Wednesday, August 26, 2015

#2436: White's Club Nightwatch Key – Sister’s Boeing Serco Protégées – FBI Killisecond Clocks

Briefing From United States Marine Field McConnell 
Plum City Online - (
August 26, 2015

1. In June 1995, White's Club member and then U.K. Minister of Defense, Nicholas Soames, allegedly outsourced operation of Entrust public key infrastructure for E4B Nightwatch aircraft in preparation for continuity-of-government exercises in 2001.

2. In 2001, Field McConnell's sister, Kristine Marcy allegedly set aside 8(a) mentor-protégée contracts with Boeing and Serco to convert simulated continuity-of-government exercises into the attempted overthrow of the United States Government on 9/11.

3. On 9/11, Marcy allegedly deployed Serco 8(a) protégées in FBI uniforms to remove evidence of White's Club use of Entrust keys and "killisecond" timing from cesium clocks on the E4Bs for a spot-fixed attack on the Pentagon's Navy Command Center.

McConnell offers expert-witness services to wrongful-death suits associated with Serco's alleged use of E4B timing signals for spot-fixed assassination betting in his e-book "Shaking Hands With the Devil's Clocks". (See )

The Riot Club - Official Trailer (Universal Pictures) HD [The White's Apprenticeship] 

Nicholas Soames (former U.K. Minister of Defense) with Rupert (Serco CEO)

911 stealth The White Jet E-4B filmed near the White House at Washington 

FBI uniforms and the felony of spoliation of evidence

White's and Clinton at Number 10: "Out, out damned spot!"

FBI Director James Comey at Georgetown: "Out, damned spot!"

"Missing Pentagon Evidence 
The Suppression of Decisive Pentagon Attack Evidence 

Pentagon workers in business 
attire collect aircraft debris 
in the wake of the attack. 

Photo credit: Carmen Burgess Secrecy has surrounded the aftermath of the September 11th attack of the Pentagon. The paucity of unambiguous evidence outside of eyewitness reports that a jetliner hit the building has fueled speculation about the nature of the event. Immediately following the attack, actions by officials reveal a concerted program to mop up what evidence of the attack remained in its immediate aftermath and to conceal it and information about its very existence indefinitely. The common interpretation that these actions indicate an attempt to cover up that something other than Flight 77 crashed at the Pentagon ignores other plausible interpretations.


Aircraft Remains 
Photographs taken immediately following the attack show a number of pieces of apparent aircraft debris. One of the larger pieces was documented by a photograph by passer-by Mark Faram. It shows the piece on the lawn northwest of the heliport, a few hundred feet from the impact center, suggesting it may have been moved before Faram arrived. Other photographs show people, some in dress attire, moving pieces of debris.

Columns of people in FBI jackets walked portions of the Pentagon lawn and adjacent roads shortly after the attack, apparently to pick up crash debris. The photographs and videos of these activities do not suggest any attempt to carefully note and record the positions of any debris they may have been finding.


Footage of the Attack 

As of May, 2006, the only video footage of the Pentagon crash that has been released to the public are three-minute clips from two Pentagon security cameras north of the crash site. Neither video clearly shows details of the crash, but one seems to show an aircraft obscured by a parking lot structure in the frame before the first one showing the explosion. 

The five frames from the first video leaked in 2002 fueled speculation that the Pentagon was not hit by a jetliner. 

In Painful Deceptions, Eric Hufschmid points out: The first frame shows a vapor trail of the kind made by missiles, not jetliners. The first frame shows an apparent mostly-obscured plane that is much too small to be a 757.

The second frame shows an explosion whose white color indicates the detonation of an explosive rather than the deflagration of jet fuel.

None of these observations support conclusions about what hit the Pentagon, since the video's resolution is too poor to make definitive conclusions, and it is possible that the imagery was edited.

It may be that the video recordings from surrounding businesses confiscated by the FBI in the wake of the attack clearly show the jetliner. Their release continues to be sought through the Freedom of Information Act case documented at and summarized with this timeline.

Many people think that the suppression of evidence from the Pentagon attack is evidence that something other than Flight 77, a Boeing 757, crashed into the Pentagon. However, there are explanations for the way officials have handled the evidence that are consistent with the attack plane being Flight 77. For example, destroying and hiding evidence at all of the 9/11/01 crime scenes serves the coverup by limiting the information available to investigators, and cultivating false ["The Man Who Never Was"] legends about the attack."

"Watering Holes: White's Club 
#37-38 Saint James Street, London, England 

If location is everything, then White’s undoubtedly is too: the club was founded at #4 Chesterfield Street in 1693, when Francesco Bianco ("Francis White") organized it to sell hot chocolate and tickets to the King's Theatre and Royal Drury Lane Theatre productions. In 1778 it moved to #37-38 Saint James Street, also in London, and has been there since, remaining mercifully immune to progress of any sort or shape (save one application of fresh paint in 1970). Clubs judge themselves, and are judged, by the caliber of both their membership and of their waiting lists. White's excels in both. Past and current membership has included, or does include, Beau Brummell, King Edward VII, the sixth Earl of Dartmouth William Legge, Prince Charles, and Evelyn Waugh (who made earning admittance his life's work). In 1783 White's became unofficial headquarters to the Tory party. Brooks's Club, down the street, similarly hosted the Whigs. A few especially affable gentlemen held membership in both, and used to walk between them during meetings. Through it all, White's remained, and remains, a bastion of all things traditionally and refinedly masculine: discussions around the bar range in concentration from upland pheasants to falconry to horsemanship to the engravings on side-by-side wing guns.

The club keeps a table squarely in front of a large bow window, for which it is famous: the chair at the head of the table has been White's de facto throne since its installation. Beau Brummell held court there till he moved to America in 1816, when Lord Alvaney took it up and, legend has it, bet a friend 3,000 pounds one day on which of two raindrops would be the first to reach the bottom of a window. Gambles like these are recorded in White's house ledger, kept near the table, in which all table bets are noted. Bets marked down include, in addition to raindrops, social marriages, sporting events, political developments, and whether or not the French Revolution would fail. [Betting on Terror for over 250 years!!!!]"

"Sir Arthur Nicholas Winston Soames (born 12 February 1948) is a British Conservative Party Member of Parliament for the constituency of Mid Sussex. Soames is a former Defence minister having served in the government of John Major (1994–97). His main political interests are defence, international relations, rural affairs and industry. He is also chairman of the private security contractor Aegis.[1]”

"Entrust provides identity-based security solutions that empower enterprises, consumers, citizens and websites in more than 5,000 organizations spanning 85 countries. Entrust's identity-based approach offers the right balance between affordability, expertise and service. With more than 125 patents granted and pending, these world-class solutions include strong authentication, physical and logical access, credentialing, mobile security, fraud detection, digital certificates, SSL and PKI." 

VANCOUVER, B.C.--(BUSINESS WIRE)--June 29, 1995--MACDONALD, DETTWILER (TSE,VSE:MDA) MacDonald, Dettwiler and Associates, Ltd. announced that its data communications unit, The PSC Group, has reached an agreement with Northern Telecom Ltd. of Mississauga, Ont. Under the pact, PSC is providing certain services for a new Nortel security product called Entrust.

The PSC-Northern Telecom relationship is part of a new trend, called functional outsourcing, that is helping PSC to achieve rapid growth. Outsourcing allows independent consulting firms like PSC to provide training and other support for the customers of large multinational computer and communications companies.

Over the past two years, PSC has developed its first outsourcing relationship, with computer network equipment manufacturer Cisco Systems Inc. of San Jose, Calif. Under this relationship agreement, PSC has become a leading trainer for customers of Cisco around the world. Cisco itself is growing quickly. Its sales nearly doubled in 1994 to $1.2 billion (U.S.) and customer demand for training is very strong.

The pact with Northern Telecom is PSC's second outsourcing relationship. Under this pact, PSC ensures that Entrust software meets the highest quality standards. In addition, PSC provides post-sales service to Entrust customers worldwide, including product installation, training and ongoing support.

PSC is currently negotiating several other outsourcing pacts, under which it would provide training for other major computer equipment manufacturers. An announcement regarding one of those pacts is anticipated soon.

For the fiscal year ended March 31, 1995, PSC received nearly $6 million of revenue from its Cisco outsourcing relationship. That represented about 5 percent of MacDonald Dettwiler's total revenue of $110 million. With continued growth from Cisco, and with Northern Telecom and other relationships under negotiation, PSC expects its outsourcing revenue to approximately double during the current fiscal year.

With a staff of about 120, PSC specializes in consulting and training related mainly to computer networking. PSC helps customers design and implement networks so that computers can communicate faster and at less cost.

PSC's training is conducted from offices in Toronto, Washington D.C., London and Sydney, Australia. In addition, PSC sends instructors and portable laboratories from city to city to provide courses at locations convenient to customers. PSC has the capacity to teach in English, French, Spanish, Russian and several other languages.

MacDonald, Dettwiler and Associates provides technology-based solutions and services which address basic societal needs in earth observation, air navigation [al-Qaeda 9/11], defence applications and data communications markets.

CONTACT: Alan Bayless
Corporate Communications

"MDA Wins Key U.S. Aviation Contract [and capability for Kristine Marcy's protégées to hack and spot fix 9/11 aircraft through Boeing's E4B Nightwatch command post !!]  
Press Release Source: MacDonald, Dettwiler and Associates Ltd. Posted Thursday, May 3, 2001 Richmond, B.C. - MacDonald, Dettwiler and Associates Ltd. (TSE: MDA) announced today the company has been awarded a contract by the United States Air Force to develop a system to be used by specialists at Air Force bases to design Instrument Approach Procedures (IAPs).

IAPs are published instructions to pilots specifying a series of aircraft maneuvers that must be executed for the aircraft to transition safely from an en route airway to a runway final approach when flying by instruments. MDA's system ingests digital terrain and elevation data, air navigation data (such as the locations of navigation aids, runways, buildings and towers) to build and display a virtual model of the physical environment surrounding an airport. It then develops the complex surfaces that define a safe approach corridor for any of the dozens of IAP variants, and determines whether any of the defined surfaces are penetrated by terrain or man-made obstacles. It flags these incursions to the operator, who can quickly modify the approach procedure through a drag-and-drop user interface.

This initial award, valued at $2.9 million (CDN), consists of a fixed price element to develop, integrate, and test the system. The next phase will include installation, government testing, and operator training. The contract includes an option for the U.S. Federal Aviation Administration (FAA) to adapt the system for their needs. The U.S. Air Force also has options to field the successful system at up to 108 air bases around the world, and to award T&M support contracts for up to 8 years. MDA plans to team up with Air Navigation Data (AND) of Ottawa to offer a custom solution, based on AND's "Final Approach" product.

MDA President and CEO Daniel Friedmann said: "This is a significant project for MDA that has the potential to improve the safety of air transportation for many other air forces and civil aviation authorities world wide."

Related web sites: 
For more information, please contact: Ted Schellenberg 
Media Relations MacDonald Dettwiler 
Telephone: (604) 231-2215 

"UK Ministry of Defence Standardizes on Entrust PKI 
Entrust's technology selected to be the foundation for the MoD's PKI ecosystem DALLAS – In an effort to enforce their strategy of centrally controlling policy to maintain a trusted network environment, the United Kingdom's Ministry of Defence (MoD) sought a public key infrastructure (PKI) solution to manage authentication, digital signatures and encryption capabilities. Entrust, Inc. [NASDAQ: ENTU] proudly announces that the company has licensed its Entrust Authority™ Security Manager to the the UK's MoD where it is to be used as the MoD root certification authority (Root CA).

"The functionality and comprehensive nature of Entrust's PKI solution definitely meets our need to seamlessly manage the different capabilities we need for our secure network environment," said Lieutenant Colonel Keith Bell, Head of Defence Interoperable Network Services Authority. "We now have fully deployed the root certificate authority (CA) technology and look forward to extending this chain of trust to all departments and business partners."

Entrust Authority™ Security Manager, a world-leading PKI, is designed to manage the digital keys and certificates that make up the digital identities used to transparently automate security-related processes in an organization. As an organization's Certification Authority (CA) system, Entrust Authority Security Manager software can help enable the use of digital signature, digital receipt, encryption and permissions management services across a wide variety of applications and solutions.

"Having a secure PKI infrastructure is at the heart of building a trusted network environment," said Entrust Chairman, President and Chief Executive Officer Bill Conner. "Because the MoD has to service a variety of different internal agencies, it is important that their PKI offers security and functionality to support this vast network. We are pleased to help them in their quest to securely communicate with both internal constituencies, as well as extend this security network to Defence contractors and other outside parties."

The MoD will use the Entrust Authority Security Manager to support authentication, digital signatures and encryption. The PKI system also will allow the issuance of digital credentials to internal devices, as well as provide security for collaboration with industry partners. In addition, the PKI system will provide a root CA to the Defence Information Infrastructure DII(F) that will help create a single, efficient information infrastructure within the MoD."

"Entrust, Heartland Business Systems Helping Law Enforcement Agencies Deploy Advanced Authentication as Mandated by FBI's CJIS Policy 
DALLAS, /PRNewswire/ — Entrust Inc. and Heartland Business Systems have entered into an agreement that allows Heartland Business Systems to offer an authentication service for law enforcement agencies that's designed to aid in their compliance with FBI security and authentication requirements outlined in the Criminal Justice Information Security (CJIS) Policy. The Wisconsin-based company will leverage Entrust's comprehensive authentication framework to provide subscription-based authentication services to users accessing the FBI's CJIS database.

"Entrust has a long, successful history with law enforcement agencies in the deployment of identity-based security for authentication, encryption and credentialing," said Entrust President and CEO Bill Conner. "Our partnership with Heartland Business Systems is a critical step that will enable these agencies to easily and cost-effectively comply with the FBI's CJIS policy — all via a single security management framework."

Entrust and Heartland Business Systems collaborated on the design and implementation of the turn-key authentication solution that addresses specific CJIS policy requirements for authorized access to sensitive information from non-secure locations (e.g., police cruiser).

Powered by the Entrust IdentityGuard software authentication platform, an authorized end-user, agent or officer may securely verify their identity via any supported authenticator when accessing the CJIS database from locations deemed unsecure. Entrust provides a range of authorized authentication options, allowing an organization to choose the right authenticator for their unique user requirements.

"Our partnership with Entrust will help provide law enforcement agencies with the proper security capabilities to authenticate user identities and safeguard sensitive information about citizens, ongoing cases, evidence and more," said Heartland Business Systems Principal Peter Helander.

Enacted in January 2011, the 127-page CJIS mandate outlines the security requirements for agencies exchanging, collaborating or transmitting data, sensitive material or personal information with the FBI. All law enforcement departments or agencies that require access to the CJIS database must comply with the FBI's policy by September 30, 2013. In detail, the CJIS policy requires law enforcement agencies to deploy advanced authentication to verify the identities of officers or individuals — whether from law enforcement, municipalities, courts, etc. — accessing the CJIS database from non-secure locations. Advanced authentication, as defined by the CJIS policy, can be achieved via biometric systems, user-based public key infrastructure (PKI), smartcards, software tokens, hardware tokens, or even innovative risk-based authentication solutions."

"James Brien Comey, Jr. (born December 14, 1960) is the seventh and current Director of the Federal Bureau of Investigation.

He was the United States Deputy Attorney General, serving in President George W. Bush's administration. As Deputy Attorney General, Comey was the second-highest-ranking official in the United States Department of Justice (DOJ) and ran the day-to-day operations of the Department, serving in that office from December 2003 through August 2005. He was U.S. Attorney for the Southern District of New York prior to becoming Deputy Attorney General.

In December 2003, as Deputy Attorney General, Comey appointed the U.S. Attorney in Chicago, close friend and former colleague Patrick Fitzgerald, as Special Counsel to head the CIA leak grand jury investigation after Attorney General John Ashcroft recused himself. In August 2005, Comey left the DOJ and he became General Counsel and Senior Vice President of Lockheed Martin. In 2010, he became General Counsel at Bridgewater Associates. In early 2013, he left Bridgewater to become Senior Research Scholar and Hertog Fellow on National Security Law at Columbia Law School. He also joined the London-based board of directors of HSBC Holdings. [Founded in 1865 by Sir Ewen Cameron, the great-great grandfather of White's Club alumnus David Cameron]"

Yours sincerely,

Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222

David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation


  1. This is the only knnown video of the live shooting download it before its removed . It is very clear that blanks were used she kept running after all the shots

  2. Live leak must be part ofthe propaganda chain , they always get the videos 1st that no one else appears to have .


Who's visiting Abel Danger
view a larger version of the map below at