"Hillary wiped her server clean: As NBC’s Kristen Welker reported over the weekend, the top Republican investigating the 2012 Benghazi attack, Rep. Trey Gowdy (R-SC), revealed that Hillary Clinton had wiped her server clean of her emails. "Clinton’s attorney, David Kendall, said Gowdy was looking in the wrong place," the AP says. "In a six-page letter released late Friday, Kendall said Clinton had turned over to the State Department all work-related emails sent or received during her tenure as secretary of state from 2009 to 2013. 'The Department of State is therefore in possession of all Secretary Clinton's work-related emails from the (personal email) account,' Kendall wrote." Here's the "Meet the Press" discussion over the Clinton emails."
"Serco's Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco [and its drug-hub Clinton-Foundation banker HSBC] mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals."
"Dark web ethnographic method Because this is an ethnography of a dark web SNS, there were several methodological challenges. The dark web is different from the "clear web" in important ways. The dark web is part of the Internet that cannot be accessed by mainstream software.1 It includes hidden sites that end in ".onion" or ".i2p" or other Top-Level Domain names only available through modified browsers or special software. Accessing I2P sites requires a special routing program. Accessing non-mainstream Top-Level Domains through OpenNIC requires the user to change the DNS server addresses on his or her router. Accessing .onion sites requires Tor (for a tutorial on Tor and .onions, see Hoffman (2012)). Moreover, those who run dark websites that end in .onion are able to hide their identities and locations from most, if not all."McConnell claims HSBC bribed Pentagon insiders to reassign the U.S Naval Research Lab's onion router patents to Serco (world's largest air traffic controller) which had allegedly had its Base One protégé install the server used by Hillary Clinton to authorize Black Hand murders of Airbus passengers who threatened HSBC’s monopoly control of the global drug and arms trades.
McConnell claims HSBC has arranged for Serco (formerly RCA GB 1929) to operate the U.S. Patent and Trademark Office under Crown Rights rules where Clinton Foundation insiders can practice any patent issued for the onion-router or Boeing Honeywell Uninterruptible Autopilot devices allegedly used in the Black Hand crashes of AF447, QZ8501 and Germanwings 9525.
Black Hand* – Serco navigators' using the British Crown’s "Patent Rights to Track, Film and Kill" from the City of London's Honourable Artillery Company 1537; The Master Mariners and The Air Pilots (formerly GAPAN) 1929, and The Ancient and Honorable Artillery Company of Massachusetts 1638 – whose alumni include U.S. Presidents James Monroe, Chester Alan Arthur, Calvin Coolidge and John F. Kennedy and – perhaps – Barack 'Down Low' Obama.
While in London, England on Saturday, 11 April, 2015, Field McConnell was urged by a publisher to write his life story and his book, "Honor Thy Parents" will be available on Amazon.com by 11 September, 2015.
Prequel 1: #2329: Marine Links ConAir Sister's Onion Router To FAA Base-One Murrah Bomb, Serco Black-Hand Lubitz Dam
WAG THE DOG - Trailer - (1997) - HQ
Serco... Would you like to know more?
SWISSLEAKS - "HSBC developed dangerous clients:
arms merchants, drug dealers, terrorism financers"
Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! (Mobile Playback Version)
[Note that HSBC is Serco's banker and, with Allianz and Her Majesty's Government, one of Serco's major shareholders ]
"We may never know exactly what really happened. The memory chip of the second black box recording flight data was missing, something which in itself is very odd. .. If the plane did crash, the cause may have been the hacking of the computer system during the repairs the day prior to the flight. The three French Mirage planes could have jammed the electronic communication and control system. Also, odd is the alleged appearance of an Italian fighter jet near the alsp, which squawked on the emergency channel of the Airbus the very time when radio contact was lost."
"Base One Technologies "[DOMESTIC BUSINESS CORPORATION, located in New Rochelle, NY and was formed on Feb 15, 1994.This file was obtained from the [Clinton] Secretary of State and has a file number of 1795583] …. N/WAN Design Provide an IP based Network Solution in response to an RFI from the FAA (Federal Aviation Agency) to re-engineer their existing networks (FTI 2000). .. Responsible for providing and demonstrating the capabilities of an IP Network Architectural Design including a Disaster Recover Solution in response to an RFI for the FAA to upgrade or replace their current Mission Critical Network in the United States [allegedly to prepare for the attacks of 9/11] … Responsible for providing a security solution included for the entire network using technologies such as Nokia/CheckPoint Firewall, Cylink ATM DS3, T1/FT1 & ISDN Encryptors, and Dragon LAN based Intrusion Detection Systems. .. Managed [Clinton war room for] all loaned personnel who assisted in installing, maintaining, configuring and documenting loaned hardware and software."
"Meanwhile United 93 reaches cruising altitude of 35,000 feet and as the passengers relax and are being served breakfast the terrorists wait for the right moment to hijack the plane. After al-Haznawi returns from a toilet wearing an artificial bomb around his torso al-Ghamdi holds one of the flight attendants Debbie Welsh at knife point while the passengers are moved to the rear of the plane after al-Haznawi displays the "bomb." Both Jarrah and al-Ghamdi force Debbie to let them into the cockpit and both pilots as well as Debbie are murdered. Jarrah then takes over as the pilot and claims they have 50 minutes left to live as he flies the plane for their chosen target which is implied to be the Capitol Building.
However the passengers decide to save themselves after discovering that the pilots are dead as well as learning via air phones the World Trade Center and Pentagon have been struck. After coming up with a plan and praying, the passengers attempt to take back the airplane. After al-Haznawi is killed al-Nami warns Jarrah and al-Ghamdi and despite his vain attempts to delay the passengers he is killed after Jeremy Glick snaps his neck. The male passengers frantically break into the cockpit and attempt to land the plane but Jarrah manages to turn the plane upside down before the aircraft crashes into Pennsylvania and the scene fades out implying everyone on board has been killed instantly."
"I remember a long time ago (2002) when some of the actions of the hijackers of the September 11 planes, namely the United 93 one, included trying to turn off the autopilot several times, then re-engaging it (at which point it returned to it cruise altitude and course). Apparently on the 'transmissions' they made over the ATC frequency (telling the "Air Traffic Controller" to sit down and remain calm and remain seated) there was the Autopilot disconnect horn going off in the background. This was also shown in Paul Greengrass' movie United 93 with the actor playing Ziad Jarrah (UAL93 hijacker pilot) trying desperate to silence the Autopilot alarm by pressing random buttons, (Including the "engage autopilot" Button) and not getting anywhere. The alarm continues wailing for several minutes through the cockpit scenes in the movie. Later he decides that he will "Descend to speed up", thereby increasing the aircraft's Indicated airspeed (into Overspeed clacker warning) but ultimately decreasing the aircraft's Ground speed and Mach (ie: he actually slowed due to not understanding what Indicated Airspeed is). Maybe these details make me more annoyed/angry at n00bs than I would otherwise be, since they seem to have the same misconceptions about the operation of airliners that the movie (and possibly real) UAL93 hijackers did."
"Base One Technologies …. N/WAN Design Provide an IP based Network Solution in response to an RFI from the FAA (Federal Aviation Agency) to re-engineer their existing networks (FTI 2000). .. Responsible for providing and demonstrating the capabilities of an IP Network Architectural Design including a Disaster Recover Solution in response to an RFI for the FAA to upgrade or replace their current Mission Critical Network in the United States. Responsible for providing a solution and a plan to transition the FAA’s current X.25 environment to the proposed IP (BGP/OSPF) network. Challenging performance requirements, such high availability (99.9997%) with very strict and aggressive Mean-Time-To-Recover (6 seconds), were exceeded or met. Using Networking solutions from Nortel Networks and Cisco Systems, we provided a highly scaleable, deterministic and secured IP network running over ATM. FT1/T1 was provided in areas where ATM was not available. ISDN dial backup and dial-on-demand routing were used to increase availability and enhance MTTR. User connectivity was provided with Hot-Standby-Routing-Protocol (HSRP) through robust and highly available Cisco Catalyst switches. Responsible for providing a security solution included for the entire network using technologies such as Nokia/CheckPoint Firewall, Cylink ATM DS3, T1/FT1 & ISDN Encryptors, and Dragon LAN based Intrusion Detection Systems. .. Managed all loaned personnel who assisted in installing, maintaining, configuring and documenting loaned hardware and software." …
"[Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994.This file was obtained from the [Clinton] Secretary of State and has a file number of 1795583] .. Conducts IT Security and Risk Assessment in Federal government as well as security testing, implementing security for multiple platforms and operating systems around the world ... Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions."
“SOURCE: Base One Technologies September 02, 2008 09:00 ET Base One Technologies, Inc. Continues Operations in Government Space NEW ROCHELLE, NY--(Marketwire - September 2, 2008) - Base One Technologies, Inc. is pleased to announce that it has sold its affiliate, Base One Technologies Ltd., to Apptis Inc. Base One Technologies, Inc. will continue to compete in the government space as an 8(a), HubZone and Woman Owned Small Disadvantage Company. Base One Technologies, Inc. is an IT Engineering and Technical Services company founded in 1994. Base One has a Top Secret Facilities Clearance and specializes in: Enterprise Architecture, Network Infrastructure Support, Data Security, Software & Database Services, Disaster Recovery & Contingency Planning, and Independent Validation & Verification. Base One is a privately-held organization with headquarters in New Rochelle, NY. For more information visit: www.base-one.com. Contact Information: Liza R. Zaneri Base One Technologies 914 633-0200 x205 “www.base-one.com"
"Serco Awarded $187 Million Federal Aviation Administration Contracts
Date : 16 April 2015
Serco Inc., a provider of professional, technology and managed services, announced today the award of two contracts to continue its 20-plus years of supporting the Federal Aviation Administration's (FAA) Contract Tower (FCT) Program. Serco will provide air traffic control specialists, safety managers, and program management services in support of 58 Air Traffic Control Towers (ATCTs) in 11 western states, including Alaska, California and Colorado. The two five-year contracts each have one base year and four one-year option periods, with a combined value of $187 million, if all options are exercised.
Under these contracts, Serco's Air Traffic Controllers will be responsible for the safe and efficient movement of commercial, general aviation and military aircraft on the airport and in the airspace surrounding the airport. The Company will also provide risk management, quality assurance and program management to meet FAA service standards and quality metrics. Serco will utilise its Aviation Safety Management System to improve safety and mitigate risks in the National Airspace System.
"Air Traffic Control Towers provide vital services ensuring that airports are safer for pilots and passengers at airports across the country." said Dan Allen, Serco Inc.'s Chairman and Chief Executive officer. "As experts in aviation and management solutions, we are honored and eager to continue supporting the FAA in 2015 and beyond."
As part of Serco Group, one of the largest contracted providers of Air Navigation Services worldwide, the company is responsible for more than 960,000 miles of airspace and handles more than seven million aircraft movements a year. Serco employs more than 700 air traffic control specialists at over 75 airports - located in the U.S., U.K. and Middle East - who help maintain flight safety. In the US, the company has also been honored with the prestigious Willie F. Card Federal Aviation Administration (FAA) Contract Tower Award at towers in Lewiston, ID, Phoenix-Mesa Gateway, AZ, Jackson Hole, WY, Goodyear, AZ, and San Luis Obispo, CA.”
"Onion routing network for securely moving data through communication networks US 6266704 B1 ABSTRACT The onion routing network is used to protect Internet initiators and responders against both eavesdropping and traffic analysis from other users of the Internet. In the onion routing of the invention, instead of making connections directly to a responding machine, users make connections through onion routers. The onion routing network allows the connection between the initiator and responder to remain anonymous. Anonymous connections hide who is connected to whom and for what purpose from outside eavesdroppers."
"The best security: A trip through The Onion Router How TOR works. Courtesy TOR Project. Published: April 24, 2013, 11:38 am .. Before the Internet, people flocked to secret and well-hidden underground markets to purchase either illegal or morally questionable items. With the birth of the Internet, unlimited access to these items from around the world became a reality. The issue was creating a tunnel to transfer anything from heroin to full libraries of downloaded books, from one part of the world to the next securely and secretly. Enter Tor. The U.S Naval Research Lab created Tor, or The Onion Router, as an experiment in 1996. The lab has been studying different methods of carrying out anonymous communication between governments for years. The result was the original Tor network. .. Perhaps what Tor has become most well known for, though, is the Silk Road. Run by an anonymous individual who refers to themselves only as the Dread Pirate Roberts, the Silk Road is a highly illegal and highly profitable passageway for very illegal items. Buyers can purchase pounds of heroin or an arsenal and have it delivered to their home without leaving a trace. Discussions take place on a huge number of Tor forums daily between drug dealers from around the world discussing the latest trends and their future purchases. .. It may have been underground at one point, but it is no longer just a whisper in the dark forums of the Internet's underbelly. It's become a tool for activists, hackers, drug dealers, and curious minds. It’s the beginning of a line of networks that will become commonplace very soon. .. © COPYRIGHT - POSTMEDIA NEWS"
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation