Saturday, August 6, 2016

#2744: Clinton-Marcy USIS Kill Lists – Serco Banks On 8(a) Zulu Visas – Comey Patsies' Khobar Towers Bomb

by 
United States Marine Field McConnell 
Plum City Online - (AbelDanger.net
August 6, 2016

1. Abel Danger (AD) claims that Hillary Clinton and Kristine "Conair" Marcy developed a server-based kill list in 1996 after outsourcing the security-clearance functions of the Office of Personnel Management to USIS agents headquartered in Falls Church, Virginia.

2. AD claims that Clinton and Marcy shared the kill lists with Serco's dirty banker HSBC and mentors of various 8(a) sabotage teams – allegedly given phony visas and access to SIPRNet – to move men and materiel through prospective crime scenes in Zulu time.

3. AD claims that Clinton and Marcy delegated the investigation of the 1996 Khobar Towers bombing to FBI Director James Comey – then assistant US attorney in Virginia – to find some patsy bombers but conceal the Clinton Foundation's continued use of the server-based USIS kill lists.

4. United States Marine Field McConnell offers to show Donald Trump how to dismantle the USIS server-based kill lists and bring Clinton and Marcy – Field McConnell's sister!! – and their co-conspirators to justice. (http://www.abeldanger.net/2010/01/field-mcconnell-bio.html).

Khobar Towers bombing
  

BREAKING! Benghazi Cover-up Link to Petraeus and Col. Ted Westhusing's Death in Iraq
 

Comey: Clinton Made United States Secrets Vulnerable To Hostile Actors

James Comey over Hillary Clinton e-mail investigation

OUCH! Rep. Jim Jordan hammers James Comey over Hillary Clinton e-mail investigation
  

Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! [Note HSBC, British and Saudi Governments and Goldman Sachs]

Top HSBC [Serco's dirty banker] Executive Arrested In US For Front-Running Trades


White's Club death-bet bookmaker service dates back to 1743 only the technology to spot fix the Zulu time of victim death has changed.

Defense Ammunition Center [Outsourced to Serco]

Serco... Would you like to know more? 

"Digital Fires Instructor Serco - Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action."

"Saudi arrested in 1996 Khobar Towers bombing that killed 19 Americans 
August 27, 2015 Updated: August 27, 2015 11:23 AM DUBAI // 

A man described as the mastermind of the 1996 Khobar Towers bombing that killed 19 American servicemen in Saudi Arabia has been captured, a US and a Saudi official said Wednesday, ending a nearly two-decade manhunt for one of the FBI’s most-wanted terrorists.

Ahmed al-Mughassil was arrested in Beirut and transferred to Riyadh, according to the Saudi newspaper Asharq Alawsat. The Saudi Interior Ministry and Lebanese authorities had no immediate comment on the capture.

The 48-year-old suspect was described by the FBI in 2001 as the head of the armed wing of the once-active but shadowy Saudi Hezbollah group. The FBI had offered a US$5 million reward for information leading to his arrest.

The June 25, 1996, truck bombing at the Khobar Towers, an eight-story dormitory in eastern Saudi Arabia for US Air Force personnel assigned to the Gulf, killed 19 Americans and wounded 372 more. It was the deadliest such attack targeting US forces since the 1983 bombing of the US Marines' barracks in Beirut that killed 241 American servicemen.

Al-Mughassil, also known as Abu Omran, is one of 14 people named in a 2001 indictment in Alexandria, Virginia, in connection with the bombing. Charges include murder of federal employees and bombing resulting in death.

The US indictment said that elements of the Iranian government inspired, supported and supervised members of the Saudi Hezbollah group in the Khobar Towers attack, but it stopped short of naming any Iranian officials.

The Asharq Alawsat newspaper said al-Mughassil was arrested after Saudi authorities identified his whereabouts in Lebanon.

A Saudi official told The Associated Press that al-Mughassil was detained two weeks ago after arriving in Beirut from Iran. He allegedly tried to seek cover in a southern Beirut neighborhood that is a stronghold of Lebanon’s Hezbollah. The security official said Saudi intelligence believes that four others wanted in the bombing are living in Iran.

The Saudi and US officials spoke on condition of anonymity because they were not authorised to publicly discuss the matter.

Saudi Arabia has never directly blamed Iran – its regional rival – for the attack, and Iran has repeatedly denied being involved.

In 2006, US District Judge Royce C Lamberth ruled the Iranian government financed the bombing, ordering it to pay US$254 million to the attack’s victims.

US State Department spokesman John Kirby declined to comment on the capture but said: “The United States continues to stand with the victims and families harmed by this attack, and we’re going to continue working with Saudi Arabia and the international community to bring to justice all the perpetrators of it."

The US Justice Department also declined to comment.

FBI Director James Comey was the assistant US attorney in Virginia who handled the investigation of the Khobar Towers bombing.

In the attack, militants parked a fuel tanker truck just outside the shallow perimeter of the apartment complex, 85 feet from one of the dormitories. The blast tore the face off one side of the building, leaving a massive crater.

The US later moved its Air Force contingent to a compound in a remote stretch of desert south of Riyadh before withdrawing its troops from the kingdom in 2003.

Details of al-Mughassil’s life remain elusive. He was born in Saudi Arabia's eastern city of Qatif, a predominantly underdeveloped Shiite region that is home to the kingdom's vast oil reserves. Toby Matthiesen, who has written extensively on Saudi Shiites in a book titled "The Other Saudis," said al-Mughassil was rumoured to have gone to Iran after the 1979 revolution and is believed to have fought at some point in Lebanon’s 15-year civil war that ended in 1990."

"Materiel (from the French matériel for equipment or hardware, related to the word material, and sometimes so spelled in English) is military technologyand supplies in military and commercial supply chain management. In a military context, materiel relates to the specific needs of a force to complete a specific mission. The term is also often used in a general sense ("men and materiel") to describe the needs of a functioning army. Materiel management consists of continuing actions relating to planning, organizing, directing, coordinating, controlling, and evaluating the application of resources to ensure the effective and economical support of military forces. It includes provisioning, cataloging, requirements determination, acquisition, distribution, maintenance, and disposal. The terms "materiel management", "materiel control", "inventory control", "inventory management", and "supply management" are synonymous.[1] Military materiel is often shipped to and used in severe climates without controlled warehouses and material handling equipment. Packaging and labeling often needs to meet stringent technical specifications to help ensure proper delivery and final use.[2] Materiel in the commercial distribution context comprises the items being moved by the services of or as the products of the business, as distinct from those involved in operating the business itself."

"Outsourcing of US Security Clearances, how USIS happened 
Posted on October 10, 2014 
by Daniel Jackson In the past, the U.S. government has often looked to private corporations to address urgent matters of national security or help overcome strategic shortfalls in times of need. From the establishment of the Pinkerton National Detective Agency in 1850, to the use of General Motors factories for weapons systems manufacturing during World War II, and finally to the massive increase in federal contracting in the years since September 11th, 2001 the United States has had a long and tumultuous relationship with federal contractors.

The advantage of these business relationships is that they have enabled the US Government to contract out for services or goods that could not be as adequately acquired through federal acquisition practices. In short, critical needs were met. The fact that fraud also increased was not lost on either the government or contractors, but it was not until contingency operations slowed that accountability was catalogued through the Gansler [1], SIGIR [2], and SIGAR [3] reports. Indeed, the US government has struggled with the speed, efficiency, and bureaucracy of its acquisition practices for some time. Evidence of this is seen in the expanding and contracting of government regulations, especially with respect to the current preferences to utilize commercial practices whenever possible [4].

Some of this is obvious as the government cannot fire and hire as quickly as a private company due to personnel regulations and unions, and therefore cannot increase employee numbers as part of a response to an emergency or shortfall like a private company. In some ways the private model is uniquely adaptable to contingencies in that temporary employment agreements, a tool not usually available to the government and only recently in the form of term appointments, allows vendors to increase and decrease manning commensurate with the contingency.

However, there are some significant disadvantages to outsourcing. The fact that contractors work for the government, often in government offices, but are employees of contractors has muddied the waters. This legal tension has resulted in much controversy over the use of contractor employees to perform functions that are considered inherently governmental [5]. These prohibited activities are listed in sub-part 7.503 of the Federal Acquisition Regulation [6], but even developing this list has been fraught with confusion and interpretation issues. Additional issues arise when the line between contract employees and government employees is blurred [7]. With USIS, the full range of issues involved with contracting out critical services is on display.

USIS was created in 1996 when the Office of Personnel Management privatized its’ investigate branch as part of a larger government downsizing initiative and grew significantly through rounds of capital investment (notably from the Carlyle Group) and public sale to Altegrity [8]. In FY 2012 USIS received $253 Million of its revenue from OPM, which accounted for 67% of total revenue [9]. The September 11, 2001 terrorist attacks on the United States not only changed the country, but also changed the fate of USIS. After these events the government greatly increased its scope, spending and action around the world [10]; which eventually resulted in the named contingency operations Operation Iraqi Freedom and Operation Enduring Freedom. Due to the all of this activity the US government found that its infrastructure to hire, vet and place employees was insufficient [11].

With regard to security clearances the DOD office responsible for clearances and the OPM were found to be falling significantly short of targets, with stories of initial clearance investigations and clearance renewals taking up to a year [12]. This was found to be endangering multiple missions and congress passed the Intelligence Reform and Terrorism Prevention Act of 2004, which mandated new more aggressive timelines for investigation and adjudication of clearances [13]. It was not until the events of the last year and a half that it became clear that this push for faster investigation and adjudication has caused some issues.

While the federal government focus has been on decreasing clearance wait times [14], two other seminal events have shifted that focus to accuracy in investigations and clearance determinations. The first was the tragic Navy Yard Shooting of September 16, 2013 and the second were the revelations of widespread surveillance by the National Security Agency revealed by Edward Snowden. USIS was subsequently found to have had a part in both investigations.

While these issues highlighted the out-sourcing of security clearance investigations, USIS was already under “criminal investigation” as early as June 2013 [15]. The DOJ brought charges against USIS in January, 2014 for circumventing quality reviews, which led to the charges of false claims for the invoiced work that was not actually completed [16]. This was compounded by a cyber-attack in the summer of 2014 [17].

For USIS this turned out to be the last straw. Their existing unilateral option contracts with the Office of Personnel Management were not renewed when they expired in September of 2014 [18]; these contracts were cumulatively valued at $2,456,500,000 (maximum) for three contractors: OPM15-11-C-0015 USIS; OPM15-11-C-0016 KeyPoint Government Solutions; and OPM15-11-C-0017 CACI Premiere [19]. While other agencies have current contracts with USIS, it will be difficult for future government agency contracts considering the responsibility requirements of FAR 9.405 [20]. The damage done to the United States security clearance process is not fully known, but it is clear that the government is no longer able to meet its security clearance needs. Whether other contracts will be awarded to address the shortfall remains to be seen, but in any case, the future likely holds longer delays for security clearances as the government searches for the balance between bureaucracy and accuracy."

"The DHS Preparedness Directorate (IP) has assembled [DMORT] PFO support "go kits" that will be maintained in the National Capital Region (NCR). These kits afford instant connectivity once installed with appropriate security safeguards, without regard to agency firewalls and/or the operating location of the cell. IP will maintain and, when appropriate, move kits to the location of the PFO support staff. The NCR Go Kit can also be used as portable system for the IAC and/or the DHS/IP in the event that COOP locations, IAC, or IP facilities are not operational. The "kits" consist of the following: Quantity Item Description 12 Latitude D600 Notebooks Intel Pentium 4 M (1.8Ghz) 14" SXVGA+ Display; Windows XP Pro w/SP1; Office XP 1024Mb RAM; 40Gb Hard Drive MiniPCI Wireless Card; Dell Logitech, Mouse (USB); Internal 56K Modem; 8-24-24-24X; WDVD/CDRW Combo Drive 90W AC Adapter; Mouse Pad 6 Cell Primary Battery; 128Mb USB Flash Storage Drive (Thumb Drive); 3-Year Limited Warranty plus 3-Year Next Business Day Onsite Service 12 Network Cables Cat 5e 20 Feet 1 Switch Netgear JFS524 2 “16 port switch” 2 Printer Hewlett Packard 5510 All-in-one Printer 16 Power Strips 6 Outlet w/ 15ft Cord 10 Secure Cell Phones PFO, Deputy PFO, COS, OSC Officer, PAO, NOC Rep 12 JRIES JRIES Software (Gov't owned) 1 SIPRNET HSIN/HSDN (SECRET) hardware for portable connectivity. There are 16 of these available at DHS HQS. One of these must be reserved for each PFO support staff in the inte`rim. 1 Shredder Cross cut 2 Copy machines Capable of unclassified and classified photocopying 2 STEs Secret Level 1 FAX Secure with copy capability 12 Protective Masks Quick2000 short-term protective mask with hood; Quick2000 training mask with hood; soft carrying case item 600665 N/A Admin Package Hard Side shipping lockers, admin supplies (pens, paper, files), flashlights, printer supplies, etc. 2 Power Generators" 

"The List of Adrian Messenger is a 1963 mystery film about a retired British intelligence officer (George C. Scott) investigating a series of apparently unrelated deaths. It was directed by John Huston from a screenplay by Anthony Veiller, based on the 1959 novel of the same title by Philip MacDonald. .. A writer named Adrian Messenger (John Merivale) believes a series of apparently unrelated "accidental" deaths are actually linked murders. He asks his friend Anthony Gethryn (George C. Scott), recently retired from MI5, to help clear up the mystery. However, Messenger's plane is bombed while he is en route to collect evidence to confirm his suspicions and, with his dying breath, he tries to tell a fellow passenger the key to the mystery.

The passenger survives and turns out to be Raoul Le Borg (Jacques Roux), Gethryn's old World War II counterpart in the French Resistance. They join forces to investigate Messenger's list of names, and decode Messenger's final cryptic words. They establish that all on the list were together in a prisoner of war camp in Burma, where a Canadian sergeant, George Brougham, betrayed his fellow prisoners, foiling their escape attempt. Each has a reason to kill Brougham. It evolves that Brougham is their killer, but why? They deduce that he is about to come into prominence and cannot risk being recognised. Gethryn and Le Borg establish that he stands in line to an inheritance of the Bruttenholm family, landed gentry who are friends of Gethryn and the late Messenger, and who avidly engage in fox hunting.

Having disposed of all possible witnesses to his wartime treachery, Brougham (Kirk Douglas) appears at a Bruttenholm estate fox hunt and introduces himself as a member of the family (he has previously been seen only in disguise). It then becomes clear to the visiting Gethryn and Le Borg that Brougham's next victim is to be the young heir, Derek. In an attempt to divert Brougham, Gethryn makes known his investigation of Messenger's list, calculating to set himself up as the next victim.

That night, Brougham sabotages the next morning's hunt by laying a drag with a fox in a sack over the fields. He especially marks a blind spot behind a high wall, and moves a large hay tedder behind, intending for Gethryn (who has been given the honour of leading the hunt) to be impaled upon its lethal tines. Unbeknownst to Brougham, his plan goes awry when a farmer repositions the tedder early the next morning. The hunt commences but comes to a halt at the specified spot. Gethryn reveals to the gathered crowd that he discovered and removed the hay-tedder booby trap earlier that morning and, with the help of the lead fox hound, will detect the scent of the culprit amongst a group of hunt saboteurs. Brougham, once again disguised, is identified and runs off, mounting Derek's horse. When Derek shouts a command to the horse, the animal stops short, throwing Brougham and impaling him on the very same machine he intended for Gethryn." 

"The Secret Internet Protocol Router Network (SIPRNet) is "a system of interconnected computer networks used by the U.S. Department of Defense and the U.S. Department of State to transmit classified information (up to and including information classified SECRET) by packet switching over the 'completely secure' environment".[1] It also provides services such as hypertext document access and electronic mail. As such, SIPRNet is the DoD's classified version of the civilian Internet. SIPRNet is the SECRET component of the Defense Information Systems Network.[2] Other components handle communications with other security needs, such as NIPRNet which is used for nonsecure communications, and JWICS which is used for Top Secret communications."

"The Kill List: ICWatch Uses LinkedIn Account Info to Out Officials Who Aided Assassination Program 
MAY 28, 2015 
WikiLeaks has begun hosting a new database called ICWatch, built by Transparency Toolkit. The site includes a searchable database of 27,000 LinkedIn profiles of people in the intelligence community. Organizers say the aim of the site is to "watch the watchers." WikiLeaks founder Julian Assange talks about how the database could be used to help identify individuals connected to the U.S. kill list, formally known as the Joint Prioritized Effects List, or JPEL."

"The Secret Internet Protocol Router Network (SIPRNet) is "a system of interconnected computer networks used by the U.S. Department of Defense and the U.S. Department of State to transmit classified information (up to and including information classified SECRET) by packet switching over the 'completely secure' environment".[1] It also provides services such as hypertext document access and electronic mail. As such, SIPRNet is the DoD's classified version of the civilian Internet. SIPRNet is the SECRET component of the Defense Information Systems Network.[2] Other components handle communications with other security needs, such as NIPRNet which is used for nonsecure communications, and JWICS which is used for Top Secret communications." 

"FBI: 'Hostile Actors' Likely Hacked Clinton Email Secrets 
Comey recommends not prosecuting presumed Democratic nominee 
BY: Bill Gertz 
July 6, 2016 5:00 am 
An extensive FBI investigation found evidence that foreign government hackers accessed private emails sent by former secretary of state Hillary Clinton but no direct evidence spies hacked into the several unsecure servers she used.

FBI Director James Comey revealed Tuesday the 11-month probe into Clinton's private email servers uncovered negligent handling of very sensitive classified information that was placed on several unsecure servers between 2009 and 2013, when Clinton served as secretary of state.

In an unusual public announcement, Comey outlined findings that included discovery of highly classified information sent and received on Clinton's private email servers, and signs that "hostile actors" gained access to email accounts of people who were sharing emails with Clinton."

"William Pickett SME Technical Business Consultant III at SERCO, Inc 
Timestamp: 2015-12-26
Over 30 years experience as a Signals Intelligence (SIGINT) specialist, specifically ELINT, and All-source Intelligence Analyst, with progressive responsibility and expertise involving the following: liaison official, site management, task lead, field testing of new equipment and development, technical and operational ELINT analysis, worked with Arc VIEW database compiling data on radar systems and EIDB sites using Arc GIS Geospatial images to verify site locations and radar locations for 8-10 years, personnel training and all-source research analyst. Post 2001, all assignments were in support of Counter Terrorist activities either at national or local level. Command Watch Officer experience. Independent and a self-starter, always a team player. Always willing to learn and learns new systems quickly. Comfortable working in a fast paced/high pressure/deadline oriented environment. Served as mentor for newly assigned and junior personnel. Also served as a Senior Systems Analyst/Telecommunications Officer in McLean, VA. Additionally served as a Senior Intelligence Analyst/Project Manager for United States Visitor and Immigrant Status Indicator Technology (US-VISIT) in Rosslyn, VA. Served as Sr. Policy Analyst for Department of the Army in Alexandria, VA. Currently working as SME Technical Business Consultant III applying Lean Six Sigma (LSS) Principles to improve work processes in Springfield, VA.SPECIAL SKILLS: Knowledgeable in Microsoft Office, XP, Outlook, Word, Access, PowerPoint, VISIO, MS Project and Excel spreadsheet. Familiar with SIGINT Policies, Regulations, and USSIDs. Comprehensive knowledge of WRANGLER, EOB, MIDB, GALELIGHT, EPL, KILTING, Anchory, SKYWRITER, PATHFINDER, INTELINK and various other ELINT and GEMINI Imagery databases. Analyzed satellite imagery for fusing imagery with SIGINT in a team/individual effort to track movement of radar systems. Comfortable working in a fast paced/high pressure/deadline oriented environment. Also worked with Arc VIEW database compiling data on radar systems and EIDB sites using Geospatial images to verify site locations and radar locations for 8-10 years. Working knowledge of TEE PRO PLUS in facilitating KILTING database updates and SKYWRITER for writing ELTs, ELOs and ELSs. Comfortable using Power Point to present briefings. Familiar with JWICS, NSANET, SIPRNET, and NIPRNET. Additionally, familiar with Lotus Notes, SAMETIME, CWE, Terrorist Information Datamart Environment, National Counter-Terrorism Center online, CIS, Arrival and Departure Information System, and Treasury Enforcement Communications System.


 intelink sigintenhanced prophet SIGINT"Agent Logic"RC/10oneroof sigintELINTSIGINT interceptNSANetWRANGLER SIGINTkiltingCEDES SIGINTGALE/LITEGistqueueTSAR SIGINTMIDB"Consolidated Exploitation and Data Exchange System"WHIPPOORWILL SIGINT"FOXTRAIL" NSA"GHOSTMACHINE" NSA"WEALTHYCLUSTER""ECHELON" SIGINTICGOVCLOUD"GLOBALREACH" NSA
 http://www.thedailysheeple.com/another-fast-and-furious-confidential-email-proves-hillary-clinton-supplied-al-qaida-with-weapons-through-benghazi-embassy_082016

"Loan Improvement 
Jan 31, 2001 
SBA modernizes to help feed its growing programs [Field McConnell's sister Kristine Marcy introduced the 8(a) electronic accelerated loan guarantee program at SBA to ensure funding for the Serco protégés' participating in the 9/11 carbon cap]
BY PATRICIA DAUKANTAS | GCN STAFF 
Under a five-year plan for overhauling its information technology systems, the Small Business Administration recently acquired new software for financial and other administrative tasks.

By the time SBA celebrates its 50th anniversary in 2003, agency officials want all their programs up and running around the clock, chief financial officer Joseph Loddo said.

In the first phase of the modernization, the agency has upgraded systems for managing its extensive portfolio of guaranteed loans, chief operating officer Kristine Marcy said.

SBA processed its first electronic loan last November through its Sacramento, Calif., office and plans to add more private lenders during fiscal 2001.

The agency's staffing level has dropped 22 percent over the past eight years, which is another reason to improve IT, Marcy said. Over the past decade, SBA's portfolio of loans to small and disadvantaged businesses has more than doubled to $50 billion.

'We're a small agency with a huge portfolio,' Marcy said. SBA supplies more than half of the U.S. venture capital available each year.

Seventy percent to 80 percent of the loans are booked through a preferred lender program [structured by Serco], which involves nearly 7,000 banks, Marcy said. SBA guarantees the loans, just as the government backs student and housing loans.

'The financial and IT businesses were changing so rapidly, we had to make some changes to stay current with the private sector,' Marcy said. Banks had been asking SBA to make faster decisions on loan guarantees. The agency decided to aim for a turnaround time of one hour."

"Serco do a bunch more that didn't even make our story: As well as thanking God for his success, CEO Chris Hyman is a Pentecostal Christian who has released a gospel album in America and fasts every Tuesday. Amazingly, he was also in the World Trade Centre on 9/11, on the 47th floor addressing [Serco] shareholders. Serco run navy patrol boats for the ADF, as well as search and salvage operations through their partnership with P&O which form Defence Maritime Services. Serco run two Australian jails already, Acacia in WA and Borallon in Queensland. They’re one of the biggest companies In the UK for running electronic tagging of offenders under house arrest or parole." 

"UK Cabinet Office – Emergency Planning College – Serco …..Types of Exercise 
Workshop Exercises These are structured discussion events where participants can explore issues in a less pressurised environment. They are an ideal way of developing solutions, procedures and plans rather than the focus being on decision making. Table Top Exercises These involve a realistic scenario and will follow a time line, either in real-time or with time jumps to concentrate on the more important areas. The participants would be expected to be familiar with the plans and procedures that are being used although the exercise tempo and complexity can be adjusted to suit the current state of training and readiness. Simulation and media play can be used to support the exercise. Table-top exercises help develop teamwork and allow participants to gain a better understanding of their roles and that of other agencies and organisations. Command/Control Post Exercises These are designed primarily to exercise the senior leadership and support staff in collective planning and decision making within a strategic grouping. Ideally such exercises would be run from the real command and control locations and using their communications and information systems [Feeling lucky, Punk?]. This could include a mix of locations and varying levels of technical simulation support. The Gold Standard system is flexible to allow the tempo and intensity to be adjusted to ensure maximum training benefit, or to fully test and evaluate the most important aspects of a plan. Such exercises also test information flow, communications, equipment, procedures, decision making and coordination. Live Exercises These can range from testing individual components of a system or organisation through to a full-scale rehearsal. They are particularly useful where there are regulatory requirements or with high-risk situations. They are more complex and costly to organise and deliver but can be integrated with Command Post Exercises as part of a wider exercising package.”

"Serco farewell to NPL after 19 years of innovation 8 January 2015 Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco's management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK's economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade…. NPL's caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading [for Serco's front running banks] in the City through NPL [Zulu] Time."

"Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994. This file was obtained from the Secretary of State and has a file number of 1795583.

This business was created 7,695 days ago in the New York SOS Office and the registered agent is C T Corporation System that does business at 111 Eighth Avenue , New York in New York.

After conducting a search for principals and owners of Base One Technologies, Ltd., we were able to find 2 owners and/or executives. Their information is listed below.

This file was last updated on May 14, 2013.

Principals 
Liza R Zaneri 
Chief Executive Officer 
15 Irving Place New 
Rochelle, NY 10801"

"Serco's Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals." http://www.dtic.mil/whs/directives/corres/pdf/100515p.pdf 

"[White's Club member] Rupert Christopher Soames OBE (born 18 May 1959) is a British businessman, CEO of the outsourcing [and long range death-betting bookmaker] company Serco.[1] Soames was born in Croydon, Surrey, to Lord and Lady Soames. He is a grandson of Sir Winston Churchill, a nephew of the former Defence Secretary Duncan Sandys and Diana Churchill; the journalist Randolph Churchill and the actress and dancer Sarah Churchill and a great-nephew of the founders of the Scout movement, Robert Baden-Powell and Olave Baden-Powell. His brother is the Conservative MP Sir Nicholas Soames.

Education[edit]

Soames was educated at St. Aubyns Preparatory School in Rottingdean, East Sussex and Eton College,[2] and then Worcester College at the University of Oxford,[3] during which time he worked as a DJ at the London nightclub Annabel's, as well as being elected to the Presidency of the Oxford Union.[3] Career[edit]

Upon graduation, he was offered a position at General Electric Company (GEC) by the managing director Arnold Weinstock. He remained at GEC for 15 years, working in the company's avionics and computing divisions, and became managing director of Avery Berkel, running the company's UK, India, Asia and Africa operations.[4]

After leaving GEC in 1997, Soames joined the software company Misys as chief executive of its Midas-Kapiti division. He was promoted to chief executive of the Banking and Securities Division in June 2000.[5]

Soames left Misys after a disagreement with Misys founder Kevin Lomax on the company's direction, and was appointed chief executive of power hire group Aggreko in June 2003,[6] replacing Philip Harrower who died when his car collided with a train in the United States.[7]

Soames was appointed Officer of the Order of the British Empire (OBE) in the 2010 New Year Honours.[8] In November 2010 Rupert Soames gave a speech to Holyrood in which he warned, "In the UK, we are already close to the rocks, because, over the next 8 years a third of our coal-fired capacity, two-thirds of our oil-fired capacity, and nearly three-quarters of our nuclear capacity will be closed down either through age or the impact of the European Large Combustion Plant Directive. Absent a massive and immediate programme of building new power stations, with concrete being poured in the next two years, we will be in serious danger of the lights going out."

Yours sincerely,


Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222

David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation

No comments:

Post a Comment

Who's visiting Abel Danger
view a larger version of the map below at whos.amung.us

You Too can be a CAPTAIN SHERLOCK