"McConnell infers his ConAir Sister Marcy's decoy and evidence-emoval role in the Murrah Building bombing http://www.ufomind.com/area51/list/1997/jan/a07-008.shtml "Con-Air" in 1/6 San Diego Union Tribune Nichols and McVeigh were transported in the dead of night in an operation much akin to a clandestine military operation, Little said. He did not want to go into details but mentioned that a decoy plane was among the ploys used to guard against possible attempts by supporters to free the suspects. Federal officials have always been circumspect about the fine points of prisoner movement. But ConAir soon could gain a higher public profile with the planned release in June of a movie by the same name. In the Disney film, Nicolas Cage plays a hapless prisoner who wanders into a hijack plot aboard a Marshals Service plane carrying a group of high-security inmates. The Hollywood marshals rough up some of the prisoners, and the plane crashes, leaving the real Marshals Service frowning on the silver screen's invention, said Kristine Marcy, a top official in charge of detentions [and decoy contract hits]. "We don't beat up our prisoners, and our planes certainly don't crash," Marcy said on a recent trip to San Diego, where she was trying to find more jail space for federal prisoners."
"Benton K. Partin Brigadier Gen. USAF (Ret.)
8908 Captains Row
Alexandria, Virginia 22308
July 30, 1995
Sen. Trent Lott
United States Senate
487 Senate Russell Office Building
Dear Sen. Lott:
The attached report contains conclusive proof that the bombing of the Alfred P. Murrah Federal Building, Oklahoma City, Oklahoma, was not caused solely by the truck bomb. Evidence shows that the massive destruction was primarily the result of four demolition charges placed at critical structural points at the third floor level.
… Both the Federal Building in Oklahoma and the Trade Center in New York (See New York Times, October 28, 1993, p. A1) show evidence of a counterterrorism sting gone wrong.
No government law enforcement agency should be permitted to demolish, smash and bury evidence of a counterterrorism sting operation, sabotage or terrorist attack without a thorough examination by an independent, technically competent agency.
If an aircraft crashed because of a bomb, or a counterterrorism sting or an FAA Controller error, the FAA would not be permitted to gather and bury the evidence. The National Transportation Safety Board would have been called in to conduct an investigation and where possible every piece of debris would have been collected and arrayed to determine cause of failure.
To remove all ambiguity with respect to the use of supplementary demolition charges, the FBI should be required to release the high quality surveillance color TV camera tape of the Murrah building bombing on April 19, 1995.
It is my observation that the effort required to bomb the A. P. Murrah Federal Building in Oklahoma City pales in comparison with the effort to cover up evidence in Oklahoma and the media's withholding of vital information from the American people. …
Resume of Brig. Gen. Benton R. Partin USAF (Ret.)
OKC Bomb Report Index Page"
"ouise attaque a dit… Bonjour à tous. Il me semble que le barrage de Serre-Ponçon, le plus grand barrage en terre d'Europe qui contient la plus importante retenue d'eau de France (lac artificiel de Serre-Ponçon) se situe sur la trajectoire de vol de l'A320. Le crash a eu lieu à seulement une vingtaine de kilomètre à vol d'oiseau du barrage. Je n'ose imaginer le nombre de morts supplémentaires si l'impact avait dû avoir lieu contre le barrage."
"Serco's Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals."
"Dark web ethnographic method Because this is an ethnography of a dark web SNS, there were several methodological challenges. The dark web is different from the "clear web" in important ways. The dark web is part of the Internet that cannot be accessed by mainstream software.1 It includes hidden sites that end in ".onion" or ".i2p" or other Top-Level Domain names only available through modified browsers or special software. Accessing I2P sites requires a special routing program. Accessing non-mainstream Top-Level Domains through OpenNIC requires the user to change the DNS server addresses on his or her router. Accessing .onion sites requires Tor (for a tutorial on Tor and .onions, see Hoffman (2012)). Moreover, those who run dark websites that end in .onion are able to hide their identities and locations from most, if not all."McConnell notes his sister's Senior Executive Service launched both ConAir and the Serco protégé company, Base One Technologies, in 1994 when Serco (the world's largest air traffic controller) began building State Department honeypots through backdoor operations of the U.S. National Visa Center, the U.S. Patent and Trademark Office -- onion router patent published July 2001 -- and FAA Contract Towers.
McConnell claims that his sister's Senior Executive Service ordered Serco and its Base One protégé to transfer the U.S Naval Research Lab's onion router networks into the custody of her Conair and FAA managers so they could use the FAA's global ad-hoc signal paths to trigger bombs in the Murrah Building and drone Lubitz's Airbus and ensure both crime scenes were cleared of onion router evidence.
McConnell claims that his sister's Senior Executive Service allows Serco (formerly RCA GB 1929) to operate under Crown Rights rules where Conair practises any patent issued including using FAA onion routers or Boeing Uninterruptible Autopilots to trigger Black Hand hacks of passenger planes or bombs in WTC#7, NYC, or the Murrah Building in OKC.
Black Hand* – Serco navigators' using the British Crown's "Patent Rights to Track, Film and Kill" from the City of London's Honourable Artillery Company 1537; The Master Mariners and The Air Pilots (formerly GAPAN) 1929, and The Ancient and Honorable Artillery Company of Massachusetts 1638 – whose alumni include U.S. Presidents James Monroe, Chester Alan Arthur, Calvin Coolidge and John F. Kennedy and – perhaps – Barack 'Down Low' Obama.
While in London, England on Saturday, 11 April, 2015, Field McConnell was urged by a publisher to write his life story and his book, "Honor Thy Parents" will be available on Amazon.com by 11 September, 2015.
Prequel 1: #2328: Marine Links Serco's Clinton State Of Treason To FAA Base One Onion Router, Black Hand Lubitz Dam
Prequel 2: Letter from Gen. Partin to U.S. Sen. Trent Lott
Prequel 3: TRIAL BY MEDIA: co-pilot Andreas Lubitz - Abel Danger In Germany - Field McConnell besucht Deutschland - Der Whistleblower der Luftfahrtindustrie, Field McConnell - The Hegelian Odyssey of Andreas Lubitz Continues - SHOT DOWN 4U9525 UNITES FRANCE & GERMANY
Trailer - Con Air (1997)
Oklahoma City Bombing News Reports: Unexploded bombs found in the Murrah building!
Black box fligh recorder airbus a320 4u 9525 GermanWings aircrash - Andreas Lubitz pilot
Serco... Would you like to know more?
SWISSLEAKS - "HSBC developed dangerous clients:
arms merchants, drug dealers, terrorism financers"
Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! (Mobile Playback Version)
[Note that HSBC is Serco's banker and, with Allianz and Her Majesty's Government, one of Serco's major shareholders ]
"We may never know exactly what really happened. The memory chip of the second black box recording flight data was missing, something which in itself is very odd. .. If the plane did crash, the cause may have been the hacking of the computer system during the repairs the day prior to the flight. The three French Mirage planes could have jammed the electronic communication and control system. Also, odd is the alleged appearance of an Italian fighter jet near the alsp, which squawked on the emergency channel of the Airbus the very time when radio contact was lost."
"UNTOUCHED POSSIBILITIES OF THE GERMANWINGS CRASH
Another commercial plane went down and again the blame is on the pilot. The Germanwings 9525, an Airbus A320-211, crashed into the Alps mountains after what is being defined as a constant descent, beginning few minutes after a routine contact with air traffic control. I sincerely believe, this accident has more to do with the aircraft than the pilot. Here are the reasons why I do not buy the 'Crazy-Pilot' theory.
This time, instead of waiting for the media to speculate, the Crisis-Management efforts have efficiently used the media elements to prevent the general public from thinking anywhere near the actual root-cause of the incident.
Firstly, the very fact that the prosecutors' claims are being published as key findings and then publishing the findings as support indicates that this effort is avoiding the acceptance and analysis of possibilities that will indicate the mistake of individuals other than the flight crew.
How did a German media-house get hold of cockpit voice recording (or its transcript) at a time when no such information was officially released? If the report was alleged and the claim unsupported by facts of the leak, what actions are being taken against the German media-house that published such a report? [Nobody will talk about it because it probably was a paid media campaign] ….
In my view, the aircraft was an aging platform, well near or over its design operational life and it might have been subjected to a very questionable ‘Life-Extension-Program’ which in part or full might have rendered the aircraft vulnerable to multiple unidentified failure modes, one of which struck the aircraft during its final flight that ended in the crash. The Life-Extension-Program was approved by EASA but FAA refused to allow its inclusion at one point of time. If one regulator finds enough evidence to agree why does another find enough evidence to disagree? What does that tell about the very viability of the Life-Extension-Program and its impact on the aircraft it is approved for, irrespective of its full/partial implementation?
The possibility of co-pilot deliberately crashing the plane is a story being cooked up to cover up this incident so as to protect multiple commercial interests. In the end, as it turns out, pilots can no longer divulge their health issues or personal fronts to their managements as those details will be cleverly used against them, when they are not even alive to defend their stand.
At this point I am even curious to learn if those individuals who get angry at speculators online (and drag the discussion to the most insignificant bolt on the plane) might be part of a specially constituted online-clean-up team reporting to the crisis-management team that is trying to keep operator, manufacturer, maintainer and the regulator from any possible blame, every time a plane goes down (debris recovery is irrelevant here).
How in the world do these stakeholders remain untouched while pilots alone get blamed for 'tendencies' and 'depressions' based on what everyone proudly calls 'initial reports’?????
The lack of exceptions in this trend is what keeps me wondering what really happens to these untouched possibilities of plane crashes."
"Base One Technologies "[DOMESTIC BUSINESS CORPORATION, located in New Rochelle, NY and was formed on Feb 15, 1994.This file was obtained from the [Clinton] Secretary of State and has a file number of 1795583] …. N/WAN Design Provide an IP based Network Solution in response to an RFI from the FAA (Federal Aviation Agency) to re-engineer their existing networks (FTI 2000). .. Responsible for providing and demonstrating the capabilities of an IP Network Architectural Design including a Disaster Recover Solution in response to an RFI for the FAA to upgrade or replace their current Mission Critical Network in the United States [allegedly to prepare for the attacks of 9/11] … Responsible for providing a security solution included for the entire network using technologies such as Nokia/CheckPoint Firewall, Cylink ATM DS3, T1/FT1 & ISDN Encryptors, and Dragon LAN based Intrusion Detection Systems. .. Managed [Clinton war room for] all loaned personnel who assisted in installing, maintaining, configuring and documenting loaned hardware and software."
"Meanwhile United 93 reaches cruising altitude of 35,000 feet and as the passengers relax and are being served breakfast the terrorists wait for the right moment to hijack the plane. After al-Haznawi returns from a toilet wearing an artificial bomb around his torso al-Ghamdi holds one of the flight attendants Debbie Welsh at knife point while the passengers are moved to the rear of the plane after al-Haznawi displays the "bomb." Both Jarrah and al-Ghamdi force Debbie to let them into the cockpit and both pilots as well as Debbie are murdered. Jarrah then takes over as the pilot and claims they have 50 minutes left to live as he flies the plane for their chosen target which is implied to be the Capitol Building. However the passengers decide to save themselves after discovering that the pilots are dead as well as learning via air phones the World Trade Center and Pentagon have been struck. After coming up with a plan and praying, the passengers attempt to take back the airplane. After al-Haznawi is killed al-Nami warns Jarrah and al-Ghamdi and despite his vain attempts to delay the passengers he is killed after Jeremy Glick snaps his neck. The male passengers frantically break into the cockpit and attempt to land the plane but Jarrah manages to turn the plane upside down before the aircraft crashes into Pennsylvania and the scene fades out implying everyone on board has been killed instantly."
"I remember a long time ago (2002) when some of the actions of the hijackers of the September 11 planes, namely the United 93 one, included trying to turn off the autopilot several times, then re-engaging it (at which point it returned to it cruise altitude and course). Apparently on the 'transmissions' they made over the ATC frequency (telling the "Air Traffic Controller" to sit down and remain calm and remain seated) there was the Autopilot disconnect horn going off in the background. This was also shown in Paul Greengrass' movie United 93 with the actor playing Ziad Jarrah (UAL93 hijacker pilot) trying desperate to silence the Autopilot alarm by pressing random buttons, (Including the "engage autopilot" Button) and not getting anywhere. The alarm continues wailing for several minutes through the cockpit scenes in the movie. Later he decides that he will "Descend to speed up", thereby increasing the aircraft's Indicated airspeed (into Overspeed clacker warning) but ultimately decreasing the aircraft's Ground speed and Mach (ie: he actually slowed due to not understanding what Indicated Airspeed is). Maybe these details make me more annoyed/angry at n00bs than I would otherwise be, since they seem to have the same misconceptions about the operation of airliners that the movie (and possibly real) UAL93 hijackers did."
"Base One Technologies …. N/WAN Design Provide an IP based Network Solution in response to an RFI from the FAA (Federal Aviation Agency) to re-engineer their existing networks (FTI 2000). .. Responsible for providing and demonstrating the capabilities of an IP Network Architectural Design including a Disaster Recover Solution in response to an RFI for the FAA to upgrade or replace their current Mission Critical Network in the United States. Responsible for providing a solution and a plan to transition the FAA’s current X.25 environment to the proposed IP (BGP/OSPF) network. Challenging performance requirements, such high availability (99.9997%) with very strict and aggressive Mean-Time-To-Recover (6 seconds), were exceeded or met. Using Networking solutions from Nortel Networks and Cisco Systems, we provided a highly scaleable, deterministic and secured IP network running over ATM. FT1/T1 was provided in areas where ATM was not available. ISDN dial backup and dial-on-demand routing were used to increase availability and enhance MTTR. User connectivity was provided with Hot-Standby-Routing-Protocol (HSRP) through robust and highly available Cisco Catalyst switches. Responsible for providing a security solution included for the entire network using technologies such as Nokia/CheckPoint Firewall, Cylink ATM DS3, T1/FT1 & ISDN Encryptors, and Dragon LAN based Intrusion Detection Systems. .. Managed all loaned personnel who assisted in installing, maintaining, configuring and documenting loaned hardware and software." …
"[Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994.This file was obtained from the [Clinton] Secretary of State and has a file number of 1795583] .. Conducts IT Security and Risk Assessment in Federal government as well as security testing, implementing security for multiple platforms and operating systems around the world ... Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions."
“SOURCE: Base One Technologies September 02, 2008 09:00 ET Base One Technologies, Inc. Continues Operations in Government Space NEW ROCHELLE, NY--(Marketwire - September 2, 2008) - Base One Technologies, Inc. is pleased to announce that it has sold its affiliate, Base One Technologies Ltd., to Apptis Inc. Base One Technologies, Inc. will continue to compete in the government space as an 8(a), HubZone and Woman Owned Small Disadvantage Company. Base One Technologies, Inc. is an IT Engineering and Technical Services company founded in 1994. Base One has a Top Secret Facilities Clearance and specializes in: Enterprise Architecture, Network Infrastructure Support, Data Security, Software & Database Services, Disaster Recovery & Contingency Planning, and Independent Validation & Verification. Base One is a privately-held organization with headquarters in New Rochelle, NY. For more information visit: www.base-one.com. Contact Information: Liza R. Zaneri Base One Technologies 914 633-0200 x205 "www.base-one.com"
"Serco Awarded $187 Million Federal Aviation Administration Contracts
Date : 16 April 2015
Serco Inc., a provider of professional, technology and managed services, announced today the award of two contracts to continue its 20-plus years of supporting the Federal Aviation Administration's (FAA) Contract Tower (FCT) Program. Serco will provide air traffic control specialists, safety managers, and program management services in support of 58 Air Traffic Control Towers (ATCTs) in 11 western states, including Alaska, California and Colorado. The two five-year contracts each have one base year and four one-year option periods, with a combined value of $187 million, if all options are exercised.
Under these contracts, Serco's Air Traffic Controllers will be responsible for the safe and efficient movement of commercial, general aviation and military aircraft on the airport and in the airspace surrounding the airport. The Company will also provide risk management, quality assurance and program management to meet FAA service standards and quality metrics. Serco will utilise its Aviation Safety Management System to improve safety and mitigate risks in the National Airspace System.
"Air Traffic Control Towers provide vital services ensuring that airports are safer for pilots and passengers at airports across the country." said Dan Allen, Serco Inc.'s Chairman and Chief Executive officer. "As experts in aviation and management solutions, we are honored and eager to continue supporting the FAA in 2015 and beyond."
As part of Serco Group, one of the largest contracted providers of Air Navigation Services worldwide, the company is responsible for more than 960,000 miles of airspace and handles more than seven million aircraft movements a year. Serco employs more than 700 air traffic control specialists at over 75 airports - located in the U.S., U.K. and Middle East - who help maintain flight safety. In the US, the company has also been honored with the prestigious Willie F. Card Federal Aviation Administration (FAA) Contract Tower Award at towers in Lewiston, ID, Phoenix-Mesa Gateway, AZ, Jackson Hole, WY, Goodyear, AZ, and San Luis Obispo, CA."
"Onion routing network for securely moving data through communication networks
US 6266704 B1 ABSTRACT The onion routing network is used to protect Internet initiators and responders against both eavesdropping and traffic analysis from other users of the Internet. In the onion routing of the invention, instead of making connections directly to a responding machine, users make connections through onion routers. The onion routing network allows the connection between the initiator and responder to remain anonymous. Anonymous connections hide who is connected to whom and for what purpose from outside eavesdroppers."
"The best security: A trip through The Onion Router How TOR works. Courtesy TOR Project. Published: April 24, 2013, 11:38 am .. Before the Internet, people flocked to secret and well-hidden underground markets to purchase either illegal or morally questionable items. With the birth of the Internet, unlimited access to these items from around the world became a reality. The issue was creating a tunnel to transfer anything from heroin to full libraries of downloaded books, from one part of the world to the next securely and secretly. Enter Tor. The U.S Naval Research Lab created Tor, or The Onion Router, as an experiment in 1996. The lab has been studying different methods of carrying out anonymous communication between governments for years. The result was the original Tor network. .. Perhaps what Tor has become most well known for, though, is the Silk Road. Run by an anonymous individual who refers to themselves only as the Dread Pirate Roberts, the Silk Road is a highly illegal and highly profitable passageway for very illegal items. Buyers can purchase pounds of heroin or an arsenal and have it delivered to their home without leaving a trace. Discussions take place on a huge number of Tor forums daily between drug dealers from around the world discussing the latest trends and their future purchases. .. It may have been underground at one point, but it is no longer just a whisper in the dark forums of the Internet's underbelly. It's become a tool for activists, hackers, drug dealers, and curious minds. It's the beginning of a line of networks that will become commonplace very soon. .. © COPYRIGHT - POSTMEDIA NEWS"
"Hillary wiped her server clean: As NBC’s Kristen Welker reported over the weekend, the top Republican investigating the 2012 Benghazi attack, Rep. Trey Gowdy (R-SC), revealed that Hillary Clinton had wiped her server clean of her emails. "Clinton’s attorney, David Kendall, said Gowdy was looking in the wrong place," the AP says. "In a six-page letter released late Friday, Kendall said Clinton had turned over to the State Department all work-related emails sent or received during her tenure as secretary of state from 2009 to 2013. 'The Department of State is therefore in possession of all Secretary Clinton's work-related emails from the (personal email) account,' Kendall wrote." Here's the "Meet the Press" discussion over the Clinton emails."
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation