Plum City – (AbelDanger.net): United States Marine Field McConnell has linked Serco/Base One Technologies’ development of a server in the Bronx for the Clinton Shadow State to HSBC’s alleged loan funding of a HUBZone snuff-film crew to record the Black Hand* torture, rape and murder of the late Christopher Stevens in Benghzai on 9/11/2012.
Black Hand* – HSBC’s drug-hub navigators with a “License to Track, Film and Kill” for the City of London’s Honourable Artillery Company 1537; The Master Mariners and Air Pilots (formerly GAPAN) 1929, and The Ancient and Honorable Artillery Company of Massachusetts 1638 – whose alumni include the United States’ Presidents James Monroe, Chester Alan Arthur, Calvin Coolidge and John F. Kennedy and – perhaps – Barack ‘Choom Gang’ Obama.
McConnell notes that the Serco/Base One server in the Bronx was commissioned in February 15, 1994 by then-Secretary of State Colin Powell and allegedly used by the Clinton Shadow State to stand down first responders at Black Hand crime scenes including the Murrah Federal Building in OKC (bombed April 19, 1995) and the USS Cole in Aden Harbor (bombed 12 October 2000).
McConnell claims the Clinton Shadow State used the Serco/Base One server to set up the entire state of Hawaii as a HUBZone in 2006 and subsequently extort the late Loretta Fuddy, a former Director of the Hawaii Department of Health, into signing off on various Black Hand document conversions needed by Barack Obama to maintain his status as a natural-born American citizen.
McConnell claims the Clinton Shadow State used the Serco/Base One server to record the snuff film murder of Christopher Stevens in 2012 and notes an earlier, published image of the former Secretary of State, Hillary Clinton, as she bypassed the State Department with a Blackberry (Canadian RIM!) on board a C-military plane headed to Tripoli in September 2011, around a month after a Black Hand snuff film showed Colonel Gaddafi being sodomized with a bayonet!
“The spoliation of evidence is the intentional, reckless, or negligent withholding, hiding, altering, or destroying of evidence relevant to a legal proceeding. Spoliation has two possible consequences: in jurisdictions where the (intentional) act is criminal by statute, it may result in fines and incarceration (if convicted in a separate criminal proceeding) for the parties who engaged in the spoliation; in jurisdictions where relevant case law precedent has been established, proceedings possibly altered by spoliation may be interpreted under a spoliation inference, or by other corrective measures, depending on the jurisdiction.
The spoliation inference is a negative evidentiary inference that a finder of fact can draw from a party’s destruction of a document or thing that is relevant to an ongoing or reasonably foreseeable civil or criminal proceeding: the finder of fact can review all evidence uncovered in as strong a light as possible against the spoliator and in favor of the opposing party … Companies and organizations often attempt to avoid spoliation of evidence (or being accused or held liable therewith) by using a legal hold. Often, the legal departments of the company or organization will issue a prescribed order to the relevant employees to retain and preserve their discoverable materials (such as e-mails and documents).”
McConnell believes that members of the Clinton Shadow State should be indicted for spoliation of evidence offences related to their alleged use of a Serco/Base One server and HSBC loan-funded HUBZone snuff-film crews to record the torture murder of the late Christopher Stevens in Benghzai on 9/11/2012.
SWISSLEAKS – “HSBC developed dangerous clients: arms merchants, drug dealers, terrorism financers”
Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! (Mobile Playback Version)[Note that HSBC is Serco’s banker and one of Serco’s major shareholders with Her Majesty’s Government and its funds]
Serco… Would you like to know more?
“Hiding something, Hillary? Clinton removes Twitter photo of her typing on Blackberry en route to Libya – amid claims she is withholding emails from Benghazi crisis
Former Secretary of State swapped out phone picture for a blank silhouette
Said the switch was to raise awareness of gender equality initiative
Came amid huge scrutiny over use of private emails to enact foreign policy
Photograph was seized on to complain about emails withheld from Congress
Rep. Trey Gowdy said it ‘strains credibility’ to think picture from 2011 does not show Clinton dealing with Libya situation using private accounts
By KIERAN CORCORAN FOR DAILYMAIL.COM
PUBLISHED: 02:00 GMT, 9 March 2015 | UPDATED: 12:16 GMT, 9 March 2015
With her dark sunglasses and stony expression, the image of Hillary staring at her smartphone made her look such a boss that it launched its own Tumblr parody account.
The photograph, which dates from a trip to Tripoli, Libya in September 2011, was even adopted by the former Secretary of State herself for her Twitter profile picture.
However, it seems that the picture which inspired hundreds of comedy memes could be no laughing matter for Clinton as it emerges the photograph could be a figurative smoking gun.
Indeed, Clinton herself has removed the image removed from her Twitter account because it could show her using her controversial personal email account to conduct diplomacy in Libya.
For more than a year, the former Secretary of State had used the monochrome image of her using a Blackberry on board a C-military plane headed to Tripoli in September 2011, around a month after Colonel Gaddafi’s regime fell.
But the picture, regularly seen by her 2.9million followers, was removed Sunday – ostensibly to promote a political campaign for gender equality, timed to coincide with International Women’s Day.
The image was once a symbol of Clinton’s funny side as the face of the Texts From Hillary meme, which she said had given her ‘many LOLZ’ – but fell out of favor this week.
Switcheroo: Hillary Clinton swapped out a picture of her using a Blackberry on her way to Libya for a silhouette promoting a gender equality initiative
However, the change also comes at a time when senior figures in Congress are intensifying scrutiny of Hillary’s communications from 2009-13, which it was recently revealed were not conducted via official State Department accounts.
Clinton has handed over swathes of communications from the time, but it has been claimed that the documents have ‘huge gaps’.
The image was mentioned by the chairman of a House committee into the 2012 attack on U.S. diplomats in Benghazi to suggest that vital communications from Clinton’s involvement in Libya were being kept from public view.
Rep. Trey Gowdy (R-South Carolina), today told CBS’s Face the Nation that he has been provided with no emails from the September 2011 trip – despite Clinton being clearly pictures communicating while aboard the plane.
Proof? The chairman of the House Committee on Benghazi mentioned that he has seen no emails from Clinton’s time in Libya, despite pictures such as this one from 2011, showing her using a Blackberry
He said: ‘There are gaps of months and months and months. And if you think to that iconic picture of her on a C-17 flying to Libya, she has sunglasses on and she has her handheld device in her hand, we have no e-mails from that day. In fact, we have no e-mails from that trip.
‘So, it’s strange credibility to believe that if you’re on your way to Libya to discuss Libyan policy that there’s not a single document that has been turned over to Congress.
‘So, there are huge gaps. And with respect to the president, it’s not up to Secretary Clinton to decide what is a public record and what’s not.’
Gowdy also said the records don’t include anything from around the dates of the Benghazi attack itself, in which the U.S. ambassador to Libya was killed.
Suspicions: Rep. Trey Gowdy (R-South Carolina) mentioned the pictured of Clinton while contending that emails from her time in Libya had not been handed over
As of Sunday evening, Clinton’s profile still featured the Blackberry image, but as the ‘header photo’ displayed at the top of the Twitter page.
In order to see it, users have to access her profile directly. The image will not appear in the timelines of her followers, nor when she is retweeted or appears in search results.
Clinton herself tweeted to explain the change of profile picture. She wrote: ‘See my new profile pic to raise awareness on how far we’ve come in reaching equal rights for women & girls worldwide.’
She also included a link to Not-There.org, which is sponsored by the Clinton foundation she runs with her husband, former President Bill Clinton.
‘OMG… BUSTED’: HOW HILLARY CLINTON USED TO SEE THE FUNNY SIDE
Hillary Clinton used to love the photograph now shunted out of her Twitter profile – at least enough to spend time making a meme out of it.
After memes imagining her texting politicians and other celebrities took off, she made her own contribution.
Diplomatically, unlike many entries on the Texts From Hillary Tumblr site, Hillary’s entry does not insult any political rivals, but just ribs the site’s creators.
From Madam Secretary: Hillary Clinton made this entry into the Texts From Hillary meme herself – but has now replaced the recognizable photo
“GOP lawmaker: Clinton email server key to Benghazi inquiry
By MATTHEW DALY 5 hours ago
FILE – In this Sept. 17, 2014, file photo, Rep. Susan Brooks, R-Ind. speaks on Capitol Hill in Washington, during a House Select Committee on Benghazi hearing on the implementation of the Accountability Review Board recommendations. Brooks said Saturday, March 14, that Hillary Rodham Clinton’s email server could help the panel answer vital questions, including why security at the U.S. diplomatic compound in the Libyan city was inadequate. (AP Photo/Carolyn Kaster, File)
WASHINGTON (AP) — A member of the House committee investigating the deadly attacks against Americans in Benghazi, Libya, says Hillary Rodham Clinton’s email server could help lawmakers answer vital questions.
Among them: Why was security at the U.S. diplomatic compound inadequate?
Rep. Susan Brooks of Indiana said in the weekly Republican radio address Saturday that gaining access to Clinton’s server is “the only way to truly know” that investigators have obtained all the State Department communications that “rightfully belong to the American people.”
Clinton acknowledged this past week that as the nation’s top diplomat, she relied on a personal email account rather than one operated by the government.
The committee chairman Republican Rep. Trey Gowdy of South Carolina, has called on Clinton to turn over the server for an independent review; Clinton so far has rebuffed the request.
GOP leaders have not ruled out a House vote to force Clinton to turn over the server, setting up a possible confrontation between the GOP-led Congress and the person who could be the Democratic front-runner for president in 2016.
Brooks said in her address that the server could help her committee “answer vital questions,” including why requests for additional security at the Benghazi compound were denied, and why some members of the Obama administration appeared “slow to acknowledge” that a terrorist attack had occurred.
“It is simply unacceptable for so many questions to remain unanswered,’ Brooks said. “And it is unjust and simply wrong for anyone to withhold evidence that may lead to the answers.”
President Barack Obama has promised that his administration would be the “most transparent administration in history,” but Brooks said Clinton “has fallen painfully short” of that mark.
Clinton served as secretary of state during Obama’s first term. She is widely considered the favorite for the Democratic nomination for president, although she has not announced her candidacy.
“October 1, 2002.–Ordered to be printed Mr. Kerry, from the Committee on Small Business and Entrepreneurship, submitted the following
R E P O R T [To accompany S. 1994] The Committee on Small Business and Entrepreneurship, to which was referred the bill, S. 1994, to establish a priority preference among certain small business concerns for purposes of Federal contracts, and for other purposes, having considered the same, reports favorably thereon with amendments and recommends that the bill (as amended) do pass.
On July 24, 2002, the Small Business and Entrepreneurship Committee considered S. 1994, the “Combined 8(a) and HUBZone Priority Preference Act.” The Committee adopted by unanimous voice vote an amendment offered by the Ranking Republican, Senator Christopher S. Bond and the Chairman, Senator John F. Kerry. As amended, S. 1994 would provide certain benefits to small business concerns with both 8(a) Business Development (BD) Program and Historically Underutilized Business Zone Program (HUBZone) certifications (8(a) HUBZone small business concern) under restricted competition contracts within each program; establish a price evaluation preference for the purposes of bidding on Federal procurement contracts under full and open competition for 8(a) HUBZone small business concerns; and raise the sole-source threshold for all 8(a) BD and HUBZone small business concerns to $4 million on goods and services contracts and $6 million for manufacturing contracts, an increase of $1 million for each category. Having considered S. 1994, as amended, the Committee reports favorably thereon without further amendment and recommends that the bill do pass.”
What State Dept. guidelines did Hillary Clinton violate?
Stirred by the controversy surrounding Hillary Clinton’s use of a private email server when she was secretary of state, a determined band of hackers, IT bloggers, and systems analysts have trained their specialized talents and state-of-the-art software on clintonemail.com, the domain under which Clinton established multiple private email accounts, and uncovered serious lapses in security, according to data shared with Fox News.
The findings call into question Clinton’s confident declaration, at a hastily arranged news conference in New York on Tuesday, that “there were no security breaches” in her use of a private server. One prominent figure in the hacker community, bolstered by long experience in the U.S.
intelligence community, has undertaken to build a virtual “replica” of Clinton’s server configuration in a cyberlab, and has begun testing it with tools designed to probe security defenses. This individual has shared details of the Clinton system not disclosed publicly but legally obtainable.
Among other things, outside experts have managed to trace the most recent location of Clinton’s server – something she did not specify during her news conference and a subject of much speculation, as the server’s physical placement would provide early clues about whether the data stored on it was adequately secured against compromise by private-sector hackers and foreign intelligence services.
Fox News has previously reported that, with the aid of software named Maltego, experts had established that the server is up and running, receiving connectivity to the Internet through an Atlanta-based firm called Internap Network Services Corporation. Clinton’s stern insistence at her news conference that her server “will remain private” would appear to rest, then, at least in part, on the inviolability of Internap.
Now, working with publicly available tools that map network connectivity, experts have established that the last “hop” before the mail server’s Internet Protocol, or IP, address (listed as 184.108.40.206) is Internap’s aggregator in Manhattan (listed as 220.127.116.11).
“This is a very strong indication that the clintonemail.com server is in Manhattan,” the source told Fox News.
By entering the IP address for the Internap aggregator into existing databases, the experts obtained the exact geolocation coordinates for the aggregator – revealed to be on lower Broadway, at the intersection with Chambers Street, some two blocks north of City Hall. This in turn suggests that the Clinton server itself lies within close proximity – most likely former President Clinton’s Harlem office, and not as far away as the Clintons’ home in Chappaqua, N.Y.
That outside experts could so swiftly unearth such information left them convinced that the server remains, as presently configured, highly “vulnerable” to unauthorized intrusion – even if, as most observers suspect, the server, with so much publicity now attendant on it, is no longer in active use. The hackers further concluded that Clinton’s email operation was likely not much better secured when she was secretary of state.
To test that proposition, they took the relatively simple step of examining the source code on the front page of clintonemail.com. This yielded the discovery, sources told Fox News, that the Clintons have not been using the latest version of Microsoft Outlook Web Application (OWA) to send and receive emails. The most recent version of OWA is listed as 18.104.22.168, whereas tests show clintonemail.com to be using the older 14.2.390.1. “[It’s] an indication they’re not keeping up with software upgrades,” one hacker told Fox News. “If I were a bad guy, I’d start looking for any vulnerabilities in that older version they’re using.”
Expand / Contract
Work on the “replica” of the Clinton system also determined that the certificate for its TLS, or Transport Layer Security, is invalid – a lapse that “makes the site less secure,” the source said. A screen-grab provided to Fox News and shown here, illustrating the results of this test, showed the word “FAIL” appearing twice in a multifaceted stress-test for the security defenses of clintonemail.com.
Perhaps most concerning, private analysts determined that clintonemail.com has been running an older model of Microsoft Internet Information Services, or IIS – specifically version 7.5, which has been documented to leave users exposed on multiple fronts. The website CVEDetails.com, which bills itself as “the ultimate security vulnerability datasource,” is awash with descriptions of serious security vulnerabilities associated with version 7.5, including “memory corruption,” “password disclosure vulnerability,” and the enabling of “remote attackers to execute arbitrary code or cause a denial of service.”
The cyberlab technician who discovered the Clintons’ use of version 7.5 marveled at “the vulnerabilities the Clintons are ignoring” in an email to Fox News. “This is a big deal and just the thing real-world hackers look for in a target and will exploit to the max,” the source said.
“Several of these vulnerabilities have been known since 2010 and yet HRC is running official State comms through it.”
Coupled with the earlier disclosure, first reported by Bloomberg, that the Clinton system used a commercial encryption product with “a default encryption certificate, instead of one purchased specifically for Ms. Clinton’s service,” these latest revelations suggest a complacent approach to server security on the part of the secretary and her aides.
Representatives for Clinton have not responded to multiple requests for comment. Spokesman Nick Merrill has released a FAQ document stating that “robust protections were put in place” on the server, with “upgrades and techniques employed over time as they became available, including consulting and employing third party experts.” Merrill added that “there is no evidence” that the server was ever hacked, and said there was never an unauthorized intrusion into the secretary’s email.
The Merrill document stated that Clinton’s server “was physically located on her property, which is protected by U.S. Secret Service,” but did not address its present location.
Bruce F. Webster, an IT expert with 40 years of corporate experience — the last 15 spent testifying on IT issues in civil litigation — raised the question of whether Clinton’s server has been moved at some point. On his blog, “And Still I Persist,” Webster entitled his latest post “No, we still don’t know where the Clinton server is, was, has been.” In an email to Fox News, Webster referenced suggestions that the server remains in Chappaqua, where it was first registered, and stated: “I consider that the least likely location at this point.”
Just the original decision to use a private email account, with Clinton’s own surname embedded in it, has baffled the hacker community. The analyst with experience in the intelligence community, a “white hat” hacker — the kind corporate firms retain to conduct “penetration testing” that exposes businesses’ cybersecurity lapses — told Fox News: “If we learned that the foreign minister of a major foreign country was using her own private server to send and receive emails, and was relying on outdated commercial software to operate and protect it, that’d be a hallelujah moment for us.”
James Rosen joined Fox News Channel (FNC) in 1999. He currently serves as the chief Washington correspondent and hosts the online show “The Foxhole.””
111 Eighth Avenue
New York, NY 10011
Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994. This file was obtained from the Secretary of State and has a file number of 1795583.
This business was created 7,695 days ago in the New York SOS Office and the registered agent is C T Corporation System that does business at 111 Eighth Avenue , New York in New York.
After conducting a search for principals and owners of Base One Technologies, Ltd., we were able to find 2 owners and/or executives. Their information is listed below.
“Serco’s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals.” http://www.dtic.mil/whs/directives/corres/pdf/100515p.pdf
“Base One Technologies – Corporate Strategy – We are a Government Certified Women-Owned Business
We practice Diversity Recruitment and Staffing for IT positions
Base One was founded in 1994 by a women engineer who had made a career in technology research for many years. Base One has been very successful in focusing on diversity recruiting and staffing for IT projects. It has been our experience that the greater the diversity mix, the more creative the solution. As in any field the more diverse the viewpoint the more thorough your analysis. Our engineers can think out of the box.
Because of our affiliations we have access to pools of resources among more diverse groups & individuals. We work with a large pool of minority professionals who specialize in IT skills. We are able to have access to these resources through our status as a D/MWBD firm and our affiliations.
These affiliations assist us in working with resources among more diverse groups & individuals. We are also partnered with firms that are 8A certified as Minority firms, Disabled Veteran firms, Native American firms, Vietnam veteran firms, women owned firms.
Our hub zone location keeps us close to the professional organizations of great diversity. We are active in recruiting from and networking with these community organizations of local IT professionals. This has given us access to a large pool of diversity talent.
Base One’s staff of engineers are a diverse group of professionals. This diverse network of engineers helps us to branch out to other engineers and creates an even larger network of resources for us to work with.
The greater the diversity the more complete & thorough the analysis. The broader the spectrum of points of view the broader the scope of the analysis. We feel that a diverse team gives us a greater advantage in creating cutting edge solutions. To that end we will continue to nurture these relationships to further extend our talent pool.
The greater the diversity mix, the more creative the solution.
The more diverse the viewpoint, the more thorough the analysis.
The more diverse our team, the more our engineers can think out of the box.
This is why Base One Technologies concentrates on diversity recruitment in the belief that a diverse team gives us a greater advantage in creating cutting edge solutions.”
Information Security Planning is the process whereby an organization seeks to protect its operations and assets from data theft or computer hackers that seek to obtain unauthorized information or sabotage business operations.
Key Clients Benefiting From Our Information Security Expertise: Pentagon Renovation Program, FAA, Citigroup, MCI.
Base One Technologies
Expertly researches, designs, and develops information security policies that protect your data and manage your firm’s information technology risk at levels acceptable to your business.
Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report.
Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions.”
“Hawaii named SBA “HUBZone”
Jun 26, 2006, 3:46pm HST UPDATED: Jun 27, 2006, 9:23am HST
The entire state has been designated by the Small Business Administration as a “HUBZone,” enabling business owners to get streamlined access to a special loan program.
By naming Hawaii a “Historically Underutilized Business Zone,” or HUBZone, entrepreneurs across the state are eligible to apply for community express loans of up to $50,000 for starting or expanding a business.
Before the designation was made official earlier this month, only a few areas of Hawaii were given HUBZone status.
In addition to a streamlined loan application process, applicants also are eligible for free advice from business and management consultants.
Andrew Poepoe, district director of SBA’s Hawaii office, said more than 250 of the loans already have been made and that the new designation will make many other business owners eligible.
“HUBZone is a United States Small Business Administration (SBA) program for small companies that operate and employ people in Historically Underutilized Business Zones (HUBZones). The HUBZone program was created in response to the HUBZone Empowerment Act created by the US Congress in 1998 . Based on the Act, small businesses will be designated as HUBZone certified if they have the following criteria:
The firm must be a small business based on the North American Industry Classification System (NAICS) for size standards.
The business must be at least 51% owned and controlled by U.S. citizens, or a Community Development Corporation, an agricultural cooperative, or an Indian tribe (including Alaska Native Corporations).
The firm’s principal office (the location where the greatest number of employees perform their work, excluding contract sites) must be in a HUBZone.
35% of the firms total workforce must reside in a HUBZone.”
“Opened in 1994 as the successor to the Transitional Immigrant Visa Processing Center in Rosslyn, Va., the NVC centralizes all immigrant visa preprocessing and appointment scheduling for overseas posts. The NVC collects paperwork and fees before forwarding a case, ready for adjudication, to the responsible post.
The center also handles immigrant and fiancé visa petitions, and while it does not adjudicate visa applications, it provides technical assistance and support to visa-adjudicating consular officials overseas.
Only two Foreign Service officers, the director and deputy director, work at the center, along with just five Civil Service employees. They work with almost 500 contract employees doing preprocessing of visas, making the center one of the largest employers in the Portsmouth area.
The contractor, Serco, Inc., has worked with the NVC since its inception and with the Department for almost 18 years.
The NVC houses more than 2.6 million immigrant visa files, receives almost two million pieces of mail per year and received more than half a million petitions from the U.S. Citizenship and Immigration Service (USCIS) in 2011. Its file rooms’ high-density shelves are stacked floor-to-ceiling with files, each a collection of someone’s hopes and dreams and each requiring proper handling.
The NVC also preprocesses the chief of mission (COM) application required for the fi ling of a petition for a Special Immigrant Visa (SIV). Such visas, for foreign nationals who have performed services for the U.S. government in Iraq and Afghanistan, require COM concurrence before the applicant can file a petition with USCIS. The NVC collects the requisite documents from such applicants and, when complete, forwards the package to the U.S. embassies in Baghdad or Kabul for COM approval”
“Update on Serco’s Strategy Review including the Contract & Balance Sheet Reviews; capital structure and funding; latest trading and outlook
Date : 10 November 2014
THIS ANNOUNCEMENT AND THE INFORMATION CONTAINED HEREIN IS RESTRICTED AND IS NOT FOR RELEASE, PUBLICATION OR DISTRIBUTION, DIRECTLY OR INDIRECTLY, IN WHOLE OR IN PART, IN, INTO OR FROM THE UNITED STATES, CANADA, AUSTRALIA, JAPAN, SOUTH AFRICA OR ANY OTHER JURISDICTION IN WHICH THE SAME WOULD BE UNLAWFUL. PLEASE SEE THE IMPORTANT NOTICE AT THE END OF THIS ANNOUNCEMENT.
… Strategy Review: Serco’s future to be as an international B2G business. A successful, innovative and market-leading provider of services to Governments. Core sectors: Justice & Immigration, Defence, Transport, Citizen Services and Healthcare.
In the Americas Division, our work for the US Affordable [Obama] Care Act (ACA) has begun an expanded first option year. Other awards in the period included: career transition services for US soldiers; health outreach services for the US Naval Reserve; deployable medical systems solutions also for the Navy; and two contracts for fleet maintenance services for commercial clients. In total, the ACA and all other awards in the period are valued at over $550m. Meanwhile, our contract supporting the Department of State’s National Visa Center and Kentucky Consular Center (NVC/KCC) came to an end during the period, as did some Acquisition and Program Management support work for US intelligence agency customers. C4I2TSR services for the US Air Force and Naval installation task order work under the Sea Enterprise frameworks are also reducing. …
For further information please contact Serco:
Stuart Ford, Head of Investor Relations T +44 (0) 1256 386 227
Marcus De Ville, Head of Media Relations T +44 (0) 1256 386 226
Jonathan Glass, Brunswick T +44 (0) 207 404 5959
Analyst and institutional investor meeting…….
Download PDF [PDF, 387 KB] (Please note: this link will open the page in a new browser window)”
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation
148 Total Views 1 Views Today
Please follow and like us:
Liked it? Take a second to support tokyowashi on Patreon!