United States Marine Field McConnell
Plum City Online - (AbelDanger.net)
October 22, 2016
1. Abel Danger (AD) claims that on October 9, 2001, Hillary Clinton's associates at DOJ Pride used various unlawfully-delegated powers of the Federal Bridge Certification Authority (UK MOD!) to have letters containing anthrax-laden patented spore powder mailed to Democratic U.S. Senators Tom Daschle and Patrick Leahy.
2. AD claims that Clinton's aides hired Serco 8(a) companies to equip the leaders of DOJ Pride and the pay-to-play donors to the Clinton Foundation with the federal bridge servers which they allegedly used to bypass the U.S. National Command Authority and stage 9/11 and the subsequent anthrax attacks of 2001.
3. AD claims that Clinton is using DOJ Pride's Asset Forfeiture Fund as a death-betting bank where her donors deploy Serco 8(a) companies to procure and track patented devices on the federal bridge and bet on victim deaths in Zulu time.
4. United States Marine Field McConnell – Global Operations Director of Abel Danger – has offered to serve as a five-star general in a Trump administration and win an asymmetric war with Serco and DOJ Pride associates of patent lawyer Hillary Clinton.
Hillary Clinton vs. James Comey: Email Scandal Supercut
Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! [Note British and Saudi Governments, AXA, HSBC, Teachers' and Goldman Sachs]
Defense Ammunition Center [Outsourced to Serco]
Serco... Would you like to know more?
"Digital Fires Instructor Serco - Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action."
"Serco Processes 2 Millionth Patent Application for U.S. Patent and Trademark Office
Date: 18 Mar 2013
Serco Inc., a leading provider of professional, technology, and management services to the federal government, announced today that their Pre-Grant Publication (PGPubs) Classification Services team recently processed their 2 millionth patent application for the U.S. Patent & Trademark Office (USPTO). Each application was also processed within the contractually required 28-day window."
"A Crime Unlike Any Other
What the Facts Say About Dr. Bruce Edwards Ivins and The Anthrax Attacks of 2001 Authored by Edward G Lake
The anthrax letter attacks of 2001 resulted in a seven year investigation that the FBI described as "one of the largest and most complex in the history of law enforcement."
However, because nearly seven years passed before the public was made aware of who the FBI had determined was the lone perpetrator, the public's view of the case was muddled by wildly inaccurate news reporting, by a constant barrage of conspiracy theories, and by wild distortions of the actual facts of the case by people who had their own beliefs about who sent the letters and why. ….Understanding sporulation is the key to understanding the importance of Step #4. One web site described sporulation this way: "When conditions become hostile to the anthrax bacillus — if it runs out of food, becomes too cold, too dry, too low in carbon dioxide — it resorts to a defense mechanism. The DNA and other essential cell matter gather together near the middle of the cell, and a hard wall forms around this cluster. This is the spore. "As if in hibernation, the anthrax spore waits inside the carcass of a now-dead cell, waiting for more hospitable conditions. Sporulation is key for the bacteria’s survival in nature, and also key for its use as a weapon."
Was the "debris" that apparently constituted about 90 percent of the "powder" found in the New York Post letter just the natural "debris" left behind from sporulation? I.e., was it just dead "mother cells" and dead anthrax germs that failed to sporulate?
If so, it tells us a lot about the culprit. It tells us he hoped the unrefined anthrax he sent to the media would accomplish his mission. When it accomplished nothing, he then moved ahead to steps #4 and #5. It tells us he hesitated before actually refining the anthrax and demonstrating that he knew more about the refinement process than a routine terrorist. It tells us he's a scientist. It makes it a near certainty that the anthrax was being refined during the 3 week period between mailings - and most likely during the last week and a half or two weeks of that time frame, after he learned that his first mailing had failed to achieve its purpose. It tells us he was probably using specialized equipment and labor intensive procedures during that period. It tells us it is extremely unlikely that the refining was done in another country."
"The 2001 anthrax attacks, also known as Amerithrax from its Federal Bureau of Investigation (FBI) case name, occurred within the United States over the course of several weeks beginning on September 18, 2001, one week after the September 11 attacks. Letters containing anthrax spores were mailed to several news media offices and two Democratic U.S. Senators, killing five people and infecting 17 others. According to the FBI, the ensuing investigation became "one of the largest and most complex in the history of law enforcement." .. Two more anthrax letters, bearing the same Trenton postmark, were dated October 9, three weeks after the first mailing. The letters were addressed to two Democratic Senators, Tom Daschle of South Dakota and Patrick Leahy of Vermont. At the time, Daschle was the Senate Majority leader and Leahy was head of the Senate Judiciary Committee. The Daschle letter was opened by an aide, Grant Leslie, on October 15, and the government mail service was shut down. The unopened Leahy letter was discovered in an impounded mailbag on November 16. The Leahy letter had been misdirected to the State Department mail annex in Sterling, Virginia, because a ZIP code was misread; a postal worker there, David Hose, contracted inhalational anthrax."
"Method of manufacturing a silica powder
US 6071487 A
ABSTRACT In the method, a suspension of silica particles in water is provided, the suspension is gelled, the resulting gel is dried under microwaves, the dried gel is fractioned into silica granules having a diameter lying in the range 10 μm to 1000 μm, having an apparent density of about 0.5 g/cm3 to 0.6 g/cm3, and a porosity of less than 20%, and the granules are screened in the range 100 μm to 500 μm. The suspension in water of silica particles is made by mixing silica soots having a size of less than 0.1 μm and silica grains having a size greater than 1 μm. Its maximum concentration in total weight is greater than that of a suspension of synthetic soots on their own, thereby making it possible to increase the production capacity of the method. Advantageously, the out-of-range granules rejected by the screening are recycled as silica grains for the aqueous suspension, thereby making it possible to increase the accumulated production efficiency of the method.
Publication number: US6071487 A
Publication type: Grant
Application number: US 09/116,337
Publication date: Jun 6, 2000
Filing date: Jul 16, 1998
Priority date: Jul 17, 1997
Fee status: Paid
Also published as: DE69800501D1, DE69800501T2, EP0891946A1, EP0891946B1
Inventors: Jean-Florent Campion, Jacques Goudeau, Jean-Francois Chariot, Christelle Lavallade
Original Assignee: Alcatel
Export Citation: BiBTeX, EndNote, RefMan Patent Citations (10), Non-Patent Citations (4), Referenced by (18),Classifications (18), Legal Events (5)
External Links: USPTO, USPTO Assignment, Espacenet"
"Super Serco bulldozes ahead
By DAILY MAIL REPORTER UPDATED: 23:00 GMT, 1 September 2004
SERCO has come a long way since the 1960s when it ran the 'four-minute warning' system to alert the nation to a ballistic missile attack.
Today its £10.3bn order book is bigger than many countries' defence budgets. It is bidding for a further £8bn worth of contracts and sees £16bn of 'opportunities'.
Profit growth is less ballistic. The first-half pre-tax surplus rose 4% to £28.1m, net profits just 1% to £18m. Stripping out goodwill, the rise was 17%, with dividends up 12.5% to 0.81p.
Serco runs the Docklands Light Railway, five UK prisons, airport radar and forest bulldozers in Florida."
"Serco farewell to NPL after 19 years of innovation 8 January 2015 Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco's management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK's economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade…. NPL's caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading [for Serco's front running banks] in the City through NPL [Zulu] Time."
"UK Cabinet Office – Emergency Planning College – Serco …..Types of Exercise Workshop Exercises These are structured discussion events where participants can explore issues in a less pressurised environment. They are an ideal way of developing solutions, procedures and plans rather than the focus being on decision making. Table Top Exercises These involve a realistic scenario and will follow a time line, either in real-time or with time jumps to concentrate on the more important areas. The participants would be expected to be familiar with the plans and procedures that are being used although the exercise tempo and complexity can be adjusted to suit the current state of training and readiness. Simulation and media play can be used to support the exercise. Table-top exercises help develop teamwork and allow participants to gain a better understanding of their roles and that of other agencies and organisations. Command/Control Post Exercises These are designed primarily to exercise the senior leadership and support staff in collective planning and decision making within a strategic grouping. Ideally such exercises would be run from the real command and control locations and using their communications and information systems [Feeling lucky, Punk?]. This could include a mix of locations and varying levels of technical simulation support. The Gold Standard system is flexible to allow the tempo and intensity to be adjusted to ensure maximum training benefit, or to fully test and evaluate the most important aspects of a plan. Such exercises also test information flow, communications, equipment, procedures, decision making and coordination. Live Exercises These can range from testing individual components of a system or organisation through to a full-scale rehearsal. They are particularly useful where there are regulatory requirements or with high-risk situations. They are more complex and costly to organise and deliver but can be integrated with Command Post Exercises as part of a wider exercising package."
"Christopher Rajendran Hyman CBE (born 5 July 1963 in Durban, South Africa) was Chief Executive of Serco Group plc from 2002 to October 2013. … On graduation, he worked for Arthur Andersen. In 1989, he won an 18-month exchange with Ernst & Young in London, who employed him after four months. Head hunted in 1994 by Serco, Hyman became European finance director, and in 1999 was made group finance director. In 2002, Hyman became chief executive. .. Hyman resigned from his role of Chief Executive of Serco on 25 October 2013 following allegations that Serco had overcharged government customers. .. He was [making a presentation to Serco shareholder, including British and Saudi governments] on the 47th floor of the World Trade Center [North Tower] at the time of the September 11 attacks in 2001."
"July 7, 2016 Developments in PKI occurred in the early 1970s at the British intelligence agency GCHQ, where James Ellis, Clifford Cocks and others made important discoveries related to encryption algorithms and key distribution. However, as developments at GCHQ are highly classified, the results of this work were kept secret and not publicly acknowledged until the mid-1990s.
The public disclosure of both secure key exchange and asymmetric key algorithms in 1976 by Diffie, Hellman, Rivest, Shamir, and Adleman changed secure communications entirely. With the further development of high-speed digital electronic communications (the Internet and its predecessors), a need became evident for ways in which users could securely communicate with each other, and as a further consequence of that, for ways in which users could be sure with whom they were actually interacting.
Assorted cryptographic protocols were invented and analyzed within which the new cryptographic primitives could be effectively used. With the invention of the World Wide Web and its rapid spread, the need for authentication and secure communication became still more acute. Commercial reasons alone (e.g., e-commerce, online access to proprietary databases from web browsers) were sufficient. Taher Elgamal and others at Netscape developed the SSL protocol ('https' in Web URLs); it included key establishment, server authentication (prior to v3, one-way only), and so on. A PKI structure was thus created for Web users/sites wishing secure communications.
Vendors and entrepreneurs saw the possibility of a large market, started companies (or new projects at existing companies), and began to agitate for legal recognition and protection from liability. An American Bar Association technology project published an extensive analysis of some of the foreseeable legal aspects of PKI operations (see ABA digital signature guidelines), and shortly thereafter, several U.S. states (Utah being the first in 1995) and other jurisdictions throughout the world began to enact laws and adopt regulations. Consumer groups raised questions about privacy, access, and liability considerations, which were more taken into consideration in some jurisdictions than in others.
The enacted laws and regulations differed, there were technical and operational problems in converting PKI schemes into successful commercial operation, and progress has been much slower than pioneers had imagined it would be.
By the first few years of the 21st century, the underlying cryptographic engineering was clearly not easy to deploy correctly. Operating procedures (manual or automatic) were not easy to correctly design (nor even if so designed, to execute perfectly, which the engineering required). The standards that existed were insufficient.
PKI vendors have found a market, but it is not quite the market envisioned in the mid-1990s, and it has grown both more slowly and in somewhat different ways than were anticipated. PKIs have not solved some of the problems they were expected to, and several major vendors have gone out of business or been acquired by others. PKI has had the most success in government implementations; the largest PKI implementation to date is the Defense Information Systems Agency (DISA) PKI infrastructure for the Common Access Cards program."
Base One Technologies – Corporate Strategy – We are a Government Certified Women-Owned Business
We practice Diversity Recruitment and Staffing for IT positions Base One was founded in 1994 by a women engineer who had made a career in technology research for many years. Base One has been very successful in focusing on diversity recruiting and staffing for IT projects. It has been our experience that the greater the diversity mix, the more creative the solution. As in any field the more diverse the viewpoint the more thorough your analysis. Our engineers can think out of the box.
Because of our affiliations we have access to pools of resources among more diverse groups & individuals. We work with a large pool of minority professionals who specialize in IT skills. We are able to have access to these resources through our status as a D/MWBD firm and our affiliations. These affiliations assist us in working with resources among more diverse groups & individuals. We are also partnered with firms that are 8A certified as Minority firms, Disabled Veteran firms, Native American firms, Vietnam veteran firms, women owned firms.
Our hub zone location keeps us close to the professional organizations of great diversity. We are active in recruiting from and networking with these community organizations of local IT professionals. This has given us access to a large pool of diversity talent.
Base One's staff of engineers are a diverse group of professionals. This diverse network of engineers helps us to branch out to other engineers and creates an even larger network of resources for us to work with.
The greater the diversity the more complete & thorough the analysis. The broader the spectrum of points of view the broader the scope of the analysis. We feel that a diverse team gives us a greater advantage in creating cutting edge solutions. To that end we will continue to nurture these relationships to further extend our talent pool.
The greater the diversity mix, the more creative the solution.
The more diverse the viewpoint, the more thorough the analysis.
The more diverse our team, the more our engineers can think out of the box.
This is why Base One Technologies concentrates on diversity recruitment in the belief that a diverse team gives us a greater advantage in creating cutting edge solutions."
Information Security Planning is the process whereby an organization seeks to protect its operations and assets from data theft or computer hackers that seek to obtain unauthorized information or sabotage business operations.
Key Clients Benefiting From Our Information Security Expertise: Pentagon Renovation Program, FAA, Citigroup, MCI.
Base One Technologies
Expertly researches, designs, and develops information security policies that protect your data and manage your firm's information technology risk at levels acceptable to your business.
Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report.
Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions."
"Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994. This file was obtained from the Secretary of State and has a file number of 1795583."
"Serco's Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals." http://www.dtic.mil/whs/directives/corres/pdf/100515p.pdf
"Opened in 1994 as the successor to the Transitional Immigrant Visa Processing Center in Rosslyn, Va., the NVC centralizes all immigrant visa pre-processing and appointment scheduling for overseas posts. The NVC collects paperwork and fees before forwarding a case, ready for adjudication, to the responsible post.
The center also handles immigrant and fiancé visa petitions, and while it does not adjudicate visa applications, it provides technical assistance and support to visa-adjudicating consular officials overseas.
Only two Foreign Service officers, the director and deputy director, work at the center, along with just five Civil Service employees. They work with almost 500 contract employees doing preprocessing of visas, making the center one of the largest employers in the Portsmouth area.
The contractor, Serco, Inc., has worked with the NVC since its inception and with the Department for almost 18 years.
The NVC houses more than 2.6 million immigrant visa files, receives almost two million pieces of mail per year and received more than half a million petitions from the U.S. Citizenship and Immigration Service (USCIS) in 2011. Its file rooms' high-density shelves are stacked floor-to-ceiling with files, each a collection of someone’s hopes and dreams and each requiring proper handling. ….
The NVC also preprocesses the chief of mission (COM) application required for the filing of a petition for a Special Immigrant Visa (SIV). Such visas, for foreign nationals who have performed services for the U.S. government in Iraq and Afghanistan, require COM concurrence before the applicant can file a petition with USCIS. The NVC collects the requisite documents from such applicants and, when complete, forwards the package to the U.S. embassies in Baghdad or Kabul for COM approval"
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation