#2966: AD Links Serco’s Demon City Guilds To Clinton Pedophile Bridge, Baginski Ransomware

United States Marine Field McConnell 
Plum City Online – (AbelDanger.net)
May 18, 2017

To Whom It May Concern:

Field McConnell – United States Marine and Global Operations Director of Abel Danger (AD) – has linked Serco’s Demon face-recognition software, allegedly used by City & Guilds alumni to help Hillary Clinton track pedophile pimps through the federal bridge certification authority, to Maureen Baginski, Serco’s V-P Intelligence Services and the former head of NSA’s Signals Intelligence Directorate, whose “Shadow Brokers” have been and are now blackmailing victims into standing down sovereign-state defenses to Ransomware-type viruses.

McConnell alleges that Serco used Baroness Garden, the former manager of City & Guilds (1988-2007) and her husband the late Timothy Garden to stage the Global Guardian federal-bridge resilience exercise on 9/11 when pedophile associates of Ms. Baginski and Ms. Clinton were able to liquidate U.S. assets, crash the capital markets and silence blackmailed witnesses.

The Clinton Pedophilia Connection 

5 Reasons United States in midst of a Coup d’état, Right Now! #USCoup #Wikileaks

Ransomware ‘WannaCry’ attack explained

Cyber Normal – NSA/Ransomware

SERCO Owns the World, | Big Brother Watch

Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! (Mobile Playback Version)

Pedophile Elite via British Intelligence & FBI Serco’s Maureen Baginski

McConnell looks forward to an invitation to brief President Trump in the presence of retired Marine Corps two-star Randolph “Tex” Alles, director of the United States Secret Service, on how he can take down Serco with a RICO action and purge blackmailers and child pornographers from the federal bridge.

“Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”

“The Wannacry Cyber Attack Puts NSA Hacking Back Into Focus

Reuters May 15, 2017

An unprecedented global cyberattack that infected computers in at least 150 countries beginning on Friday has unleashed a new wave of criticism of the U.S. National Security Agency.

The attack was made possible by a flaw in Microsoft’s Windows software that the NSA used to build a hacking tool for its own use – only to have that tool and others end up in the hands of a mysterious group called the Shadow Brokers, which then published them online.

Microsoft President Brad Smith sharply criticized the U.S. government on Sunday for “stockpiling” software flaws that it often cannot protect, citing recent leaks of both NSA and CIA hacking tools.

“Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage,” Smith wrote in a blog post. “An equivalent scenario with conventional weapons would be the U.S. military having some of its Tomahawk missiles stolen.”

Some major technology companies, including Alphabet’s Google and Facebook, declined comment on the Microsoft statement.

But some other technology industry executives said privately that it reflected a widely held view in Silicon Valley that the U.S. government is too willing to jeopardize internet security in order to preserve offensive cyber capabilities.

The NSA did not respond to requests for comment.

The NSA and other intelligence services generally aim to balance disclosing software flaws they unearth against keeping them secret for espionage and cyber warfare purposes.

On Monday, senior administration officials defended the government’s handling of software flaws, without confirming the NSA link to WannaCry, the tool used in the global ransomware attack.

CYBERSECURITYA Group Linked to Leaking NSA Spying Tools Is Making Another Threat

“The United States, more than probably any other country, is extremely careful with their processes about how they handle any vulnerabilities that they’re aware of,” Tom Bossert, the White House homeland security adviser, said at a press briefing on Monday.

Other tools from the presumed NSA toolkit published by the Shadow Brokers have also been repurposed by criminals and are being sold on underground forums, researchers said. But they appear to be less damaging than WannaCry. It is not known who is behind the Shadow Brokers.

Derek Manky, global security strategist at cyber security firm Fortinet, said he thinks WannaCry is probably the worst that will come from the Shadow Brokers’ publicly dumped toolkit, though the group may have held back from public revealing everything it obtained

“Out of that batch, it is probably a high-water mark,” Manky said.

“WE KNEW IT COULD BE A PROBLEM”

Security experts said the NSA had engaged in responsible disclosure by informing Microsoft of the flaw at some point after learning it had been stolen and a month before the tools leaked online.

Users who do not patch their systems and the Shadow Brokers were more directly responsible for the attack than NSA, they said.

The Department of Homeland Security began an “aggressive awareness campaign” to alert industry partners to the importance of installing the Microsoft patch shortly after it was released in March, an agency official working on the attack said.

“This one, we knew it could be a problem,” the official told Reuters.

“NSA should be embarrassed – they’ve had a lot of damaging leaks,” said James Lewis, a former U.S. official who is now a cyber expert at the Center for Strategic and International Studies. Still, he said, “Microsoft needs to admit that the 20th century is over, it’s a much more hostile environment, and that hobbling the NSA won’t make us any safer.”

 

How to Protect Yourself From Cyber Attacks Involving Ransomware

Criminals use ransomware to extort money from individual users and big businesses.

Under former President Barack Obama, the U.S. government created an inter-agency review, known as the Vulnerability Equities Process, to determine whether flaws should be shared or kept secret.

White House cyber security coordinator Rob Joyce, who previously worked in the NSA’s elite hacking squad, told a Reuters reporter in April that the Trump administration was considering how to “optimize” the Vulnerability Equities Process, but he did not elaborate.

The White House did not respond to a request for comment about the status of the review process. A source familiar with the matter said equities meetings still take place but less frequently than they did under the Obama administration.

In Congress, Republican Senator Ron Johnson and Democratic Senator Brian Schatz are working on legislation that would codify the review process.

“We have reached a turning point where it is not sustainable for governments to think they can retain vulnerabilities for very long,” said Ari Schwartz, who oversaw technology security issues at the National Security Council during the Obama administration.”

“The Emergency Planning College (EPC) delivers Cabinet Office-approved emergency planning and crisis management training. Managed by Serco, we are positioned at the heart of Government, within the Civil Contingencies Secretariat (CCS) of the Cabinet Office. Our highly experienced industry leading experts provide a wide range of dynamic and diverse training courses, seminars and workshops for public and private sector clients across the UK and overseas. We also offer real-time simulation exercises enabling delegates to fully test their emergency plans while gaining invaluable real life experience in dealing with a major incident. We provide a central forum for knowledge-sharing and focus on multi-agency working, disseminating best practice nationally and internationally to enhance worldwide resilience against natural disasters, major incidents and malicious attack. … We are also currently supporting the resilience industry through our strategic partnerships with:

“28 November 2001

Global swoop on newsgroup paedophiles By Will Knight

More than 130 people in 19 different countries have been arrested or are under investigation after police traced the distribution of child pornography through different internet newsgroups.

Technical experts at UK internet service provider Demon Internet aided officers from the National Crime Squad’s new Hi-Tech Crime Unit with the investigation.

A spokesperson from Thus, Demon’s parent company, says that investigators were not given access to the server logs that record Demon users’ activities.

Investigators were simply provided with access to newsgroup postings in the same way as any other Demon customer. Technical experts from Demon then helped officers distinguish the identifying information contained within the message “headers” of particular postings.

Face recognition

Officers traced postings relating to certain images to different internet service providers around the world and then contacted Interpol to track down suspects.

Investigators say they discovered 10,000 suspect postings to over 30 different newsgroups and identified 60,000 new images. They plan to use face recognition software to identify victims in different images, to help trace them. This software has been developed in conjunction with UK company Serco, although no technical details have been released.

“This operation has sadly and distressingly brought thousands of new images of abuse to our attention,” said Detective Superintendent Peter Spindler of the National Crime Squad. “These young victims need to be identified and protected as quickly as possible.”

Spindler added: “We are able to show that those accessing these newsgroups did so regularly and with purpose.”

Nine regional police forces in the UK were involved in the operation. Warrants for searches or arrests were issued in 19 countries, including Australia, Canada, Germany, Israel, Japan, Russia, Sweden, Turkey, and the US.

Evading detection

According to a report by the BBC, another 400 suspects could not be traced by investigators. Police have not said how they evaded detection but it is possible to post messages to news groups anonymously using intermediary servers that strip away header information.

The UK government introduced legislation in 2000, giving the police greater access to internet communications. Further provisions for the extended storage of data is included in new anti-terrorist legislation currently passing through parliament.

Privacy advocates claim that these laws could be misused and some question the justification for the legislation. Peter Sommer, at the London School of Economics computer science department, says that the techniques involved in the latest paedophile investigation did not require a special police warrant.

“It is apparent that the existing legislation was sufficient to help the NCS gather evidence and secure the ISP co-operation needed,” Sommer told New Scientist.”

“Supporting Ministry of Defence [Custodian of root key for Federal Bridge Certification Authority]

Training and education play a major part in any military career and City & Guilds Kineo is here to support you and help get your achievements recognised internationally once you leave the service.

Working in partnership with the Ministry of Defence, we have identified and mapped qualifications to training and skills at all stages of your military career, aiming to reflect that your accomplishments are as useful in the workplace as they are in the field.

From the day you join the military to your resettlement training for a future career in civilian life, you can achieve City & Guilds qualifications at levels 1 to 7. These qualifications will help ensure that the valuable knowledge and experience you gain throughout your military career are directly transferable to professional civilian qualifications.”

“Vocational training organisation City & Guilds uses Microsoft’s collaboration, video conferencing and productivity tools to keep its global workforce connected Fostering a sense of community among employees spread across 80 countries, while providing them with a fast and efficient way to share documents, was the challenge facing vocational training charity City & Guilds in 2011.”

“Payroll and Pension Management Solutions

At Serco ASP our specialist NHS payroll and pension team offer fully managed payroll services that provide outstanding value for money. Flexible tailored solutions underpin our commitment to providing effective payroll services to ensure you can focus on the core activities of your business.

Operating the Electronic Staff Record (ESR) payroll system we work in partnership with our clients to re-engineer processes and deliver best practice. We have a proven track record of improving quality whilst reducing unit prices, and have in-house specialists who provide expertise and guidance on PAYE and compliance, reducing the risk within your business.

Paying in excess of 50,000 NHS staff each month, we process over 600,000 payroll transactions each year with a payroll accuracy of over 99.8%. We offer a fully managed, ISO 9001 accredited payroll services to NHS, Social Enterprise organisations and companies within the UK health sector.”

“Serious Fraud Office launches inquiry into G4S and Serco overcharging claims

Investigation follows justice secretary’s claims that firms overcharged on electronic tagging contracts for offenders

Under the contracts more than 20,000 offenders are monitored on electronic tags at any one time. Alan Travis, home affairs editor

Monday 4 November 2013 12.34 GMTFirst published on Monday 4 November 2013 12.34 GMT

The Serious Fraud Office has launched a formal criminal investigation into two of the government’s biggest suppliers, G4S and Serco, following claims by the justice secretary, Chris Grayling, of tens of millions of pounds of overcharging on electronic tagging contracts for offenders.

Grayling asked the SFO to look into the billing allegations in July when he told MPs that an external audit had revealed that the overcharging included billing for tracking the movements of criminals who had moved abroad, who were back in prison, who had had their tags removed and even, in a few cases, those who had died.

The justice secretary said that in some cases the bills had continued to be presented years after active monitoring had stopped.

Whitehall sources have confirmed that the central allegation in the case revolves around charges for 3,000 phantom offenders. The justice ministry was being billed by the two companies for the tagging of 18,000 offenders a day under the £700m contract when only 15,000 were actually being monitored.

G4S said it would co-operate with the investigation and had been notified by the SFO director, David Green, that it would cover “the contract for the provision of electronic monitoring services which commenced in 2005 as amended and extended until the present day”.

In July Grayling asked the SFO to look into the situation after G4S refused to co-operate with a justice ministry internal forensic audit to establish whether any dishonesty had taken place. The decision to refer Serco, which did co-operate with the MoJ audit, to the SFO was taken in September.

In July Serco said senior management had not been aware of the discrepancies but they did not believe anything dishonest had taken place. The company agreed with the MoJ that if the forensic audit showed dishonesty had taken place they would jointly call in the SFO.

The pattern of overcharging was revealed by a PricewaterhouseCoopers external audit commissioned by Grayling in May after billing discrepancies were discovered during the re-tendering process.

Under the contracts, more than 20,000 offenders are monitored on electronic tags at any one time. They are a key element in the criminal justice system’s menu of community punishments as they are used to enforce curfews for prisoners on early release as well as some court orders.

In a small number of cases they have been used to track the movements of terror suspects and paedophiles. Last week prosecutions were halted against three terror suspects accused of tampering with their G4S-supplied GPS tags amid claims of faults with the tags and their straps.

The two companies are among the government’s biggest suppliers. Both have already agreed to withdraw from bidding for the £3bn next-generation tagging contract.

The Cabinet Office has also been reviewing the 28 contracts that the two companies currently hold with the government worth a total of £9bn, including the management of the atomic weapons establishment at Aldermaston. Grayling has said that both companies can bid for contracts to run 70% of the probation service but will not be awarded them unless the SFO give them a clean bill of health.

Sadiq Khan, the shadow justice secretary, said the SFO decision was a major development. “In July I wrote to the SFO calling on them to investigate claims against G4S and to act swiftly to secure any possible evidence that might be needed. I hope that the time taken to launch this investigation hasn’t resulted in the loss of important evidence,” he said.

“With future Ministry of Justice contracts up for grabs, including more than £600m of probation contracts, the government must act swiftly and bar G4S from bidding for any more until the SFO has concluded its investigation. By failing to do so, David Cameron risks undermining public confidence in our justice system.””

“Serco Executive Maureen Baginski Receives FBI Intelligence Analysts Association Award

RESTON, VIRGINIA – May 2, 2011 – Serco Inc., a provider of professional, technology, and management services to the federal government, is proud to announce that Maureen Baginski, Vice President of Serco’s Intelligence Services, received the FBI Intelligence Analysts Association (IAA) Award. The first annual event and ceremony was held on April 12 in Washington, DC.

Ms. Baginski was recognized for her work from 2003 to 2005, when she served as the FBI’s Executive Assistant Director for Intelligence. In that position, she was responsible for establishing and managing the FBI’s first-ever intelligence program. She adapted FBI intelligence capabilities with information technologies to create an intelligence-sharing operation that could identify threats before they became attacks.

During the awards ceremony, James Mackey, a former FBI supervisory intelligence analyst, had these words to say about Ms. Baginski, “Ladies and gentlemen, this person, Maureen Baginski immediately established credibility through hard work the old fashioned way. She became one of the Director’s tugboats, and again, through hard work…she established the FBI directorate for domestic intelligence and brought about fundamental change in the FBI, not only for you, but for the American people.”

Prior to her role with the FBI, Ms. Baginski served at the National Security Agency (NSA) for 23 years, where she held a variety of positions, including Signals Intelligence (SIGINT) Director, Senior Operations Officer in the National Security Operations Center; Executive Assistant to the Director of NSA/Central Security Service, Chief Officer of the Director; Assistant Deputy Director of Technology and Systems; and lead analyst for the Soviet Union. As SIGINT Director, Ms. Baginski successfully established and directed a unified program to exploit encrypted or denied information on global networks. Leading the NSA’s Signals Intelligence Directorate, the Nation’s high technology cryptology organization, she managed a complex and geographically dispersed distributed information production enterprise.

“We are truly proud of Maureen and this great honor she received. She has brought to Serco the same can-do attitude she exuded while working for the FBI and she continues to lead her team here at Serco with pride and respect,” said Ed Casey, Chairman and Chief Executive Officer at Serco.

Ms. Baginski is also the recipient of two Presidential Rank Awards, two Director of Central Intelligence National Achievement Medals, the Director of Military Intelligence’s Leadership Award, and NSA’s Exceptional Civilian Service Award. She holds BA and MA degrees in Slavic Languages and Linguistics from the University of Albany. In December 2005, she received an honorary Doctorate of Humane Letters from the University of Albany for her service to the nation.

About Serco Inc.: Serco Inc. is a leading provider of professional, technology, and management services focused on the federal government. We advise, design, integrate, and deliver solutions that transform how clients achieve their missions. Our customer-first approach, robust portfolio of services, and global experience enable us to respond with solutions that achieve outcomes with value. Headquartered in Reston, Virginia, Serco Inc. has approximately 11,000 employees, annual revenue of $1.5 billion, and is ranked in the Top 30 of the largest Federal Prime Contractors by Washington Technology. Serco Inc. is a wholly-owned subsidiary of Serco Group plc, a $6.6 billion international business that helps transform government and public services around the world. More information about Serco Inc. can be found at www.serco-na.com.”

“Statement of Jim Flyzik Acting Assistant Secretary for Management and Chief Information Officer (CIO) before the House Government Reform Committee 6/21/2001 …. Treasury also hosted the Federal Bridge Certification Authority (FBCA) project for the Federal government, currently operated by GSA. The FBCA is a mechanism for the secure exchange of information between government agencies. The bridge allows agency public key infrastructures (PKIs) to interoperate as it permits digital credentials (called “digital certificates”) issued by each agency to its employees to be accepted with trust and confidence by other agencies for electronic transactions. This functionality directly supports E-Government, as agencies will be able to perform Internet-enabled transactions, such as credit card collections through banks, or secure emails between agencies, with previously unattainable trust and confidence. A prototype version of the FBCA became operational in February 2000 and was successfully used in a large-scale test in April 2000. During that time, the PKIs of five different organizations within the U.S., the Canadian Government and academia, were cross-certified through the prototype FBCA. The agencies were able to interoperate, successfully exchanging digitally signed electronic mail messages. FBCA is operated by GSA and, once cross-certification has been completed, will be used by NASA, USDA’s National Finance Center, FDIC, Treasury, the State of Illinois, and the Canadian Government for the electronic transfer of documents.”

“Serco farewell to NPL after 19 years of innovation 8 January 2015 Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco’s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade…. NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency [spot fixed] trading in the City [by Serco pig-farm banks] through NPL [Zulu] Time.”

“DHS ICE OTD … Since 1986, through various contracts, Serco has provided full training lifecycle support for all areas of this key Law Enforcement organization including Inspections, Border Patrol, Enforcement, and DHS operations at the Federal Law Enforcement Training Academy in Glynco, GA. .. Serco developed and scripted three scenarios based on negligent practices identified by the IG report that have resulted in the use of lost or uncontrolled weapons for robbery, murder, and the accidental death of a child. We used creative animation techniques, sound effects, music, and talented voice actors playing multiple characters to create an emotional appeal much different—and infinitely more powerful—from the standard WBT offering.

Serco has trained more than 400,000 DHS students in every region and district, at every land, air and sea border crossing, in classrooms, through WBT, train-the-trainer programs, on-the-job training and through the implementation of performance support systems in a blended learning environment. In collaboration with ICE OTD, our latest efforts have resulted in the accreditation and completion of three programs, including HSI FOTP, ICE OTD IDC, and ICE OPR. Serco was integral to the ICE team that was recognized by the 2012 “Excellence in Law Enforcement” Award given to the ICE Domestic Field Operations Training Program (DFTOP) Accreditation Project for having greatly improved ICE training, increasing operational efficacy and efficiency, and minimizing safety issues to ICE officers and the public.”

Yours sincerely,

Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222

McConnell’s Co-researcher David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation

#2967: AD Links Serco’s Demon Shadow Broker To Clinton Email Bridge, Comey MH 17 Onion Router Bomb

United States Marine Field McConnell 
Plum City Online – (AbelDanger.net)
May 19, 2017

To Whom It May Concern:

Field McConnell – United States Marine and Global Operations Director of Abel Danger (AD) – has linked Serco‘s apparent use of Demon face-recognition software to blackmail a Shadow Broker group of cyber criminals to Hillary Clinton’s alleged use of the federal bridge network to destroy emails which might otherwise have exposed the role of former FBI director James Comey in the onion-router-initiated bombing of MH Flight 17 over East Ukraine on 17 July 2014.

Kiev Censors MH17 Air Traffic Control Recordings

Trey Gowdy GRILLS James Comey On Hillary Clinton Emails 7/7/16

Boeing Honeywell Uninterruptible Autopilot

Cyber Normal – NSA/Ransomware

SERCO Owns the World, | Big Brother Watch

Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! (Mobile Playback Version)


McConnell looks forward to an invitation to brief President Trump in the presence of retired Marine Corps two-star Randolph “Tex” Alles, director of the United States Secret Service, on how he can take down Serco – British operator of the U.S. Patent and Trademark Office and the world’s largest air traffic controller – with a RICO action and purge shadow brokers and onion router bombers from the federal bridge.

“Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”

“Behind the Sordid World of Online Assassination Betting
Jamie Bartlett
6/01/15 11:35am
Filed to: BIBLIOTECH
… The Assassination Market can’t be found with a Google search. It sits on a hidden, encrypted part of the internet that, until recently, could only be accessed with a browser called The Onion Router, or Tor. Tor began life as a U.S. Naval Research Laboratory project, but today exists as a not-for-profit organization, partly funded by the U.S. government and various civil liberties groups, allowing millions of people around the world to browse the internet anonymously and securely.”

“Ukrainian air-traffic control sent doomed flight MH17 over the conflict zone in Donetsk region, says Russia
Russian envoy to UN demands Kiev release communications with MH17
Ukraine and its Western allies accuse Russian-backed rebels of downing jet
Russia accuses Ukrainian government forces of firing the fatal missile
By Will Stewart for MailOnline
PUBLISHED: 09:20 BST, 19 August 2014 | UPDATED: 22:53 BST, 19 August 2014
Russia has accused Ukrainian air-traffic control of sending Malaysian Airlines flight MH17 into the conflict zone where it was shot down last month.
The Russian envoy to the UN Security Council has demanded Kiev release all records of its air-traffic controllers’ communications with the plane, whose downing is the subject of a major diplomat crisis.
The passenger jet carrying 298 people was hit by a missile the Ukrainian government and its allies say was fired from the rebel-held Donetsk region in eastern Ukraine on July 17.”

Serco supports National Crime Agency cyber exercise
Download PDF
Published: 11 Dec 2015
Serco has taken part in a ground-breaking exercise run by the UK’s National Crime Agency (NCA) to test the international response to serious cyber crime.

Specialists from across Europe were put through their paces using Serco‘s unique and realistic cyber exercising capability – cybX – which prepares private and public sector organisations to test their ability to prepare and respond to serious cyber attacks.
Exercise ‘Silver Shadow’ – a multinational exercise run by the NCA’s National Cyber Crime Unit (NCCU), funded by the Foreign and Commonwealth Office and supported by the Home Office – saw officers from eight different countries come together to assess their collective response to a simulated cyber attack on a fictitious international petroleum company.

The aim was to test how investigators and prosecutors would work together in the event of a complex criminal incident spanning several different legal jurisdictions, to ensure an effective response to future cyber crime attacks.

The week-long exercise began on Monday 30 November and took place at the Cabinet Office’s Emergency Planning College (EPC) in North Yorkshire, which is run by Serco.

The countries involved in the exercise were Bulgaria, Georgia, Lithuania, Moldova, Romania, Ukraine, the UK, represented by the NCA’s NCCU, and the US, represented by the FBI. A representative from Europol’s Joint Cyber Action Taskforce (J-CAT) also took part.

cybX compliments the wider civil resilience training Serco provides at the EPC, enabling organisations to test and improve their cyber resilience in a safe, realistic and secure environment. Management and IT staff are tested through a variety of simulated scenarios on their ability to identify and end a cyber-attack, and manage their organistion’s response.

The training gives participants a greater understanding of their organisation’s risks, strengths and areas for improvement, as well as a better understanding of the communications and relationships they need with their supply chain, customers and other stakeholders, including law enforcement.

Richard Preece, Serco‘s Director of cybX, commented: “It’s been a privilege to support members of the UK and international law enforcement community. Every day we hear about another cyber-attack and our training has helped the NCA to improve their capability to tackle cyber crime.

“It’s one thing to invest in the best technology, but organisations must also invest in developing their people and test their capabilities. Serco‘s training puts employees from the board room to server room through their paces, enabling organisations to be more resilient to the inevitable cyber-attack.”
Further details on the NCA website

“The Wannacry Cyber Attack Puts NSA Hacking Back Into Focus
Reuters
May 15, 2017
An unprecedented global cyberattack that infected computers in at least 150 countries beginning on Friday has unleashed a new wave of criticism of the U.S. National Security Agency.

The attack was made possible by a flaw in Microsoft’s Windows software that the NSA used to build a hacking tool for its own use – only to have that tool and others end up in the hands of a mysterious group called the Shadow Brokers, which then published them online.

Microsoft President Brad Smith sharply criticized the U.S. government on Sunday for “stockpiling” software flaws that it often cannot protect, citing recent leaks of both NSA and CIA hacking tools.

“Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage,” Smith wrote in a blog post. “An equivalent scenario with conventional weapons would be the U.S. military having some of its Tomahawk missiles stolen.”

Some major technology companies, including Alphabet’s Google and Facebook, declined comment on the Microsoft statement.

But some other technology industry executives said privately that it reflected a widely held view in Silicon Valley that the U.S. government is too willing to jeopardize internet security in order to preserve offensive cyber capabilities.

The NSA did not respond to requests for comment.

The NSA and other intelligence services generally aim to balance disclosing software flaws they unearth against keeping them secret for espionage and cyber warfare purposes.

On Monday, senior administration officials defended the government’s handling of software flaws, without confirming the NSA link to WannaCry, the tool used in the global ransomware attack.

CYBERSECURITYA Group Linked to Leaking NSA Spying Tools Is Making Another Threat
“The United States, more than probably any other country, is extremely careful with their processes about how they handle any vulnerabilities that they’re aware of,” Tom Bossert, the White House homeland security adviser, said at a press briefing on Monday.

Other tools from the presumed NSA toolkit published by the Shadow Brokers have also been repurposed by criminals and are being sold on underground forums, researchers said. But they appear to be less damaging than WannaCry. It is not known who is behind the Shadow Brokers.

Derek Manky, global security strategist at cyber security firm Fortinet, said he thinks WannaCry is probably the worst that will come from the Shadow Brokers’ publicly dumped toolkit, though the group may have held back from public revealing everything it obtained.
“Out of that batch, it is probably a high-water mark,” Manky said.

“WE KNEW IT COULD BE A PROBLEM”

Security experts said the NSA had engaged in responsible disclosure by informing Microsoft of the flaw at some point after learning it had been stolen and a month before the tools leaked online.
Users who do not patch their systems and the Shadow Brokers were more directly responsible for the attack than NSA, they said.

The Department of Homeland Security began an “aggressive awareness campaign” to alert industry partners to the importance of installing the Microsoft patch shortly after it was released in March, an agency official working on the attack said.

“This one, we knew it could be a problem,” the official told Reuters.

“NSA should be embarrassed – they’ve had a lot of damaging leaks,” said James Lewis, a former U.S. official who is now a cyber expert at the Center for Strategic and International Studies. Still, he said, “Microsoft needs to admit that the 20th century is over, it’s a much more hostile environment, and that hobbling the NSA won’t make us any safer.”

How to Protect Yourself From Cyber Attacks Involving Ransomware
Criminals use ransomware to extort money from individual users and big businesses.

Under former President Barack Obama, the U.S. government created an inter-agency review, known as the Vulnerability Equities Process, to determine whether flaws should be shared or kept secret.

White House cyber security coordinator Rob Joyce, who previously worked in the NSA’s elite hacking squad, told a Reuters reporter in April that the Trump administration was considering how to “optimize” the Vulnerability Equities Process, but he did not elaborate.

The White House did not respond to a request for comment about the status of the review process. A source familiar with the matter said equities meetings still take place but less frequently than they did under the Obama administration.

In Congress, Republican Senator Ron Johnson and Democratic Senator Brian Schatz are working on legislation that would codify the review process.

“We have reached a turning point where it is not sustainable for governments to think they can retain vulnerabilities for very long,” said Ari Schwartz, who oversaw technology security issues at the National Security Council during the Obama administration.”

“The Emergency Planning College (EPC) delivers Cabinet Office-approved emergency planning and crisis management training. Managed by Serco, we are positioned at the heart of Government, within the Civil Contingencies Secretariat (CCS) of the Cabinet Office. Our highly experienced industry leading experts provide a wide range of dynamic and diverse training courses, seminars and workshops for public and private sector clients across the UK and overseas. We also offer real-time simulation exercises enabling delegates to fully test their emergency plans while gaining invaluable real life experience in dealing with a major incident. We provide a central forum for knowledge-sharing and focus on multi-agency working, disseminating best practice nationally and internationally to enhance worldwide resilience against natural disasters, major incidents and malicious attack. … We are also currently supporting the resilience industry through our strategic partnerships with:

City & Guilds Institute
University of Portsmouth
Business Continuity Institute (BCI)
University of Leicester
Met Office
Football Safety Officers’ Association (FSOA)
Berwicks Ltd
National Nuclear Laboratories (NNL)
International Association of Emergency Management (IAEM)
Institution of Occupational Safety & Health (IOSH)
The Bahrain Petroleum Company (BAPCO)
Star Events
4C Strategies
BB7

“28 November 2001
Global swoop on newsgroup paedophiles
By Will Knight

More than 130 people in 19 different countries have been arrested or are under investigation after police traced the distribution of child pornography through different internet newsgroups.

Technical experts at UK internet service provider Demon Internet aided officers from the National Crime Squad’s new Hi-Tech Crime Unit with the investigation.

A spokesperson from Thus, Demon’s parent company, says that investigators were not given access to the server logs that record Demon users’ activities.

Investigators were simply provided with access to newsgroup postings in the same way as any other Demon customer. Technical experts from Demon then helped officers distinguish the identifying information contained within the message “headers” of particular postings.

Face recognition
Officers traced postings relating to certain images to different internet service providers around the world and then contacted Interpol to track down suspects.

Investigators say they discovered 10,000 suspect postings to over 30 different newsgroups and identified 60,000 new images. They plan to use face recognition software to identify victims in different images, to help trace them. This software has been developed in conjunction with UK company Serco, although no technical details have been released.

“This operation has sadly and distressingly brought thousands of new images of abuse to our attention,” said Detective Superintendent Peter Spindler of the National Crime Squad. “These young victims need to be identified and protected as quickly as possible.”

Spindler added: “We are able to show that those accessing these newsgroups did so regularly and with purpose.”

Nine regional police forces in the UK were involved in the operation. Warrants for searches or arrests were issued in 19 countries, including Australia, Canada, Germany, Israel, Japan, Russia, Sweden, Turkey, and the US.

Evading detection

According to a report by the BBC, another 400 suspects could not be traced by investigators. Police have not said how they evaded detection but it is possible to post messages to news groups anonymously using intermediary servers that strip away header information.

The UK government introduced legislation in 2000, giving the police greater access to internet communications. Further provisions for the extended storage of data is included in new anti-terrorist legislation currently passing through parliament.

Privacy advocates claim that these laws could be misused and some question the justification for the legislation. Peter Sommer, at the London School of Economics computer science department, says that the techniques involved in the latest paedophile investigation did not require a special police warrant.

“It is apparent that the existing legislation was sufficient to help the NCS gather evidence and secure the ISP co-operation needed,” Sommer told New Scientist.”

“Serious Fraud Office launches inquiry into G4S and Serco overcharging claims

Investigation follows justice secretary’s claims that firms overcharged on electronic tagging contracts for offenders

Under the contracts more than 20,000 offenders are monitored on electronic tags at any one time.
Alan Travis, home affairs editor

Monday 4 November 2013 12.34 GMTFirst published on Monday 4 November 2013 12.34 GMT

The Serious Fraud Office has launched a formal criminal investigation into two of the government’s biggest suppliers, G4S and Serco, following claims by the justice secretary, Chris Grayling, of tens of millions of pounds of overcharging on electronic tagging contracts for offenders.

Grayling asked the SFO to look into the billing allegations in July when he told MPs that an external audit had revealed that the overcharging included billing for tracking the movements of criminals who had moved abroad, who were back in prison, who had had their tags removed and even, in a few cases, those who had died.

The justice secretary said that in some cases the bills had continued to be presented years after active monitoring had stopped.

Whitehall sources have confirmed that the central allegation in the case revolves around charges for 3,000 phantom offenders. The justice ministry was being billed by the two companies for the tagging of 18,000 offenders a day under the £700m contract when only 15,000 were actually being monitored.

G4S said it would co-operate with the investigation and had been notified by the SFO director, David Green, that it would cover “the contract for the provision of electronic monitoring services which commenced in 2005 as amended and extended until the present day”.

In July Grayling asked the SFO to look into the situation after G4S refused to co-operate with a justice ministry internal forensic audit to establish whether any dishonesty had taken place. The decision to refer Serco, which did co-operate with the MoJ audit, to the SFO was taken in September.

In July Serco said senior management had not been aware of the discrepancies but they did not believe anything dishonest had taken place. The company agreed with the MoJ that if the forensic audit showed dishonesty had taken place they would jointly call in the SFO.

The pattern of overcharging was revealed by a PricewaterhouseCoopers external audit commissioned by Grayling in May after billing discrepancies were discovered during the re-tendering process.
Under the contracts, more than 20,000 offenders are monitored on electronic tags at any one time. They are a key element in the criminal justice system’s menu of community punishments as they are used to enforce curfews for prisoners on early release as well as some court orders.

In a small number of cases they have been used to track the movements of terror suspects and paedophiles. Last week prosecutions were halted against three terror suspects accused of tampering with their G4S-supplied GPS tags amid claims of faults with the tags and their straps.

The two companies are among the government’s biggest suppliers. Both have already agreed to withdraw from bidding for the £3bn next-generation tagging contract.

The Cabinet Office has also been reviewing the 28 contracts that the two companies currently hold with the government worth a total of £9bn, including the management of the atomic weapons establishment at Aldermaston. Grayling has said that both companies can bid for contracts to run 70% of the probation service but will not be awarded them unless the SFO give them a clean bill of health.

Sadiq Khan, the shadow justice secretary, said the SFO decision was a major development. “In July I wrote to the SFO calling on them to investigate claims against G4S and to act swiftly to secure any possible evidence that might be needed. I hope that the time taken to launch this investigation hasn’t resulted in the loss of important evidence,” he said.

“With future Ministry of Justice contracts up for grabs, including more than £600m of probation contracts, the government must act swiftly and bar G4S from bidding for any more until the SFO has concluded its investigation. By failing to do so, David Cameron risks undermining public confidence in our justice system.”

Serco Executive Maureen Baginski Receives FBI Intelligence Analysts Association Award

RESTON, VIRGINIA – May 2, 2011 – Serco Inc., a provider of professional, technology, and management services to the federal government, is proud to announce that Maureen Baginski, Vice President of Serco’s Intelligence Services, received the FBI Intelligence Analysts Association (IAA) Award. The first annual event and ceremony was held on April 12 in Washington, DC.

Ms. Baginski was recognized for her work from 2003 to 2005, when she served as the FBI’s Executive Assistant Director for Intelligence. In that position, she was responsible for establishing and managing the FBI’s first-ever intelligence program. She adapted FBI intelligence capabilities with information technologies to create an intelligence-sharing operation that could identify threats before they became attacks.

During the awards ceremony, James Mackey, a former FBI supervisory intelligence analyst, had these words to say about Ms. Baginski, “Ladies and gentlemen, this person, Maureen Baginski immediately established credibility through hard work the old fashioned way. She became one of the Director’s tugboats, and again, through hard work…she established the FBI directorate for domestic intelligence and brought about fundamental change in the FBI, not only for you, but for the American people.”

Prior to her role with the FBI, Ms. Baginski served at the National Security Agency (NSA) for 23 years, where she held a variety of positions, including Signals Intelligence (SIGINT) Director, Senior Operations Officer in the National Security Operations Center; Executive Assistant to the Director of NSA/Central Security Service, Chief Officer of the Director; Assistant Deputy Director of Technology and Systems; and lead analyst for the Soviet Union. As SIGINT Director, Ms. Baginski successfully established and directed a unified program to exploit encrypted or denied information on global networks. Leading the NSA’s Signals Intelligence Directorate, the Nation’s high technology cryptology organization, she managed a complex and geographically dispersed distributed information production enterprise.

“We are truly proud of Maureen and this great honor she received. She has brought to Serco the same can-do attitude she exuded while working for the FBI and she continues to lead her team here at Serco with pride and respect,” said Ed Casey, Chairman and Chief Executive Officer at Serco.

Ms. Baginski is also the recipient of two Presidential Rank Awards, two Director of Central Intelligence National Achievement Medals, the Director of Military Intelligence’s Leadership Award, and NSA’s Exceptional Civilian Service Award. She holds BA and MA degrees in Slavic Languages and Linguistics from the University of Albany. In December 2005, she received an honorary Doctorate of Humane Letters from the University of Albany for her service to the nation.

About Serco Inc.: Serco Inc. is a leading provider of professional, technology, and management services focused on the federal government. We advise, design, integrate, and deliver solutions that transform how clients achieve their missions. Our customer-first approach, robust portfolio of services, and global experience enable us to respond with solutions that achieve outcomes with value. Headquartered in Reston, Virginia, Serco Inc. has approximately 11,000 employees, annual revenue of $1.5 billion, and is ranked in the Top 30 of the largest Federal Prime Contractors by Washington Technology. Serco Inc. is a wholly-owned subsidiary of Serco Group plc, a $6.6 billion international business that helps transform government and public services around the world. More information about Serco Inc. can be found at www.serco-na.com.”

“Statement of Jim Flyzik Acting Assistant Secretary for Management and Chief Information Officer (CIO) before the House Government Reform Committee 6/21/2001 …. Treasury also hosted the Federal Bridge Certification Authority (FBCA) project for the Federal government, currently operated by GSA. The FBCA is a mechanism for the secure exchange of information between government agencies. The bridge allows agency public key infrastructures (PKIs) to interoperate as it permits digital credentials (called “digital certificates”) issued by each agency to its employees to be accepted with trust and confidence by other agencies for electronic transactions. This functionality directly supports E-Government, as agencies will be able to perform Internet-enabled transactions, such as credit card collections through banks, or secure emails between agencies, with previously unattainable trust and confidence. A prototype version of the FBCA became operational in February 2000 and was successfully used in a large-scale test in April 2000. During that time, the PKIs of five different organizations within the U.S., the Canadian Government and academia, were cross-certified through the prototype FBCA. The agencies were able to interoperate, successfully exchanging digitally signed electronic mail messages. FBCA is operated by GSA and, once cross-certification has been completed, will be used by NASA, USDA’s National Finance Center, FDIC, Treasury, the State of Illinois, and the Canadian Government for the electronic transfer of documents.”

Serco farewell to NPL after 19 years of innovation 8 January 2015 Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco‘s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade…. NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency [spot fixed] trading in the City [by Serco pig-farm banks] through NPL [Zulu] Time.”

“DHS ICE OTD … Since 1986, through various contracts, Serco has provided full training lifecycle support for all areas of this key Law Enforcement organization including Inspections, Border Patrol, Enforcement, and DHS operations at the Federal Law Enforcement Training Academy in Glynco, GA. .. Serco developed and scripted three scenarios based on negligent practices identified by the IG report that have resulted in the use of lost or uncontrolled weapons for robbery, murder, and the accidental death of a child. We used creative animation techniques, sound effects, music, and talented voice actors playing multiple characters to create an emotional appeal much different—and infinitely more powerful—from the standard WBT offering.

Serco has trained more than 400,000 DHS students in every region and district, at every land, air and sea border crossing, in classrooms, through WBT, train-the-trainer programs, on-the-job training and through the implementation of performance support systems in a blended learning environment. In collaboration with ICE OTD, our latest efforts have resulted in the accreditation and completion of three programs, including HSI FOTP, ICE OTD IDC, and ICE OPR. Serco was integral to the ICE team that was recognized by the 2012 “Excellence in Law Enforcement” Award given to the ICE Domestic Field Operations Training Program (DFTOP) Accreditation Project for having greatly improved ICE training, increasing operational efficacy and efficiency, and minimizing safety issues to ICE officers and the public.”

Yours sincerely,

Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222

McConnell’s Co-researcher David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation