#2296: Marine Links Serco Visas, Base One Server To FAA PenRen Bomb And HSBC Black-Hand Clinton Snuff
Plum City – (AbelDanger.net): United States Marine Field McConnell has linked Serco visas issued through a Base One Technologies’ server in the Bronx to the FAA’s alleged sponsorship of the war-game visa holders who bombed the Pentagon Renovation (PenRen) project on 9/11 and HSBC’s Black Hand* navigators who have apparently been guiding Hillary Clinton through various pay-to-play snuff film productions around the world after the Base One server was commissioned in February 15, 1994 by then-Secretary of State Colin Powell.
Black Hand* – HSBC’s drug-hub navigators with a “License to Track, Film and Kill” for the City of London’s Honourable Artillery Company 1537; The Master Mariners and Air Pilots (formerly GAPAN) 1929, and The Ancient and Honorable Artillery Company of Massachusetts 1638 – whose alumni include the United States’ Presidents James Monroe, Chester Alan Arthur, Calvin Coolidge and John F. Kennedy and – perhaps – Barack ‘Choom Gang’ Obama.
McConnell warns that Clinton’s Wag the Dog server may have been set up as a honeypot to identify and kill any hackers before they can expose Serco’s phony visa services on the Base One Technologies server in the Bronx and the Black Hand snuff-film racket which has given HSBC control of the global drug trade.
Prequel 1: #2295: Marine Links SOS Children’s Bank To Serco’s Black-Hand Paid For Clintonemail Snuff-Film Trade
Prequel 2: Travels of Secretary of State Hillary Rodham Clinton
Prequel 3: Base One Technologies [Note the diversity scam]
Prequel 4: 6 The 9/11 HIJACKERS AND CONSPIRATORS
Prequel 5: From renovation to revolution: Was the Pentagon attacked from within?
Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! (Mobile Playback Version)[Note that HSBC is Serco’s banker and one of Serco’s major shareholders with Her Majesty’s Government and its funds]
Serco… Would you like to know more?
depended on the ability of the hijackers to obtain visas [through Serco’s
National Visa Center set up by Field McConnell’s sister Kristine ‘Con Air’ Marcy, the former Senior Counsel for the Detention and Deportation Program for the INS] and pass an immigration and customs inspection in order to enter the United States. It also depended on their ability to remain here undetected while they worked out the operational details of the attack. If they had failed on either count—entering and becoming embedded—the plot could not have been executed. Here we present the facts and circumstances of the hijackers’ travel operation, including their 25 contacts with consular officers and their 43 contacts with immigration and customs authorities. We also discuss the 12
contacts with border authorities by other September 11 conspirators who applied for a visa. The narrative is chronological, retracing the hijackers’ steps from their initial applications for U.S. visas, through their entry into the United States, to their applications for immigration benefits, and up through their acquisition of state identifications that helped them board the planes. Along the way, we note relevant actions by U.S. government authorities to combat terrorism. There were a few lucky breaks for U.S. border authorities in this story. Mostly, though, it is a story of how 19 hijackers easily penetrated U.S. border security.”
guidelines did Hillary Clinton violate?
controversy surrounding Hillary Clinton’s use of a private email server when
she was secretary of state, a determined band of hackers, IT bloggers, and
systems analysts have trained their specialized talents and state-of-the-art
software on clintonemail.com, the domain under which Clinton established
multiple private email accounts, and uncovered serious lapses in security,
according to data shared with Fox News.
question Clinton’s confident declaration, at a hastily arranged news conference
in New York on Tuesday, that “there were no security breaches“ in her use of a
private server. One prominent figure in the hacker community, bolstered by long
experience in the U.S. intelligence community, has undertaken to build a
virtual “replica” of Clinton’s server configuration in a cyberlab, and has
begun testing it with tools designed to probe security defenses. This
individual has shared details of the Clinton system not disclosed publicly but
Among other things,
outside experts have managed to trace the most recent location of Clinton’s
server – something she did not specify during her news conference and a subject
of much speculation, as the server’s physical placement would provide early
clues about whether the data stored on it was adequately secured against
compromise by private-sector hackers and foreign intelligence services.
Fox News has
previously reported that, with the aid of software named Maltego, experts had
established that the server is up and running, receiving connectivity to the Internet
through an Atlanta-based firm called Internap
Network Services Corporation. Clinton’s stern insistence at her news
conference that her server “will remain private” would appear to rest, then, at
least in part, on the inviolability of Internap.
Now, working with
publicly available tools that map network connectivity, experts
have established that the
last “hop” before the mail server’s Internet Protocol, or IP, address (listed
as 188.8.131.52) is Internap’s aggregator in Manhattan (listed as
“This is a very strong
indication that the clintonemail.com server is in Manhattan,” the source told
address for the Internap aggregator into existing databases, the experts
obtained the exact geolocation coordinates for the aggregator – revealed to be
on lower Broadway, at the intersection with Chambers Street, some two blocks
north of City Hall. This in turn suggests that the Clinton server itself lies
within close proximity – most likely former President Clinton’s Harlem office,
and not as far away as the Clintons’ home in Chappaqua, N.Y.
That outside experts
could so swiftly unearth such information left them convinced that the server
remains, as presently configured, highly “vulnerable” to unauthorized intrusion
– even if, as most observers suspect, the server, with so much publicity now
attendant on it, is no longer in active use. The hackers further concluded that
Clinton’s email operation was likely not much better secured when she was
secretary of state.
To test that
proposition, they took the relatively simple step of examining the source code
on the front page of clintonemail.com. This yielded the discovery, sources told
Fox News, that the Clintons have not been using the latest version of Microsoft
Outlook Web Application (OWA) to send and receive emails. The most recent
version of OWA is listed as 184.108.40.206, whereas tests show clintonemail.com to
be using the older 14.2.390.1.
“[It’s] an indication
they’re not keeping up with software upgrades,” one hacker told Fox News. “If I
were a bad guy, I’d start looking for any vulnerabilities in that older version
of the Clinton system also determined that the certificate for its TLS, or
Transport Layer Security, is invalid – a lapse that “makes the site less
secure,” the source said. A screen-grab provided to Fox News and shown here,
illustrating the results of this test, showed the word “FAIL” appearing twice
in a multifaceted stress-test for the security defenses of clintonemail.com.
concerning, private analysts determined that clintonemail.com has been running
an older model of Microsoft Internet Information Services, or IIS –
specifically version 7.5, which has been documented to leave users exposed on
multiple fronts. The website CVEDetails.com, which bills itself as “the
ultimate security vulnerability datasource,” is awash with descriptions of serious security vulnerabilities
associated with version 7.5, including “memory corruption,” “password
disclosure vulnerability,” and the enabling of “remote attackers to execute
arbitrary code or cause a denial of service.”
technician who discovered the Clintons’ use of version 7.5 marveled at “the
vulnerabilities the Clintons are ignoring” in an email to Fox News. “This is a
big deal and just the thing real-world hackers look for in a target and will
exploit to the max,” the source said.
“Several of these
vulnerabilities have been known since 2010 and yet HRC is running official
State comms through it.”
Coupled with the
earlier disclosure, first reported by Bloomberg, that the Clinton system used a commercial
encryption product with “a default encryption certificate, instead of one
purchased specifically for Ms. Clinton’s service,” these latest revelations
suggest a complacent approach to server security on the part of the secretary
and her aides.
Clinton have not responded to multiple requests for comment. Spokesman Nick
Merrill has released a FAQ document stating that “robust protections were put
in place” on the server, with “upgrades and techniques employed over time as
they became available, including consulting and employing third party experts.”
Merrill added that “there is no evidence” that the server was ever hacked, and
said there was never an unauthorized intrusion into the secretary’s
The Merrill document
stated that Clinton’s server “was physically located on her property, which is
protected by U.S. Secret Service,” but did not address its present
Bruce F. Webster, an
IT expert with 40 years of corporate experience — the last 15 spent testifying
on IT issues in civil litigation — raised the question of whether Clinton’s
server has been moved at some point. On his blog, “And Still I
Persist,” Webster entitled his latest post “No, we still don’t know where
the Clinton server is, was, has been.” In an email to Fox News, Webster
referenced suggestions that the server remains in Chappaqua, where it was first
registered, and stated: “I consider that the least likely location at this
Just the original
decision to use a private email account, with Clinton’s own surname embedded in
it, has baffled the hacker community. The analyst with experience in the
intelligence community, a “white hat” hacker — the kind corporate firms retain
to conduct “penetration testing” that exposes businesses’ cybersecurity lapses
— told Fox News: “If we learned that the foreign minister of a major foreign
country was using her own private server to send and receive emails, and was
relying on outdated commercial software to operate and protect it, that’d be a
hallelujah moment for us.”
James Rosen joined Fox
News Channel (FNC) in 1999. He currently serves as the chief Washington
correspondent and hosts the online show “The Foxhole.”“
New York, NY 10011
Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed
on Feb 15, 1994. This file was obtained
from the Secretary of State and has a file
number of 1795583.
This business was
created 7,695 days ago in the New York SOS Office and the registered agent is C
T Corporation System that does business at 111 Eighth Avenue , New York in New
After conducting a
search for principals and owners of Base One Technologies, Ltd., we were able
to find 2 owners and/or executives. Their information is listed below.
updated on May 14, 2013.
Chief Executive Officer
15 Irving Place
New Rochelle, NY 10801
Principal Executive Office
15 Irving Place
New Rochelle, NY 10801
111 EIGHTH AVENUE
NEW YORK, NY 10011
“Serco’s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth
strategies. Through the OPR, Serco mentors four local small businesses
under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One
Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the
fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services
were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring
“Base One Technologies – Corporate Strategy – We are a Government
Certified Women-Owned Business
Recruitment and Staffing for IT positions
Base One was founded
in 1994 by a women engineer who had made a career in technology research for
many years. Base One has been very successful in focusing on diversity
recruiting and staffing for IT projects. It has been our experience that the
greater the diversity mix, the more creative the solution. As in any field the
more diverse the viewpoint the more thorough your analysis. Our engineers can
think out of the box.
Because of our
affiliations we have access to pools of resources among more diverse groups
& individuals. We work with a large pool of minority professionals who
specialize in IT skills. We are able to have access to these resources through
our status as a D/MWBD firm and our affiliations. These affiliations assist us
in working with resources among more diverse groups & individuals.
also partnered with firms that are 8A certified as Minority firms, Disabled
Veteran firms, Native American firms, Vietnam veteran firms, women owned firms.
Our hub zone location
keeps us close to the professional organizations of great diversity. We are
active in recruiting from and networking with these community organizations of
local IT professionals. This has given us access to a large pool of diversity
Base One’s staff of
engineers are a diverse group of professionals. This diverse network of
engineers helps us to branch out to other engineers and creates an even larger
network of resources for us to work with.
The greater the
diversity the more complete & thorough the analysis. The broader the
spectrum of points of view the broader the scope of the analysis. We feel that
a diverse team gives us a greater advantage in creating cutting edge solutions.
To that end we will continue to nurture these relationships to further extend
our talent pool.
The greater the
diversity mix, the more creative the solution.
The more diverse the
viewpoint, the more thorough the analysis.
The more diverse our
team, the more our engineers can think out of the box.
This is why Base One
Technologies concentrates on diversity recruitment in the belief that a diverse
team gives us a greater advantage in creating cutting edge solutions.”
Planning is the process whereby an organization seeks to protect its operations
and assets from data theft or computer hackers that seek to obtain unauthorized
information or sabotage business operations.
From Our Information Security Expertise: Pentagon Renovation Program, FAA, Citigroup,
Base One technologies
designs, and develops information security policies that protect your data and
manage your firm’s information technology risk at levels acceptable to your
assessments and conducts both internal and external penetration testing. The
results of these efforts culminate in an extensive risk analysis and
Develops, implements and supports Information
Security Counter measures such as honey-pots and evidence logging and
incident documentation processes and solutions.”
“Opened in 1994 as the successor to the
Transitional Immigrant Visa Processing Center in Rosslyn, Va., the NVC
centralizes all immigrant visa preprocessing and appointment scheduling for
overseas posts. The NVC collects paperwork and fees before forwarding a
case, ready for adjudication, to the responsible post.
The center also handles immigrant and fiancé visa petitions, and while it does
not adjudicate visa applications, it provides technical assistance and support
to visa-adjudicating consular officials overseas.
Only two Foreign Service officers, the director and deputy director, work at
the center, along with just five Civil Service employees. They work with almost
500 contract employees doing preprocessing of visas, making the center one of
the largest employers in the Portsmouth area.
The contractor, Serco, Inc., has worked with the NVC since its inception and
with the Department for almost 18 years.
The NVC houses more than 2.6 million immigrant visa files, receives almost two
million pieces of mail per year and received more than half a million petitions
from the U.S. Citizenship and Immigration Service (USCIS) in 2011. Its file
rooms’ high-density shelves are stacked floor-to-ceiling with files, each a
collection of someone’s hopes and dreams and each requiring proper handling.
The NVC also preprocesses the chief of mission (COM) application required for
the fi ling of a petition for a Special Immigrant Visa (SIV). Such visas, for
foreign nationals who have performed services for the U.S. government in Iraq
and Afghanistan, require COM concurrence before the applicant can file a
petition with USCIS. The NVC collects the requisite documents from such
applicants and, when complete, forwards the package to the U.S. embassies in
Baghdad or Kabul for COM approval”
“Update on Serco’s Strategy Review including the Contract & Balance
Sheet Reviews; capital structure and funding; latest trading and outlook
Date : 10 November 2014
THIS ANNOUNCEMENT AND THE INFORMATION CONTAINED HEREIN IS RESTRICTED AND IS NOT
FOR RELEASE, PUBLICATION OR DISTRIBUTION, DIRECTLY OR INDIRECTLY, IN WHOLE OR
IN PART, IN, INTO OR FROM THE UNITED STATES, CANADA, AUSTRALIA, JAPAN, SOUTH
AFRICA OR ANY OTHER JURISDICTION IN WHICH THE SAME WOULD BE UNLAWFUL. PLEASE
SEE THE IMPORTANT NOTICE AT THE END OF THIS ANNOUNCEMENT.
… Strategy Review: Serco’s future to be as an international B2G business. A
successful, innovative and market-leading provider of services to Governments.
Core sectors: Justice & Immigration, Defence, Transport, Citizen Services
In the Americas Division, our work for the US Affordable [Obama] Care Act (ACA)
has begun an expanded first option year. Other awards in the period included:
career transition services for US soldiers; health outreach services for the US
Naval Reserve; deployable medical systems solutions also for the Navy; and two
contracts for fleet maintenance services for commercial clients. In total, the
ACA and all other awards in the period are valued at over $550m. Meanwhile, our
contract supporting the Department of State’s National Visa Center and
Kentucky Consular Center (NVC/KCC) came to an end during the period, as did
some Acquisition and Program Management support work for US intelligence agency
customers. C4I2TSR services for the US Air Force and Naval
installation task order work under the Sea Enterprise frameworks are also
For further information please contact Serco:
Stuart Ford, Head of Investor Relations T +44 (0) 1256 386 227
Marcus De Ville, Head of Media Relations T +44 (0) 1256 386 226
Jonathan Glass, Brunswick T +44 (0) 207 404 5959
Analyst and institutional investor meeting…….
Download PDF [PDF, 387 KB] (Please note: this link will open the page in a new
“WHY ON EARTH IS JANE GARVEY ON OBAMA’S RADAR SCREEN?
Appointment Should Be The Last Straw For Americans
published: 02 06, 2009
It’s no surprise that
President Obama and his crack vetting team are considering Randy Babbitt as the
next head of the Federal Aviation Administration. After all, Mr. Babbitt is
former head of the country’s largest union representing airline pilots, and we
know how near and dear to Mr. Obama’s heart unions are.
“The choice, if it
goes through as anticipated,” writes the
Wall St. Journal’s Andy Paszfor (who reports on the FAA), “would satisfy labor
leaders who have been urging the appointment of someone to the FAA sympathetic
to their views. Babbitt has labor connections going back to the
labor-management struggles at Eastern Airlines before the carrier folded
Who suggested Babbitt
to the Obama administration? Why none other than Jane Garvey, the former chief
of the FAA, who, Mr. Paszfor said, is now likely “to get the No. 2 job at the
Department of Transportation.”
To understand what a
horrible – indeed, dangerous – choice Ms. Garvey would be in the sensitive
position of insuring the safety of Americans’ land and air travel, a little
history is in order.
Four months before
Sept. 11, 2001, recently retired Brian Sullivan, a former risk-management
specialist (for over 10 years) in charge of physical security of air-traffic
control towers and air-route traffic control facilities in New England, was so
concerned about the lax security at Logan Airport that he wrote a letter to
Sen. Kerry (D-MA), warning him of the potential for a terrorist disaster at the
His letter held these
prophetic words: “With the concept of jihad, do you think it would be
difficult for a determined terrorist to get on a plane and destroy himself and
all other passengers? Think what the result would be of a coordinated attack
that took down several domestic flights on the same day. With our current
screening, this is more than possible. It is almost likely.”
Sullivan followed up
by sending Kerry a videotape that showed the ease with which undercover reporters
had successfully penetrated Logan’s security screening 10 times with
potentially deadly weapons.
For three months,
Kerry did nothing with the information, finally sending it to the one agency –
the Department of Transportation’s Office of the Inspector General: DOT OIG –
that Sullivan had specifically told him had been consistently remiss in taking
action after such warnings.
Two of the four planes
that attacked our nation on September 11th took off from Logan Airport and
80 of Kerry’s constituents died. Yet Kerry, who held evidence in his hands of
Logan’s vulnerabilities, took no action – when his action may well have
prevented the horrors of that fateful day.
Sullivan also filed a complaint with the Hotline of the Federal Aviation
Administration’s chief administrator Jane Garvey (a Clinton holdover) and had
the incriminating videotape delivered to her office.
WHO IS JANE GARVEY?
In the mid-’90s,
Garvey was the former top administrator at Logan Airport, where it was no
secret that the airport’s security system was riddled with problems. Strangely,
however, the unremarkable job she did at Logan was thought worthy of reward by
the Clinton administration.
served to affirm the validity of the Peter Principle – in which people are
promoted until they reach their ultimate level of incompetence – Clinton
appointed Garvey to be director of the FAA in 1997.
During her tenure,
Sullivan said, “FAA security personnel were placed in key management positions
despite their limited experience in air security and their apparent ideological
aversion to prescreen high-suspect people”: i.e., Arab males from the Middle
East between the ages of 20-40.
Two years after Garvey
took the helm, the FAA fined the Massachusetts Port Authority $178,000 for 136
security violations at Logan that included failure to screen baggage properly
and allowing easy access to restricted areas and parked planes. On one
occasion, a 17-year-old man cut the razor wire on a perimeter fence surrounding
Logan and walked for two miles across restricted areas, finally stowing away on
a British Airways Boeing 747.
Did Garvey’s FAA
follow up on those fines? No. In the criminal indictment she never received,
surely Exhibit A would have been September 11!
It is public knowledge
that during the spring and summer of 2001, Garvey’s FAA sent out a CD-ROM of
potential terrorist threats prepared by her security chief, Mike Canavan, to
700 airlines and airport executives. The FAA also had extensive data about Al
Qaida and bin Laden in its Criminal Acts Against Civil Aviation Reports for
1999 and 2000. For instance:
In a May 1998
interview, Bin Ladin suggested that he could use a shoulder-fired surface-to-air
missile to shoot down a military passenger aircraft transporting U.S. military
personnel, adding that his attacks would not distinguish between U.S. civilians
and military personnel… an exiled Islamic leader in the United Kingdom
proclaimed in August 1998 that Bin Ladin would “bring down an airliner or
hijack an airliner to humiliate the United States.”
masterminded the 1994 conspiracy to place explosive devices on as many as 12
U.S. airliners flying out of the Far East. In September 1996, Yousef was
convicted for this plan and for placing a device on a Philippine Airlines plane
in December 1994 as a test for his more elaborate scheme. Although Yousef is
currently in prison, at least one other accused participant in the conspiracy
remains at large. There are concerns that this individual or others of Yousef’s
ilk who may possess similar skills pose a continuing threat to civil aviation
The terrorist threat
remains. The most recent significant aviation-related terrorist action was the
December 1999 hijacking of an Indian Airlines plane by members of a Kashmiri
separatist group. There continues to be concern that the hijacking may either
be copied or spur others to commit acts because this incident succeeded in
gaining the release of prisoners and the hijackers have never been caught.
Another threat is attributed to terrorist financier Usama Bin Laden…[who] has
both the motivation and the wherewithal to do so.
I-don’t-know-nuthin’ Garvey testified before the 9/11 Commission, she claimed
ignorance of any threats – saying that she hadn’t seen the CD-ROM until after
The 9/11 Commission
didn’t believe her. On page 83, its report states: “… the FAA’s
intelligence unit did not receive much attention from the agency’s leadership.
Neither Administrator Jane Garvey nor her deputy routinely reviewed daily
intelligence, and what they did see was screened for them. She was unaware of a
great amount of hijacking threat information from her own intelligence unit,
which, in turn, was not deeply involved in the agency’s policymaking process.
Historically, decisive security action took place only after (my
emphasis) a disaster had occurred or a specific plot had been discovered.”
Further, according to
Kevin Berger of Salon.com, commenting on reaction to the 9/11 Commission’s
Report: “But all of the international intrigue, not to mention partisan sniping
over what president or government agency was at fault, has deflected attention
from the one culprit that gets a universal thrashing in the 9/11 report: the
Federal Aviation Administration.” Translation: Jane Garvey!.
Berger documented the
9/11 Commission’s findings of the grievous failings of the FAA under Garvey:
that was relevant to hijackings – intelligence, passenger prescreening,
checkpoint screening, and onboard security – was seriously flawed.
watch lists contained the names of tens of thousands of known terrorists,
including a State Department TIP-OFF list with 60,000 names, the FAA’s own
“no-fly” list contained names of just 12 terrorist suspects.
At Logan’s check-in
counters, airline clerks tagged four of the five hijackers on American Flight
11 (the first jet to hit the World Trade Center) as suspect, yet they were
allowed to board the plane.
Two of the hijackers
on American Flight 77 from Dulles, which crashed into the Pentagon, set off the
security gate alarm but the screeners didn’t bother to investigate further and,
again, allowed the hijackers to board the plane.
Garvey did not review daily intelligence and so was “unaware of a great
amount of hijacking threat information from her own intelligence unit.”
It was also under
Garvey that the then-Computer Assisted PassengerProfiling System, or CAPPS
I was neutered. After 9/11, the program was renamed the Computer Assisted
Passenger Prescreening System, or CAPPs II, because, according to
Sullivan, “of overzealous liberals, the American Civil Liberties Union and the
diversity crowd who are hell-bent on insuring that political correctness is
always implemented at the expense of our basic security.”
additional flaws in Garvey’s FAA, all of them omittedfrom the 9/11
Commission’s report. For instance:
A memo dated April
2001 from Joe Lawless, director of security at the Massachusetts Port
Authority, citing terrorist ties to Logan Airport and the need to address the
airport’s known vulnerabilities.
The rejection of
another Lawless memo by the Logan Airline Managers Council (LAMCO) and the
FAA’s federal security manager at Logan, proposing that the Mass. State Police
begin undercover testing of screening checkpoints in July ’01.
Reported sightings of
Mohammed Atta at Logan in May and early September ’01, involved in suspicious
activity on the Air Operations Area and surveillance of checkpoints.
Yet all this is not
where Garvey’s egregious mismanagement of the FAA ends. According to NY Times
reporter Matthew L. Wald, Garvey ignored both past incidents and those under
her watch, including:
1994: The hijacking of
two jetliners (one by an Islamic “militant” group) with the intent of “crashing
them into buildings.”
1994: A man stormed
the cockpit of a domestic flight with the intention, according to his fellow
employees, of crashing the plane into a building in Memphis.
1994: A lone pilot
crashed a stolen single-engine Cessna into a tree on the White House grounds
near the president’s bedroom.
1996: The crash of
T.W.A. Flight 800, which to this day many people believe was a terrorist
1999: A report of an
exiled Islamic leader in Britain who said in August 1998 that bin Laden would
”bring down an airliner or hijack an airliner to humiliate the United
2000: The FAA’s annual
report saying that although Osama bin Laden ”is not known to have attacked
civil aviation, he has both the motivation and the wherewithal to do so…bin
Laden’s anti-Western and anti-American attitudes make him and his followers a
significant threat to civil aviation, particularly to U.S. civil aviation.”
“But aviation security
officials,” Wald said, “never extrapolated any sort of pattern from those
incidents.” That includes the top official – the FAA’s Jane Garvey.
Yet in spite of
mountains of evidence pointing to Garvey’s complete incompetence, and in spite
of the all the security experts in the United States – which include former or
active police chiefs, retired FBI and CIA operatives and private companies that
spend 24/7/365 assessing threats and formulating “coping” strategies – Kerry
chose Garvey as an “expert” consultant IN CHARGE OF SECURITY for the 2004
Democratic National Convention.
That’s right, Jane
Garvey, who was singled out by the “we won’t point fingers” 9/11 Commission as
taking action “only after a disaster had occurred …” and whose FAA got “a
universal thrashing” in the report.
A commentary in
Aviation Insight & Perspectives said that: “Appointing Garvey head of
convention security is like making John Gotti the head of the FBI.”
Sadly, according to
Brian Sullivan, “one single recommendation from the Gore Commission in 1997 to
harden cockpit doors and enforce rules to keep them closed would have stopped
the 9/11 attack cold. If the FAA’s Garvey and DOT’s chief Norman Mineta hadn’t
been asleep at the wheel, 9/11 wouldn’t have happened, plain and simple.”
But it did happen and
now we’re left to ponder how on earth the Obama administration could be
considering Garvey for the No. 2 spot at the FAA.
After less than three
weeks in office, the woefully inexperienced Mr. Obama has offered our country
the services of three tax cheats (Geithner, Daschle, and Killefer), a man under
criminal investigation (Richardson), and a host of leftist policymakers that
would do the Marxist-Leninist Politburo proud.
appointment of the incompetent Jane Garvey to the deputy’s job at the DOT – which
has oversight of the FAA – should be the last straw for Americans of every
political stripe, or at least those who care about the still-looming terrorist
threat and their own safety on our roads and rails, and in the skies.”
airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well
blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation