Thursday, October 20, 2016

#2811: Clinton's Zulu Bridge of 8(a) Treason – Boeing In-Flight Serco Snuff – Captain Chic's Hawkeye Zone – A-3 PENREN Drone

United States Marine Field McConnell 
Plum City Online - (AbelDanger.net
October 20, 2016

1. Abel Danger (AD) claims that on 9/11, Hillary Clinton helped treasonous, bribed or terrified owners of 8(a) protege companies launch Zulu-timed attacks on key mentors of the Federal Bridge Certification Authority namely Boeing, Northrop Grumman, Raytheon and Lockheed Martin.

2. AD claims that in 2001, the Clinton used Serco – a preferred supplier of C4I systems to Boeing – to develop an in-flight snuff-film capability based on Boeing patent application 'Mobile wireless local area network and related methods US 6990338 B2.'

3.AD claims that a Serco 8(a) company fed Zulu timing signals to a Northrop Grumman Hawkeye aircraft off the USS George Washington to decoy Captain Chic Burlingame's Boeing 757-223 of AA Flight 77 into an Atlantic drop (crash) zone (W386A) on 9/11.

4. AD claims that a Serco 8(a) company fed Zulu timing signals through the $4.3 billion PENREN project to a modified Raytheon A-3 Skywarrior which allegedly executed a drone maneuver to take out the Pentagon's US Command Center on 9/11.

5. United States Marine Field McConnell has briefed Donald Trump on how Clinton used treasonous 8(a) companies embedded by Serco and key mentors in the federal bridge to produce what has been described as the "first live broadcast mass snuff film in human history".


Hillary Clinton vs. James Comey: Email Scandal Supercut 

DRONE A-3 Skywarrior 9/11 PENTAGON ATTACK (Slow Motion)
 

E-2C Hawkeye launching from USS George Washington
 

Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! [Note British and Saudi Governments, AXA, HSBC, Teachers' and Goldman Sachs] 
 

Defense Ammunition Center [Outsourced to Serco]
 

Serco... Would you like to know more? 


"Digital Fires Instructor Serco - Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action."

"(After 9:37 a.m.) September 11, 2001: Aircraft Carriers Called to Defend US; Uncertainty Over When This Happens 
The USS George Washington. [Source: Summer Anderson / Department of Defense] After the attack on the Pentagon, [When the Navy Command Center was taken out] Navy ships and aircraft squadrons that are stationed, or at sea, along the coast of the United States are, reportedly, "rapidly pressed into action [by whom?]" to defend the country. Chief of Naval Operations Admiral Vern Clark is evacuated from his office in the Pentagon after the building is hit, and soon relocates to the Navy's Antiterrorist Alert Center in southeast Washington, DC, where a backup Navy command center is being established (see After 9:37 a.m. September 11, 2001). Clark later explains, “We had carriers at sea. I talked to Admiral Natter [Adm. Robert J. Natter, commander in chief, US Atlantic Fleet] and Admiral Fargo [Adm. Thomas B. Fargo, commander in chief, US Pacific Fleet] about immediate loadouts [of weapons and armed aircraft] and the positioning of our air defense cruisers. Fundamentally, those pieces were in place almost immediately and integrated into the interagency process and with the FAA [Federal Aviation Administration]." The aircraft carrier USS George Washington is currently at sea conducting training exercises. It is dispatched to New York, “following the recovery of armed F-14 Tomcats and F/A-18 Hornets from Naval Air Station Oceana," in Virginia Beach, Virginia. According to Sea Power magazine, another aircraft carrier—the USS John F. Kennedy—that is departing Mayport, Florida, is ordered to patrol the waters off Hampton Roads, Virginia, "to protect the Navy’s vast shore complex in Norfolk."

Yet, according to CNN, it is not until 1:44 p.m. that the Pentagon announces that five warships and two aircraft carriers—the USS George Washington and the USS John F. Kennedy—are to depart the Naval Station in Norfolk, Virginia, so as to protect the East Coast (see 1:44 p.m. September 11, 2001). [CNN, 9/12/2001] And, according to some reports, the Navy only dispatches missile destroyers toward New York and Washington at 2:51 p.m. [WASHINGTON]" 

"Mobile wireless local area network and related methods 
US 6990338 B2 
ABSTRACT 
A wireless local area network adapted for use by users traveling on a mobile platform such as an aircraft. The network includes a network server located on the mobile platform, and at least one network access point connected to the server and accessible wirelessly by at least one user portable electronic device over one of a plurality of non-overlapping network frequency channels. The RF characteristics of this wireless network are specifically tailored to meet applicable standards for electromagnetic compatibility with aircraft systems and RF exposure levels for passengers and flight crews."

"Serco Receives "Supplier of the Year" from Boeing for Enterprise Architecture Expertise 
RESTON, VA (PRWEB) MAY 19, 2011 
Serco Inc., a provider of professional, technology, and management services to the federal government, has been recognized as Supplier of the Year by The Boeing Company in the Technology category for its state-of-the-practice Enterprise Architecture solutions.

The Boeing Supplier of the Year award is the company's premier supplier honor, presented annually to its top suppliers in recognition of their commitment to excellence and customer satisfaction. This year's 16 winners represent an elite group among more than 17,525 active Boeing suppliers in nearly 52 countries around the world. This selection was based on stringent performance criteria for quality, delivery performance, cost, environmental initiatives, customer service and technical expertise. This is the second time Serco has been recognized as Supplier of the Year by Boeing. In January 2011, Serco also received the Boeing Performance Excellence Gold Award in recognition of the Company's performance excellence.

"We are extremely honored to receive this recognition for our work in support of Boeing. This prestigious award demonstrates our passion for excellence and ability to apply Serco's Enterprise Architecture expertise across a broad range of applications," said Ed Casey, Chairman and CEO of Serco. “We continue to grow our EA practice, and over the past 15 years we have deployed solutions to support enterprises and systems across federal and commercial environments."

Serco's Enterprise Architecture Center of Excellence is based in Colorado Springs, CO. The team provides a variety of services in support of Boeing’s business units as well as research and development efforts. Serco's architecture employs object-oriented (OO)/Unified Modeling Language (UML) to define, design and satisfy defense agencies' mission-critical requirements, including Command, Control, Communications, Computers and Intelligence (C4I). This approach improves system developer's understanding of operational requirements and how best to integrate enterprise operations and systems for the optimal fulfillment of C4I and other operational needs.

About Serco Inc.: Serco Inc. is a leading provider of professional, technology, and management services focused on the federal government. We advise, design, integrate, and deliver solutions that transform how clients achieve their missions. Our customer-first approach, robust portfolio of services, and global experience enable us to respond with solutions that achieve outcomes with value. Headquartered in Reston, Virginia, Serco Inc. has approximately 11,000 employees, annual revenue of $1.5 billion, and is ranked in the Top 30 of the largest Federal Prime Contractors by Washington Technology. Serco Inc. is a wholly-owned subsidiary of Serco Group plc, a $6.6 billion international business that helps transform government and public services around the world. More information about Serco Inc. can be found at http://www.serco-na.com."

"Digital display device US 4788539 A ABSTRACT A digital device for visually displaying the value of a generally continuously varying function, such as car speed. The device displays subranges of a full scale, putting them individually in a viewing area. The displayed subranges in the viewing area will be replaced as required to permit representation of the input function over the full scale. The device allows selection of a new subrange with the property that the input function value initially will be at an interior position in the new subrange, thereby preventing repeated rapid switching between subranges. The subrange display can be defined using scale markers in just a few fixed positions in the viewing area. … The flickering can be a distracting visual flashing. For example, five of seven segments are changing in a transition between a "1" and a "2" digit, and several digits may be changing simultaneously. This can be dangerous, as in the case of driving an automobile. An appropriate rate of flashing may even induce "flicker vertigo" in some people, and this can produce a trance-like state.

"Christopher Rajendran Hyman CBE (born 5 July 1963 in Durban, South Africa)[1] was Chief Executive of Serco Group plc from 2002 to October 2013.[2] … On graduation, he worked for Arthur Andersen. In 1989, he won an 18-month exchange with Ernst & Young in London, who employed him after four months.[1] Head hunted in 1994 by Serco, Hyman became European finance director, and in 1999 was made group finance director. In 2002, Hyman became chief executive. .. Hyman resigned from his role of Chief Executive of Serco on 25 October 2013 following allegations that Serco had overcharged government customers. .. He was [making a presentation to Serco shareholder, including British and Saudi governments] on the 47th floor of the World Trade Center [North Tower] at the time of the September 11 attacks in 2001."

"Developments in PKI occurred in the early 1970s at the British intelligence agency GCHQ, where James Ellis, Clifford Cocks and others made important discoveries related to encryption algorithms and key distribution.[19] However, as developments at GCHQ are highly classified, the results of this work were kept secret and not publicly acknowledged until the mid-1990s.

The public disclosure of both secure key exchange and asymmetric key algorithms in 1976 by Diffie, Hellman, Rivest, Shamir, and Adleman changed secure communications entirely. With the further development of high-speed digital electronic communications (the Internet and its predecessors), a need became evident for ways in which users could securely communicate with each other, and as a further consequence of that, for ways in which users could be sure with whom they were actually interacting.

Assorted cryptographic protocols were invented and analyzed within which the new cryptographic primitives could be effectively used. With the invention of the World Wide Web and its rapid spread, the need for authentication and secure communication became still more acute. Commercial reasons alone (e.g., e-commerce, online access to proprietary databases from web browsers) were sufficient. Taher Elgamal and others at Netscape developed the SSL protocol ('https' in Web URLs); it included key establishment, server authentication (prior to v3, one-way only), and so on. A PKI structure was thus created for Web users/sites wishing secure communications.

Vendors and entrepreneurs saw the possibility of a large market, started companies (or new projects at existing companies), and began to agitate for legal recognition and protection from liability. An American Bar Association technology project published an extensive analysis of some of the foreseeable legal aspects of PKI operations (see ABA digital signature guidelines), and shortly thereafter, several U.S. states (Utah being the first in 1995) and other jurisdictions throughout the world began to enact laws and adopt regulations. Consumer groups raised questions about privacy, access, and liability considerations, which were more taken into consideration in some jurisdictions than in others.

The enacted laws and regulations differed, there were technical and operational problems in converting PKI schemes into successful commercial operation, and progress has been much slower than pioneers had imagined it would be.

By the first few years of the 21st century, the underlying cryptographic engineering was clearly not easy to deploy correctly. Operating procedures (manual or automatic) were not easy to correctly design (nor even if so designed, to execute perfectly, which the engineering required). The standards that existed were insufficient.

PKI vendors have found a market, but it is not quite the market envisioned in the mid-1990s, and it has grown both more slowly and in somewhat different ways than were anticipated.[20] PKIs have not solved some of the problems they were expected to, and several major vendors have gone out of business or been acquired by others. PKI has had the most success in government implementations; the largest PKI implementation to date is the Defense Information Systems Agency (DISA) PKI infrastructure for the Common Access Cards program." 

Base One Technologies – Corporate Strategy – We are a Government Certified Women-Owned Business We practice Diversity Recruitment and Staffing for IT positions Base One was founded in 1994 by a women engineer who had made a career in technology research for many years. Base One has been very successful in focusing on diversity recruiting and staffing for IT projects. It has been our experience that the greater the diversity mix, the more creative the solution. As in any field the more diverse the viewpoint the more thorough your analysis. Our engineers can think out of the box.

Because of our affiliations we have access to pools of resources among more diverse groups & individuals. We work with a large pool of minority professionals who specialize in IT skills. We are able to have access to these resources through our status as a D/MWBD firm and our affiliations. These affiliations assist us in working with resources among more diverse groups & individuals. We are also partnered with firms that are 8A certified as Minority firms, Disabled Veteran firms, Native American firms, Vietnam veteran firms, women owned firms.

Our hub zone location keeps us close to the professional organizations of great diversity. We are active in recruiting from and networking with these community organizations of local IT professionals. This has given us access to a large pool of diversity talent.

Base One's staff of engineers are a diverse group of professionals. This diverse network of engineers helps us to branch out to other engineers and creates an even larger network of resources for us to work with.

The greater the diversity the more complete & thorough the analysis. The broader the spectrum of points of view the broader the scope of the analysis. We feel that a diverse team gives us a greater advantage in creating cutting edge solutions. To that end we will continue to nurture these relationships to further extend our talent pool.

The greater the diversity mix, the more creative the solution.

The more diverse the viewpoint, the more thorough the analysis.

The more diverse our team, the more our engineers can think out of the box.

This is why Base One Technologies concentrates on diversity recruitment in the belief that a diverse team gives us a greater advantage in creating cutting edge solutions."

Information Security Planning is the process whereby an organization seeks to protect its operations and assets from data theft or computer hackers that seek to obtain unauthorized information or sabotage business operations.

Key Clients Benefiting From Our Information Security Expertise: Pentagon Renovation Program, FAA, Citigroup, MCI.

Base One Technologies

Expertly researches, designs, and develops information security policies that protect your data and manage your firm's information technology risk at levels acceptable to your business.

Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report.

Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions."

"Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994. This file was obtained from the Secretary of State and has a file number of 1795583."

"Serco's Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals." http://www.dtic.mil/whs/directives/corres/pdf/100515p.pdf

"Opened in 1994 as the successor to the Transitional Immigrant Visa Processing Center in Rosslyn, Va., the NVC centralizes all immigrant visa pre-processing and appointment scheduling for overseas posts. The NVC collects paperwork and fees before forwarding a case, ready for adjudication, to the responsible post.

The center also handles immigrant and fiancé visa petitions, and while it does not adjudicate visa applications, it provides technical assistance and support to visa-adjudicating consular officials overseas.

Only two Foreign Service officers, the director and deputy director, work at the center, along with just five Civil Service employees. They work with almost 500 contract employees doing preprocessing of visas, making the center one of the largest employers in the Portsmouth area.

The contractor, Serco, Inc., has worked with the NVC since its inception and with the Department for almost 18 years.

The NVC houses more than 2.6 million immigrant visa files, receives almost two million pieces of mail per year and received more than half a million petitions from the U.S. Citizenship and Immigration Service (USCIS) in 2011. Its file rooms' high-density shelves are stacked floor-to-ceiling with files, each a collection of someone’s hopes and dreams and each requiring proper handling. ….

The NVC also preprocesses the chief of mission (COM) application required for the filing of a petition for a Special Immigrant Visa (SIV). Such visas, for foreign nationals who have performed services for the U.S. government in Iraq and Afghanistan, require COM concurrence before the applicant can file a petition with USCIS. The NVC collects the requisite documents from such applicants and, when complete, forwards the package to the U.S. embassies in Baghdad or Kabul for COM approval"

"Serco farewell to NPL after 19 years of innovation 8 January 2015 Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco's management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK's economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade…. NPL's caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading [for Serco's front running banks] in the City through NPL [Zulu] Time."

“UK Cabinet Office – Emergency Planning College – Serco …..Types of Exercise Workshop Exercises These are structured discussion events where participants can explore issues in a less pressurised environment. They are an ideal way of developing solutions, procedures and plans rather than the focus being on decision making. Table Top Exercises These involve a realistic scenario and will follow a time line, either in real-time or with time jumps to concentrate on the more important areas. The participants would be expected to be familiar with the plans and procedures that are being used although the exercise tempo and complexity can be adjusted to suit the current state of training and readiness. Simulation and media play can be used to support the exercise. Table-top exercises help develop teamwork and allow participants to gain a better understanding of their roles and that of other agencies and organisations. Command/Control Post Exercises These are designed primarily to exercise the senior leadership and support staff in collective planning and decision making within a strategic grouping. Ideally such exercises would be run from the real command and control locations and using their communications and information systems [Feeling lucky, Punk?]. This could include a mix of locations and varying levels of technical simulation support. The Gold Standard system is flexible to allow the tempo and intensity to be adjusted to ensure maximum training benefit, or to fully test and evaluate the most important aspects of a plan. Such exercises also test information flow, communications, equipment, procedures, decision making and coordination. Live Exercises These can range from testing individual components of a system or organisation through to a full-scale rehearsal. They are particularly useful where there are regulatory requirements or with high-risk situations. They are more complex and costly to organise and deliver but can be integrated with Command Post Exercises as part of a wider exercising package."

Yours sincerely,


Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222

David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation

No comments:

Post a Comment

Who's visiting Abel Danger
view a larger version of the map below at whos.amung.us

You Too can be a CAPTAIN SHERLOCK