Saturday, July 25, 2015

#2409: Clinton's USAID Snuff-Betting Emails – Serco's Ultra Vires 8(a) Time Stamps – Marine Corps Navy Clock

Brief From United States Marine Field McConnell 
Plum City Online - (
July 25, 2015

1. In 1998, Hillary Clinton allegedly set up an e-mail server in her Chappaqua home to direct snuff-film productions through the U.S. Agency for International Development (USAID) and support remote assassination betting on the time of death of her enemies, including rebels and whistleblowers.

2. In 1998, Clinton allegedly ordered Serco to create an ultra vires partnership between USAID and SBA 8(a) companies by back-hauling jointly-produced time-stamped snuff-film images to the assassination-betting pool managers to identify who had predicted the closest time of death to scoop the pot.

3. On October 6, 2000, Clinton ordered Serco to equip USAID and 8(a) protégés with soon-to-be patented Navy onion router (Tor) devices to synchronize snuff-film betting over the Navy/Marine Corps Intranet (NMCI) with the U.S. Naval Observatory Master Clock.

Field McConnell is standing by to brief Marine Corps General Joseph Dunford before requesting from Congress an authority by way of Letters of Marque and Reprisal to confiscate any onion router devices used by Serco's ultra vires USAID 8(a) partners – check Clinton home server; check McConnell’s sister Kristine '8(a) Con Air' Marcy and check NMCI used by foreign-born members of Obama Cabinet – to synchronize assassinations of America's citizens and allies.

The apparently Arkancided Marine Colonel James E. Sabow

Prequel 1: #2408: Clinton 8(a) Murders With Serco Visas –Time-Stamped Money Shots – Marine Corps Navy Clock

"Official: Clinton emails included classified information 
By Elise Labott, CNN 
Updated 6:27 PM ET, Fri July 24, 2015 
Story highlights Hillary Clinton on Friday criticized what she called "a lot of inaccuracies" in brief remarks she made about the classified emails.

An intelligence inspector general said that some material Clinton emailed from her private server contained classified information.

The IG noted, however, that "none of the emails we reviewed had classification or dissemination markings."

Washington (CNN)The inspector general for the intelligence community has informed members of Congress that some material Hillary Clinton emailed from her private server contained classified information, but it was not identified that way.

Because it was not identified, it is unclear whether Clinton realized she was potentially compromising classified information.

The IG reviewed a "limited sampling" of her emails and among those 40 reviewed found that "four contained classified [intelligence community] information," wrote the IG Charles McCullough in a letter to Congress.

McCullough noted that "none of the emails we reviewed had classification or dissemination markings" but that some "should have been handled as classified, appropriately marked, and transmitted via a secure network."

The four emails in question "were classified when they were sent and are classified now," spokeswoman Andrea Williams told CNN.

McCullough said that State Department Freedom of Information Act officials told the intelligence community IG that "there are potentially hundreds of classified emails within the approximately 30,000 provided by former Secretary Clinton."

Obama's CIA "Mommy Dearest" — identifying Indonesians for assassination 
By Wayne Madsen 
President Obama's mother, Stanley Ann Dunham, worked in Indonesia for a U.S. Agency for International Development (USAID) embassy cover operation that helped identify some 5000 key members of the Indonesian Communist Party — Partai Komunis Indonesia (PKI) that were targeted for assassination by Indonesian armed forces units, of which her husband and President Obama's step-father, Lolo Soetoro, was a participant. The 5000 targets' names appeared in what was called by the CIA "the shooting list."

Furthermore, the contacts of the key 5000 PKI members was also used by the CIA, in part using USAID [In 2012, Russia decided to expel USAID from Russia for what the Russian government under Vladimir Putin considered "subversive activity".] official cover agents like Ann Dunham, to identify Indonesian sympathizers with the government of President Sukarno, ousted in 1965 in a CIA-orchestrated coup, in which Lolo Soetoro took part, and the PKI, with the net total of Indonesians killed ranging from 250,000 to 1 million.

The CIA's role in the Indonesian genocide is found in a 1990 article written by Ralph McGehee, a CIA veteran of the agency's International Communism Branch of the Counterintelligence Staff. The article appeared in the Fall 1990 issue of the Covert Action Information Bulletin.

Lolo Soetoro was a colonel in the Indonesian armed forces and worked for the CIA-installed dictator, General Suharto, from 1965, after returning to Indonesia from Hawaii, where he married Ann Dunham, to 1970, when he joined Exxon. President Obama's mother arrived in Indonesia to join Soetoro with young Barack Obama, Jr. in October 1967,while the CIA's anti-PKI and anti-Sukarno "mopping up" operations were still taking place.

Dunham Soetoro began working for CIA/USAID front, Lembaga Persahabatan Indonesia Amerika (LIA)–the Indonesia-America Friendship Institute. In 1972, Dunham Soetoro returned to Hawaii to continue her CIA work in Indonesia under the non-official cover of two agency fronts, the Asia Foundation and the East-West Center at the University of Hawaii. Dunham Soetoro returned to Indonesia in 1975 to conduct "anthropological field work." The year 1975 is key since it was the year East Timor gained independence from Portugal and when the CIA, working with Suharto, planned the Indonesian invasion and bloody occupation of East Timor, a move that had been given the green light by then-Secretary of State Henry Kissinger. Kissinger now serves as a foreign policy adviser to President Obama.”

"According to American laws, the concept of ultra vires can still arise in the following kinds of activities in some states:

Charitable or political contributions 
Guaranty of indebtedness of another 
Loans to officers or directors 
Pensions, bonuses, stock option plans, job severance payments, and other fringe benefits 
The power to acquire shares of other corporations 
The power to enter into a partnership"

"CONTRACT INFORMATION BULLETIN 98 - 15 The Small Business Administration (SBA) has launched a new pilot program to delegate 8(a) contract signature authority to individual agencies. This program is effective for one year, until terminated or extended, beginning in May of 1998. The SBA has delegated its authority under Section 8(a)(1)(A) of the Small Business Act (15 USC 637(a) as amended) to USAID to enter into 8(a) prime contracts, and its authority under Section 8(a)(1)(B) of the Act to subcontract the performance of that contract to an eligible 8(a) Program Participant. I hereby re-delegate said 8(a) contracting authority to all Contracting Officers at USAID. This delegation shall be in effect until the authority from the SBA is withdrawn. USAID has signed a Memorandum of Understanding (MOU) with the SBA that will eliminate the tripartite agreement and allow us to execute a single contract document to serve as the legal instrument between USAID and the 8(a) contractor. The MOU, which is attached to this CIB, explains the new award procedures and the responsibilities of the parties. Of the USAID responsibilities, the Office of Small and Disadvantaged Business Utilization(OSDBU), not the Office of Procurement, shall: 1. submit summary reports of all 8(a) contractin activities, as required by the MOU, to the SBA's Assistant Administrator for Business Development, Office of Minority Business Enterprise, on a quarterly basis; and 2. ensure that all applicable requirements of 13 CFR 124 are followed. The SBA has obtained a class deviation from the 8(a) award procedures contained in Federal Acquisition Regulation (FAR)19.8, which will be sent to all Contracting Officers and negotiators when it is received by the Agency. The MOU may be amended at any time by mutual agreement between the SBA's Associate Administrator for Minority Enterprise Development (AA/MED) and USAID's Procurement Executive. All amendments will be in writing. The MOU may be terminated by either the SBA's AA/MED or USAID's Procurement Executive upon thirty (30) days advance written notice. If the test program is successful, the MOU and all delegations of authority may be extended. I have also signed a class deviation to FAR subparts 19.8 and 52.2 (attached) to implement model language that will be incorporated in the FAR following promulgation of an SBA final rule. Use the model language attached to the deviation for your 8(a) contracting actions. Attachments 1) Memorandum of Understanding between USAID and SBA 2) Class Deviation w/attachment MEMORANDUM OF UNDERSTANDING between the U.S. SMALL BUSINESS ADMINISTRATION and the U.S. Agency for International Development I. PURPOSE The purpose of this Memorandum of Understanding (MOU) between the U.S. Small Business Administration (SBA) and the U.S. Agency for International Development (USAID) is to establish streamlined procedures for the award of requirements pursuant to Section 8(a) of the Small Business Act (15 USC 637(a)as amended), hereinafter referred to as "the Act." II. OBJECTIVES a. To reduce the interval between the time USAID sends offering letter to SBA and SBA's acceptance of the offering to a maximum of five (5) working days. b. To eliminate SBA approval of contracts executed under the authority of this MOU. c. To establish a uniform policy and procedure regarding the application of Simplified Acquisition Procedures (SAP) to the 8(a) contracting process, when applicable. ….

XI. ACCEPTANCE The undersigned parties hereby accept the terms of this MOU:

J. Brian Atwood, Administrator U.S. Agency for International Development 
Marcus L. Stevenson , Procurement Executive, U.S. Agency for International Development 
Ivan Ashley, Director Office of Small and Disadvantaged, Business Utilization/Minority Resource Center, U.S. Agency for International Development 
Aida Alvarez, [The allegedly extorted.] Administrator U.S. Small Business Administration 
William A. Fisher Acting Administrator for Minority Enterprise Development, U.S. Small Business Administration 
Richard L. Hayes. Associate Deputy, Administrator for Government Contracting and Minority Enterprise Development, U.S. Small Business Administration
"The 8(a) Business Development Program assists in the development of small businesses owned and operated by individuals who are socially and economically disadvantaged, such as women and minorities. The following ethnic groups are classified as eligible: Black Americans; Hispanic Americans; Native Americans (American Indians, Eskimos, Aleuts, or Native Hawaiians); Asian Pacific Americans (persons with origins from Burma, Thailand, Malaysia, Indonesia, Singapore, Brunei, Japan, China (including Hong Kong), Taiwan, Laos, Cambodia (Kampuchea), Vietnam, Korea, The Philippines, U.S. Trust Territory of the Pacific Islands (Republic of Palau), Republic of the Marshall Islands, Federated States of Micronesia, the Commonwealth of the Northern Mariana Islands, Guam, Samoa, Macao, Fiji, Tonga, Kiribati, Tuvalu, or Nauru); Subcontinent Asian Americans (persons with origins from India, Pakistan, Bangladesh, Sri Lanka, Bhutan, the Maldives Islands or Nepal). In 2011, the SBA, along with the FBI and the IRS, uncovered a massive scheme to defraud this program. Civilian employees of the U.S. Army Corps of Engineers, working in concert with an employee of Alaska Native Corporation Eyak Technology LLC allegedly submitted fraudulent bills to the program, totaling over 20 million dollars, and kept the money for their own use.[26] It also alleged that the group planned to steer a further 780 million dollars towards their favored contractor.[27]"
"Serco's Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals."
"Base One Technologies – Corporate Strategy – We are a Government Certified Women-Owned Business We practice Diversity Recruitment and Staffing for IT positions

Base One was founded in 1994 by a women engineer who had made a career in technology research for many years. Base One has been very successful in focusing on diversity recruiting and staffing for IT projects. It has been our experience that the greater the diversity mix, the more creative the solution. As in any field the more diverse the viewpoint the more thorough your analysis. Our engineers can think out of the box.

Because of our affiliations we have access to pools of resources among more diverse groups & individuals. We work with a large pool of minority professionals who specialize in IT skills. We are able to have access to these resources through our status as a D/MWBD firm and our affiliations. These affiliations assist us in working with resources among more diverse groups & individuals.

We are also partnered with firms that are 8A certified as Minority firms, Disabled Veteran firms, Native American firms, Vietnam veteran firms, women owned firms.

Our hub zone location keeps us close to the professional organizations of great diversity. We are active in recruiting from and networking with these community organizations of local IT professionals. This has given us access to a large pool of diversity talent.

Base One's staff of engineers are a diverse group of professionals. This diverse network of engineers helps us to branch out to other engineers and creates an even larger network of resources for us to work with.

The greater the diversity the more complete & thorough the analysis. The broader the spectrum of points of view the broader the scope of the analysis. We feel that a diverse team gives us a greater advantage in creating cutting edge solutions. To that end we will continue to nurture these relationships to further extend our talent pool.

The greater the diversity mix, the more creative the solution.

The more diverse the viewpoint, the more thorough the analysis.

The more diverse our team, the more our engineers can think out of the box.

This is why Base One Technologies concentrates on diversity recruitment in the belief that a diverse team gives us a greater advantage in creating cutting edge solutions."

Information Security Planning is the process whereby an organization seeks to protect its operations and assets from data theft or computer hackers that seek to obtain unauthorized information or sabotage business operations.

Key Clients Benefiting From Our Information Security Expertise: Pentagon Renovation Program, FAA, Citigroup, MCI.

Base One technologies

Expertly researches, designs, and develops information security policies that protect your data and manage your firm's information technology risk at levels acceptable to your business.

Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report.

Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions."

"Loan Improvement 
Jan 31, 2001 SBA modernizes to help feed its growing programs 
Under a five-year plan for overhauling its information technology systems, the Small Business Administration recently acquired new software for financial and other administrative tasks. .. In the first phase of the modernization, the agency has upgraded systems for managing its extensive portfolio of guaranteed loans, chief operating officer Kristine Marcy [Field McConnell's sister] said. SBA processed its first electronic loan last November through its Sacramento, Calif., office and plans to add more private lenders during fiscal 2001. .. Marcy said. Banks had been asking SBA to make faster decisions on loan guarantees. The agency decided to aim for a [onion router] turnaround time of one hour. In the second phase of modernization, SBA is revamping its financial, human resources, procurement and travel systems with Web-enabled Oracle Corp. applications. .. The second-phase integrator, SRA International Inc. of Arlington, Va., has subcontracted with a number of small firms for things such as training and data conversion [Note Serco protégé Base One opened a document conversion center in the Bronx in 2006, presumably to deal with Obama's passport problems]. .. In the final phase of the modernization, SBA will upgrade the computers in its 8(a) Business Development Program, which assists small businesses in competing for government contracts, Marcy said. The agency wants to be able to improve its tracking of clients' successes and failures [through to liquidation by the SBA's preferred lenders and sureties such as HSBC and Travelers Casualty and Surety Company of America - note merged with Citigroup and John Deutch's CIA friends!]."

"Behind the Sordid World of Online Assassination Betting Jamie Bartlett I have heard rumors about this website, but I still cannot quite believe that it exists. I am looking at what I think is a hit list.

There are photographs of people I recognize—prominent politicians, mostly—and, next to each, an amount of money. The site's creator, who uses the pseudonym Kuwabatake Sanjuro, thinks that if you could pay to have someone murdered with no chance—I mean absolutely zero chance—of being caught, you would. That’s one of the reasons why he has created the Assassination Market.

There are four simple instructions listed on its front page:

Add a name to the list 
Add money to the pot in the person's name 
Predict when that person will die 
Correct predictions get the pot

The Assassination Market can't be found with a Google search. It sits on a hidden, encrypted part of the internet that, until recently, could only be accessed with a browser called The Onion Router, or Tor. Tor began life as a U.S. Naval Research Laboratory project, but today exists as a not-for-profit organization, partly funded by the U.S. government and various civil liberties groups, allowing millions of people around the world to browse the internet anonymously and securely. …

My journey took me to new places online and offline. I became the moderator of an infamous trolling group and spent weeks in forums dedicated to cutting, starving, or killing yourself. I explored the labyrinthine world of Tor Hidden Services in search of drugs, and to study child pornography networks. I witnessed online wars between neo-Nazis and antifascists on popular social media sites, and signed up to the latest porn channels to examine current trends in homemade erotica. I visited a Barcelona squat with anarchist Bitcoin programmers, run-down working men's clubs to speak to extreme nationalists, and a messy bedroom to observe three girls make a small fortune performing sexually explicit acts on camera to thousands of viewers. By exploring and comparing these worlds, I also hoped to answer a difficult question: do the features of anonymity and connectivity free the darker sides of our nature? And if so, how?"

"NMCI Navy Marine Corps Intranet. As of March 2008, NMCI included more than 363,000 computers, serving more than 707,000 Sailors, Marines and civilians in 620 locations in the continental United States, Hawaii, and Japan, making it the largest internal computer network in the world.[1] The network's 4,100 servers handle over 2.3 petabytes of data.[2]

NMCI established an interoperable command and control network that provides the IT platform necessary for transitioning to a net-centric environment.[3] Department of the Navy (DON) CIO Terry Halvorsen described NMCI as a “forcing function within the DON to attend to our legacy infrastructure of applications, servers and networks.[4]"

While recent statements by the Navy have been very positive about NMCI,[5] a 2007 survey of users reported it unstable, slow, and frustrating.[6]

"NMCI has been a hugely successful program for the Navy," Weller said during a press briefing with reporters [October 14, 2010]. "It has been a cost-effective way to deliver unprecedented level of service. We learned a lot about how to do it and how not to do it."[7]

"Anytime you transition from where you have a high degree of localized control to a high degree of centralized control, there will be some disgruntled folks," Weller said. "I think since we already are in that world, about 70 percent of the Navy's IT infrastructure, we are in a world where the Navy has complete control and authority over how we operate the network. That has allowed us to maintain extremely high degree of security, which is frankly our number one issue. The only way that we are aware of you can do that is to have tight configuration management and tight central control. So that is where a lot of the complaints came from. To that note, what have we done to lessen blow in future? I think the answer is we don't need to because we are already there."[7]

On September 30, 2010, the NMCI contract ended and the new Continuity of Services Contract (COSC) began. The COSC gives the Navy and Marine Corps the best of the current NMCI IT environment while driving operations continuity, cost savings, network control, competition and contract management. Under the COSC, the Navy retains the same scope of NMCI services with HP, but the network becomes a government-owned, contractor-supported, managed services environment.[8]

This is a paradigm shift because under the original NMCI contract, the government managed the network at a distance and did not own any IT assets used in the program.[9] Rather, they were owned by the prime contractor, and services are provided to the government on a per-seat basis. Pricing is primarily assessed on a per-machine basis that includes security services, help desk support, and periodic technology upgrades; however, fees for additional services (such as classified connectivity, mission-critical service, additional user accounts, software installation, seat moves, remote access from mobile devices, etc.) did apply.

Videophones that provide equal access for Deaf employees are not permissible under NMCI regulations. As of October 2007, the per seat price for all of NMCI was reduced by 15 percent. Desktop PCs and laptops as well as other network components are being continually upgraded in order to enhance performance and security.[3

NMCI is the first large-scale federal government IT centralization and outsourcing project. Its lessons have informed other government agency efforts to consolidate and outsource IT services. According to industry analyst Warren Suss of Suss consulting, "In the long run, government agencies will come to see the need for similar types of solutions, and I think they'll look to NMCI for lessons learned."[10]

The NMCI program is managed by the Navy's Program Executive Office–Enterprise Information Systems (PEO-EIS).


"On October 6, 2000, the NMCI contract was awarded to Electronic Data Systems (EDS), now HP Enterprise Services (HP).[11] Secretary of the Navy Gordon England summed up the Navy's IT Environment prior to the commencement of NMCI: "We basically had 28 separate commands budgeting, developing, licensing, and operating IT autonomously. It was inefficient and from the larger Department perspective, produced results that were far from optimal."[12]

NMCI consolidated roughly 6,000 networks—some of which could not e-mail, let alone collaborate with each other—into a single integrated and secure IT environment. HP updated more than 100,000 desktop and laptop PCs in 2007.[13] The program also consolidated an ad hoc network of more than 8,000 applications to 500 in four years and 15,003 logistics and readiness systems to 2,759 over a two-year period.[14]

Sub-contractors to HP include:

Apple Inc., Cisco, Dell, McAfee, Microsoft, Oracle Corporation, Sun Microsystems, and Symantec[15]

Harris Corporation (which acquired Multimax formerly known as Netco Government Services and WAM!NET), which provided enterprise network infrastructure design and support until its contract expired in 2014.[16]

Verizon, which provides wide area network (WAN) connectivity.

HP also provides the security services once provided by Raytheon.
"HP also has worked with more than 400 small businesses, with 5 percent for small disadvantaged businesses, 5 percent for women-owned small businesses and 1.5 percent for HUBZone small businesses. Since its inception, NMCI has exceeded the minimum 40% small business objective set for the contract.[17]

NMCI quickly suffered some widely publicized setbacks, including rollout delays that caused HP financial losses.[18] Today, NMCI is described in documents from the Navy's Chief Information Officer as "the core enterprise network for Navy and Marine Corps forces in the United States and Japan, providing secure access to integrated voice, video and data communications."[19]

In 2009 NMCI became the first network to deploy the Global Address List (GAL), a multiservice address list that increases interoperability by enabling Navy and Marine Corps users to access the Defense Information Systems Agency's Joint Enterprise Directory Services (JEDS) contact list.[20]

Additional improvements to network performance are also underway with the deployment of the Network Operations Common Operating Picture (NetOps COP). The tool helps provide enhanced situational awareness via increased information sharing and collaboration to commanders by giving them a common picture of network performance. Commanders can see scheduled maintenance tasks and other issues impacting the network, giving them the option to defer work that might affect the flow of critical information from the battlefield.[21]

Work in 2008 has increased NMCI's ability to respond to security issues and the program was the first network to implement fully the Department of Defense information assurance standards in both classified and unclassified environments. Among the enhancements were the deployment of Websense content filtering, an information assurance tool designed to inspect and block inbound Web traffic containing malicious code with little impact to the user. According to NMCI public affairs, "Websense allows the Network Operational Commands to set a tailored blocking policy by content such as gambling, hate speech or adult content, rather than blocking specific sites or URLs only. This allows the network operators to block sites much more efficiently and outsources the fight against the growing amount of inappropriate content."[22]

According to the Navy, Websense enables users to block or unblock sites, based on emerging and/or dynamic threats. The NMCI blocking policy is determined by various operational commands, such as the Naval Network Warfare Command, and enforced by the Global Network Operations Center, based in Norfolk. Blocked sites are redirected to a notification page which then links to a page on NMCI's homeport Web site. On this site, a user can submit a request that a site be unblocked in order to support mission requirements.[22]

In addition, NMCI is upgrading existing servers with Bluecoat proxy servers, which provides better capacity and traffic management functions. According to NMCI's own data, a few users account for the majority of NMCI's bandwidth usage, mostly attributed to streaming internet radio and video. New servers will allow bandwidth usage monitoring, down to a command or user level.[22]

The security upgrades have been well received by the Navy. On March 31, 2009, Rear Admiral (Ret.) John A. Gauss, Acquisition Director for the NGEN System Program Office (SPO) said during a press conference that "NMCI is the most secure network within the Navy."[23]

The Navy and HP measure end user satisfaction through a series of quarterly satisfaction surveys. End user satisfaction has steadily improved, reaching a high of nearly 86% in February 2008, as compared to 80% in December 2006. This is largely due to the upgrade of nearly 112,000 desktop and laptop computers in 2007, and a combination of network enhancements that are improving speed and reliability. HP is on track to upgrade another 120,000 seats in 2008 at Navy and Marine Corps bases in the US and Asia.[3]

Working in tandem with the technology refresh are the virtualization efforts on the network. NMCI is on track to move from 2,700 servers down to roughly 300. The efforts are expected to save more than $1.6 million per year in electricity costs.[24] Additionally, the decrease in the number of servers being refreshed will lower the cost of updating the equipment, leading to a potential savings of at least $1.5 million over four years.[25]

A highlight of the Navy's virtualization efforts was its win of InfoWorld’s 2009 Green 15 Award, which honors 15 companies and/or organizations for their green IT projects.[26] Ted Samson, Senior Analyst for InfoWorld said of the honorees, "This year's Green 15 winners demonstrate, once again, that green IT projects can be a win-win proposition. These organizations have not only helped the planet by reducing greenhouse gas emissions, preserving trees, and keeping e-waste out of landfills. They've also reaped measurable business benefits, such as significantly lower electricity bills, fewer hardware refreshes, and postponed datacenter-expansion projects -- along with gains in efficiency and productivity."

In 2006, the NMCI program office was criticized for its annual customer-satisfaction surveys. Officials refuse to release the raw data, leading to accusations that their conclusions are overly sunny. One NMCI director, Rear Admiral James B. Godwin III, said releasing the results would challenge the "integrity of our data." The Department of the Navy has shown no desire to scale back or cancel the program. On 24 March 2006 the Navy exercised its three-year, $3 billion option to extend the contract through September 2010.[1]

In April 2006, users began to log on with Common Access Cards (CACs), a smartcard-based logon system called the Cryptographic Log On (CLO). In October 2008, NMCI's prime contractor HP posted a set of procedures so Apple Mac users can access NMCI's public-facing Web services, such as the e-mail and calendar functions, using their CAC readers with their Macs. The workaround also works with other Defense Department CAC-enabled networks.[27] Alternatively, NMCI and all other CAC-authenicated DoD websites may be accessed using LPS-Public.

After early challenges, the Navy is pleased with the performance and security of the NMCI network. According to Capt. Tim Holland, program manager for the Navy's Next Generation Enterprise Network (NGEN), "NMCI is very robust today—we have good security with it, very good performance."[19] In an interview the DoN CIO Robert J. Carey stated, "The plan is that NGEN will be in place before the NMCI contract expires because it is not a renewable contract. According to the Navy, NMCI will serve as the baseline from which it will transition to NGEN.[19]

The Navy's confidence in NMCI today marks a significant turnaround from the challenges cited in the GAO's report of December 2006. The report states that "NMCI has not met its two strategic goals—to provide information superiority and to foster innovation via interoperability and shared services.” The document also goes on to evaluate HP's performance, "GAO's analysis of available performance data, however, showed that the Navy had met only 3 of 20 performance targets (15 percent) associated with the program's goals and nine related performance categories."

In contrast are the more recent comments from Vice Adm. Harry B. Harris Jr., deputy chief of naval operations for communication networks (OPNAV N-6) and deputy chief information officer, Department of the Navy. "I believe that NMCI in 2008 is achieving much of what we had hoped NMCI would achieve. It’s leveled the playing field for security. It's allowed us to do things like push security patches that go through the whole enterprise that’s on NMCI. If you look at NMCI historically, it was probably the first step for the Navy to move into what was then called Joint Vision 2010 and now is Joint Vision 2020. It's actually done that, and it's moving the Navy toward the U.S. Defense Department's goal of information superiority. So, I see a lot of good things with NMCI."[28]

NMCI works today and it continues to improve as user needs evolve and technology opportunities arise. During the final two years of the contract, technology initiatives included new hardware, applications, and services to support the Navy and Marine Corps' advanced IT needs. HP will install more than 110,000 new laptops and desktops, and will push more upgrades to improve end-users' IT capabilities through upgraded machine capacity, new operating systems, and new service lines.[3]

"MARINE CORPS INTELLIGENCE ACTIVITY QUANTICO, VA Kabar Cohort 4, Team 4 Capstone Project Marine Corps Intelligence Activity Military and Civilian Interaction By: Captain John P. Brown, USMC Mrs. Christina Clark Mr. Jorge Miranda Mr. Neri G.Terry, Jr. Capstone Advisors: Dr. Susmita Murphy, PhD Ms. Katy Stucky June 2011 Table of Contents Introduction Methodology Discussion -The Origins of Civilians at MCIA -Breakdown of Survey Respondents and Results -Key Differences: Culture and Commonality CI/Humint / PAC Comparison Recommendations Conclusions Appendix A: Ka-Bar Civilian Military Environmental Survey Introduction For some years, the perception of intra-workforce tension, particularly between military and civilian personnel, has pervaded MCIA. Recently, during the fourth iteration of the Kabar Leadership Training Program, Marine Corps Intelligence Seniors requested that a group of four mid-level managers examine the professional interaction between its military and civilian personnel - this request is itself a tacit acknowledgement of that perception. This paper is the result of that group’s efforts. Its purpose is to examine and confirm if friction exists between the Marine Corps Intelligence Activity's (MCIA) military and civilian workforces. Furthermore, this paper will provide evidence (or lack there of) of friction, research its cause, and provide recommendations to reduce or eliminate it. Although MCIA has existed for over 20 years, it is imperative at this juncture in its history to take a hard look at workforce interaction. The implementation of the Marine Corps Intelligence, Surveillance, and Reconnaissance Enterprise (MCISR-E) combined with shrinking budgets across the federal government necessitates that the command fully understand the differences in workforce attitudes, dynamics, and how these differences impact the command’s ability to efficiently and effectively achieve mission accomplishment."

"Serco Awarded $13 Million Marine Training Systems Support Contract Date : 28 February 2014 Serco Inc., a provider of professional, technology, and management services, announced the award of a new contract to provide training support to the US Marine Corps (USMC). The Marine Air Ground Task Force (MAGTF) Training Systems Support contract has a one-year base period and one six-month option period valued at nearly $18 million, if the option is exercised.

Under this contract, Serco will support Combat Instructor School training, systems integrations and operations in a classroom and operations center environment in support of MAGTF Staff Training Program Division-sponsored and supported events. Serco will deliver collaborative tools and web development for garrison and tactical event environments. Training support will include warfighting skills and seminars, mission rehearsal exercises, C2 systems, and combat simulation. Serco expects to hire over 100 new employees to support this contract at 6 sites around the world.

"The Marines mission is critical to our national security and we are proud to support them on this effort," said Dan Allen, Serco Inc.'s Chairman and Chief Executive officer. "Serco is known around the world for the quality of our training programs. We look forward to putting our experience to work for the Marines and to support their vital training requirements."

Personnel and Readiness is a key capability within Serco's market offering. The company provides training and simulation to over 1,000 students a month at the US Army Maneuver Center of Excellence in Fort Benning, GA. At Fort Benning, Serco conducts and supports integrated and immersive tactical training exercises up to Brigade level using Live, Virtual, and Constructive Gaming (LVC-G) systems. Serco utilizes integrated exercise systems like Command Post of the Future (CPoF), Future Battle Command Brigade and Below (FBCB2), Army Battle Command Systems (ABCS) and Virtual Battlespace II (VBS2).

"The USNO Master Clock is the underlying product for all of our precise time and time interval products. 
The timing reference produced by this timing ensemble is called UTC (USNO). This timing reference is mandated to be the precise time reference for all of the DoD."

"Serco farewell to NPL after 19 years of innovation 8 January 2015 .. During that period under Serco's management and leadership.. .. NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency [GPS remote assassination betting] trading in the City through NPLTime."

"Serco's Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals."

"Government still paying G4S and Serco millions for tagging despite ban Alan Travis Home affairs editor 
Thursday 25 June 2015 00.01 BST 
The Ministry of Justice is still paying security firms G4S and Serco millions of pounds every month for supplying electronic tagging equipment, more than a year after both companies were barred from running the contract.

Both companies faced criminal investigations by the Serious Fraud Office over allegations of overcharging that led to them repaying nearly £180m.

The continuing monthly payments to the two companies were uncovered by an analysis of Ministry of Justice (MoJ) data by the Centre for Crime and Justice Studies which shows that G4S was paid a total of £8.7m between March 2014 – when it lost the tagging contract – and February 2015. Serco was paid £4.5m over the same period.

The electronic monitoring tags are used to enforce curfews on more than 100,000 offenders each year. The outsourcing giant Capita took over the contract on an interim basis in April last year.

In July 2014, Capita and three other companies were named as the winners of a £265m six-year contract to supply the next generation of satellite tracking tags, which would allow dangerous and repeat offenders to be monitored around the clock."

Serco... Would you like to know more? 

SWISSLEAKS - "HSBC developed dangerous clients: arms merchants, drug dealers, terrorism financers" 

Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! (Mobile Playback Version) [HSBC is Serco's drug-hub Silk Road banker and a major shareholder with the 9/11 8(a) lenders including Her Majesty's Government and JPMorgan]


Yours sincerely,

Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222

David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation


  1. You will find some very interesting stories to fill in gaps on here .



Who's visiting Abel Danger
view a larger version of the map below at