MTTR. User connectivity was provided with Hot-Standby-Routing-Protocol (HSRP) through robust and highly available Cisco Catalyst switches.
Responsible for providing a security solution included for the entire network using technologies such as Nokia/CheckPoint Firewall, Cylink ATM DS3, T1/FT1 & ISDN Encryptors, and Dragon LAN based Intrusion Detection Systems.
Network Design and Installation
Provided an integrated Network Management Platform solution to monitor the entire proposed network. Management solution included HP OpenView, HP NetMetrix, NAI Distributed Sniffers, CiscoWorks2000, Preside Multiservice Data Manager, etc.
Provided a prototype lab using loaned equipment from major network device vendors. The equipment included Nortel Networks WAN Passport Switches, Cisco Systems Routers and LAN Switches, Adtran ISDN PRI/BRI simulators/switches, in addition to security and network management hardware and software.
Provided a Proof-of-Concept presentation to MCI/WorldCom and the FAA representatives to demonstrate the capabilities of the proposed Network Architecture.
Enterprise Resource Planning
Carefully reviewed the RFI submitted by the Federal Agency of Aviation. Produced lists of questions on items that needed clarifications and submit to FAA. Reviewed all responses and adjust our proposals accordingly.
Managed all loaned personnel who assisted in installing, maintaining, configuring and documenting loaned hardware and software."

"Serco Awarded $187 Million Federal Aviation Administration Contracts

Date : 16 April 2015

Serco Inc., a provider of professional, technology and managed services, announced today the award of two contracts to continue its 20-plus years of supporting the Federal Aviation Administration's (FAA) Contract Tower (FCT) Program. Serco will provide air traffic control specialists, safety managers, and program management services in support of 58 Air Traffic Control Towers (ATCTs) in 11 western states, including Alaska, California and Colorado. The two five-year contracts each have one base year and four one-year option periods, with a combined value of $187 million, if all options are exercised.

Under these contracts, Serco's Air Traffic Controllers will be responsible for the safe and efficient movement of commercial, general aviation and military aircraft on the airport and in the airspace surrounding the airport.  The Company will also provide risk management, quality assurance and program management to meet FAA service standards and quality metrics.  Serco will utilise its Aviation Safety Management System to improve safety and mitigate risks in the National Airspace System.

"Air Traffic Control Towers provide vital services ensuring that airports are safer for pilots and passengers at airports across the country." said Dan Allen, Serco Inc.'s Chairman and Chief Executive officer. "As experts in aviation and management solutions, we are honored and eager to continue supporting the FAA in 2015 and beyond."

As part of Serco Group, one of the largest contracted providers of Air Navigation Services worldwide, the company is responsible for more than 960,000 miles of airspace and handles more than seven million aircraft movements a year. Serco employs more than 700 air traffic control specialists at over 75 airports - located in the U.S., U.K. and Middle East - who help maintain flight safety. In the US, the company has also been honored with the prestigious Willie F. Card Federal Aviation Administration (FAA) Contract Tower Award at towers in Lewiston, ID, Phoenix-Mesa Gateway, AZ, Jackson Hole, WY, Goodyear, AZ, and San Luis Obispo, CA."

"Onion routing network for securely moving data through communication networks
US 6266704 B1
ABSTRACT The onion routing network is used to protect Internet initiators and responders against both eavesdropping and traffic analysis from other users of the Internet. In the onion routing of the invention, instead of making connections directly to a responding machine, users make connections through onion routers. The onion routing network allows the connection between the initiator and responder to remain anonymous. Anonymous connections hide who is connected to whom and for what purpose from outside eavesdroppers."

"The best security: A trip through The Onion Router How TOR works. Courtesy TOR Project. Published: April 24, 2013, 11:38 am .. Before the Internet, people flocked to secret and well-hidden underground markets to purchase either illegal or morally questionable items. With the birth of the Internet, unlimited access to these items from around the world became a reality. The issue was creating a tunnel to transfer anything from heroin to full libraries of downloaded books, from one part of the world to the next securely and secretly. Enter Tor. The U.S Naval Research Lab created Tor, or The Onion Router, as an experiment in 1996. The lab has been studying different methods of carrying out anonymous communication between governments for years. The result was the original Tor network. .. Perhaps what Tor has become most well known for, though, is the Silk Road. Run by an anonymous individual who refers to themselves only as the Dread Pirate Roberts, the Silk Road is a highly illegal and highly profitable passageway for very illegal items. Buyers can purchase pounds of heroin or an arsenal and have it delivered to their home without leaving a trace. Discussions take place on a huge number of Tor forums daily between drug dealers from around the world discussing the latest trends and their future purchases. .. It may have been underground at one point, but it is no longer just a whisper in the dark forums of the Internet’s underbelly. It’s become a tool for activists, hackers, drug dealers, and curious minds. It’s the beginning of a line of networks that will become commonplace very soon. .. © COPYRIGHT - POSTMEDIA NEWS"

"Hillary wiped her server clean: As NBC’s Kristen Welker reported over the weekend, the top Republican investigating the 2012 Benghazi attack, Rep. Trey Gowdy (R-SC), revealed that Hillary Clinton had wiped her server clean of her emails. “Clinton’s attorney, David Kendall, said Gowdy was looking in the wrong place," the AP says. "In a six-page letter released late Friday, Kendall said Clinton had turned over to the State Department all work-related emails sent or received during her tenure as secretary of state from 2009 to 2013. 'The Department of State is therefore in possession of all Secretary Clinton's work-related emails from the (personal email) account,' Kendall wrote." Here's the "Meet the Press" discussion over the Clinton emails."

"[Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994.This file was obtained from the Secretary of State and has a file number of 1795583] Expertly researches, designs, and develops information security policies that protect your data and manage your firm's information technology risk at levels acceptable to your business. Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report. Develops and implements multi-layer Information Security Solutions, practices and procedures. We deploy Intrusion Detection Systems (IDS) and IP Security with VPN solutions using Cisco routers, Frame Relay, firewalls, address and port translation, obscurity standards and authentication technologies (AAA, 3DES, TACACS, etcŠ), to enhance and meet the level of Data Security required for global organizations. Conducts IT Security and Risk Assessment in Federal government as well as security testing, implementing security for multiple platforms and operating systems around the world. Ability to conduct business process analysis to provide technical security countermeasures, risk management and data communications security planning for large organizations. Provides computer security integration for web server and traditional client-server based applications. We secure environments up to as many layers as required by our clients' policies, industry practices, and regulating bodies - including the desktop and user experience as required. Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions.
 
"SOURCE: Base One Technologies September 02, 2008 09:00 ET Base One Technologies, Inc. Continues Operations in Government Space NEW ROCHELLE, NY--(Marketwire - September 2, 2008) - Base One Technologies, Inc. is pleased to announce that it has sold its affiliate, Base One Technologies Ltd., to Apptis Inc. Base One Technologies, Inc. will continue to compete in the government space as an 8(a), HubZone and Woman Owned Small Disadvantage Company. Base One Technologies, Inc. is an IT Engineering and Technical Services company founded in 1994. Base One has a Top Secret Facilities Clearance and specializes in: Enterprise Architecture, Network Infrastructure Support, Data Security, Software & Database Services, Disaster Recovery & Contingency Planning, and Independent Validation & Verification. Base One is a privately-held organization with headquarters in New Rochelle, NY. For more information visit: www.base-one.com. Contact Information: Liza R. Zaneri Base One Technologies 914 633-0200 x205 “www.base-one.com"

"Serco's Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals." 

Yours sincerely,

Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222

David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation

10 comments:

  1. Another flight that stands out; Air Algérie flight 5017. The crew wanted to avoid a severe thunderstorm (Meso Covective System) and crashed into the desert. The Voice recorder was damaged and unusable, it did record conversations, but didn't erase previous ones so all recordings were mixed..... Passengers? A Senior Hezbollah leader was on board. People also thought that the Cuban President's daughter Mariela Castro (Fidel Castro's niece) was on board but that was untrue. A lot of the recent plane crashes and the cause information given seem suspicious. What about Fly by Wire and Boeing Uninterruptible Auto Pilot System that can be hacked, what about intended assassination of certain peeps... Is all of this a simple puzzle to make when one ignores the sensational misleading mass media?!

    ReplyDelete
  2. Very good place for google play gift card codes which is easily available from this website. Thanks.

    ReplyDelete
  3. I haven't any word to appreciate this post ... Really i am impressed from this post ... the person who create this post it was a great human. thanks for shared this with us.

    ReplyDelete
  4. A good headset like a new car, we need to pre constantly running, in order to play the best performance beats by dre, and even more durable. Noisy of environments, sound, strong, high sound pressure, a long time can cause hearing damage Ah. Quiet environment can reduce people exchanges require sound intensity, gently talk to each other you can hear very clearly. Ear beats by dre earbuds effectively cut off from the outside world due to the noise, and when you hear music with satisfaction when you listen to the voice than usual intensity is much lower, with a beats headphones will minimize harm.

    ReplyDelete
  5. www.CoachFactoryOutlet.com There, Michael Kors Outlet Online are, Coach Outlet certain bags that, Coach Factory Outlet Online immediately, Coach Factory outlet catch, christian louboutin outlet online your eye and are identifiable as particular designer, toms outlet off the bat. To, Coach Outlet Store Online accomplish that, valentino shoes some, Michael Kors Outlet Online brands, Michael Kors Outlet Online use a classic monogram, others with, Michael Kors Outlet Online Michael Kors Outlet Clearance Sale.signature, ray ban sunglasses hardware, Coach Factory outlet and many have shapes that jump out, Michael Kors Outlet immediately Coach Factory Outlet as,
    oakley sunglasses outlet Cheap 90% OFF USA Sale!
    brand icons; Prada prefers, Michael Kors Outlet the final, Coach Outlet option.During his 16-year, Coach Factory Outlet Online tenure, Tiffany and co at the helm of Louis Vuitton, ralph lauren outlet Marc Jacobs tended to, ray ban sunglasses experiment, valentino rockstud shoes with prints in a few, marc jacobs outlet specific, valentino rockstud shoes ways;, hermes birkin outlet either he went for, Michael Kors Outlet straightforward takes on the, hermes bag brand's iconic

    ReplyDelete

Who's visiting Abel Danger
view a larger version of the map below at whos.amung.us

You Too can be a CAPTAIN SHERLOCK