#2318: Marine Links Serco’s Interpol Honeypots To Base-One Clinton Mentors, Black-Hand Lubitz Murder
Plum City – (AbelDanger.net): United States Marine Field McConnell has linked Interpol pedophile and server-based honeypots – allegedly run by Crown Agents and Serco (formerly RCA GB) operatives out of Berlin during WWII – to Hillary Clinton’s mentorship by Base One Technologies in the Bronx since February 1994 and Serco’s apparent use of Black Hand* patented devices to frame co-pilot Andreas Lubitz with the crash of Germanwings Flight 9525 as a murder suicide.
McConnell notes that James Byrnes – one of Clinton’s rogue predecessors as Secretary of State – became head of the Office of War Mobilization in May 1943 where he apparently helped set up Interpol honeypots for WWII by sharing files on wanted criminals with British Crown Agents in New York, FBI director J. Edgar Hoover in Washington D.C. and Nazi leaders in Berlin.
McConnell claims Serco and its drug-hub banker HSBC used an Interpol sexual honeypot to activate ‘suicidal tendencies‘ prior to Lubitz’s tranquilized death while Clinton’s Base One mentors used her server for a Black Hand*-in-the-middle attack on the Airbus 320 autopilot which guided the smooth descent into the fatal crash of Germanwings Flight 9525 into the French Alps.
“Friends of Germanwings crash pilot say he is being framed as part of a Lufthansa cover-up over mechanical failings… as Google Maps blur out his former home to stop people looking it up .. Claim black box was doctored to make it appear he deliberately crashed jet ..
By SIMON TOMLINSON FOR MAILONLINE .. UPDATED: 15:37 GMT, 31 March 2015
Some suggest the black box voice recorder had been tampered with by Germanwings parent company, Lufthansa, to make it appear as if Lubitz had deliberately crashed the plane. … Strict German privacy laws which prevented doctors treating Andreas Lubitz from telling his airline about his ‘suicidal tendencies’ were introduced as a consequence of the Nazis. The Germanwings pilot had been forced to stop his training because of severe depression and had received psychotherapy for several years before last week’s Alps disaster. But German law meant it was left entirely up to him to volunteer his mental health problems to his employer, something he failed to do with devastating consequences after tearing up a sick note for the day of the crash. The findings from the investigation have prompted heated debate in Germany on a patient’s right to privacy, with Chancellor Angela Merkel proposing an inquiry to re-examine the law. Draconian legislation was initially brought in after World War Two to prevent a repeat of government spying during the Nazi era and subsequently the Stasi secret police in East Germany.”
“As America stood on the threshold of World War II Hoover continued a friendly relationship with the Nazis who dominated Interpol, the Berlin-based international secret police. He had been obsessed with the “Red menace” since 1919 when he became head of the Bureau’s General Intelligence Division. Heinrich Himmler, Reinhard Heydrich, Arthur Nebe and other fanatical Nazis were active in Interpol. Even after Hitler occupied Czechoslovakia, Hoover ignored all evidence of Nazi death squads and atrocities and cooperated with the boys in Berlin. As France fell, Hoover exchanged lists of wanted criminals, enclosing autographed photographs of himself. It was not until three days before Pearl Harbour that he called a halt — and then only because he feared his image might be tarnished.
“Global swoop on newsgroup paedophiles
17:08 28 November 2001
by Will Knight
More than 130 people in 19 different countries have been arrested or are under investigation after police traced the distribution of child pornography through different internet newsgroups. Technical experts at UK internet service provider Demon Internet aided officers from the National Crime Squad’s new Hi-Tech Crime Unit with the investigation. A spokesperson from Thus, Demon’s parent company, says that investigators were not given access to the server logs that record Demon users’ activities. .. Officers traced postings relating to certain images to different internet service providers around the world and then contacted Interpol to track down suspects. Investigators say they discovered 10,000 suspect postings to over 30 different newsgroups and identified 60,000 new images. They plan to use face recognition software to identify victims in different images, to help trace them. This software has been developed in conjunction with UK company Serco, although no technical details have been released. .. Nine regional police forces in the UK were involved in the operation. Warrants for searches or arrests were issued in 19 countries, including Australia, Canada, Germany, Israel, Japan, Russia, Sweden, Turkey, and the US. Evading detection According to a report by the BBC, another 400 suspects could not be traced by investigators. Police have not said how they evaded detection but it is possible to post messages to news groups anonymously using intermediary servers that strip away header information [Tor patent]. The UK government introduced legislation in 2000, giving the police greater access to internet communications. Further provisions for the extended storage of data is included in new anti-terrorist legislation currently passing through parliament.”
“BAE Systems Interpol Liaison – France in Lyon France The candidate will serve as a liaison to Interpol and provide CI operations support analysis. Duties include, but are not limited to: Serve as POC for USNCB. Facilitate and enhance the timely exchange of CI information. Liaise with Interpol and other international law enforcement agencies. Report liaison, facilitation, and coordination efforts on a regular basis. Conduct AT analytic projects as assigned. Assist with DoD CI investigations and facilitate the execution of investigative leads. .. Required Skills: Minimum 10 years of law enforcement analysis or CI analysis • Minimum of 5 years working with foreign law enforcement • Fluent in English and conversant in a second language (Arabic, Spanish or French is preferred) • Bachelors degree: Criminal Justice, Political Science, International Relations or History is preferred •Ability to obtain SCI access • Secondment from a General Secretariat within the past 6 years or equivalent • Understanding of DoD IC and EUCOM AOR • Excellent reading comprehension skills and the ability to quickly identify key information • Detail-oriented with proficiency researching, analyzing, and prioritizing information • Strong problem-solving, analytic, and written and oral communication skills • Strong interpersonal skills and the ability to work well both independently and in a team environment • Basic computer skills, including a willingness to manipulate multiple applications and databases • …. People are the greatest asset in any Company … BAE Systems is committed to a high performance culture and provides an environment that challenges our employees to be remarkable and obtain their full potential. We are an EEO/Affirmative Action Employer that understands the value of diversity and its impact on a high performance culture.”
Black Hand* – Navigators for Serco’s HSBC clients with “Patent Rights to Track, Film and Kill” from the City of London’s Honourable Artillery Company 1537; The Master Mariners and Air Pilots (formerly GAPAN) 1929, and The Ancient and Honorable Artillery Company of Massachusetts 1638 – whose alumni include U.S. Presidents James Monroe, Chester Alan Arthur, Calvin Coolidge and John F. Kennedy and – perhaps – Barack ‘Choom Gang’ Obama.
McConnell believes that Serco (formerly RCA GB) agents have run Interpol’s pedophile and server-based honeypots since WWII, that they launched Base One Technologies in 1994 to mentor former patent lawyer Hillary Clinton and that they used Black Hand* navigators to stage the crash of Germanwings Flight 9525 as a murder suicide by co-pilot Andreas Lubitz.
“Friends of Germanwings crash pilot say he is being framed as part of a
Lufthansa cover-up over mechanical failings… as Google Maps blur out his
former home to stop people looking it up
Facebook page ‘Andreas Lubitz, we are against the hunt’
doctored to make it appear he deliberately crashed jet
from Google Maps after apparent request by his family
GMT, 31 March 2015 | UPDATED: 15:37 GMT, 31 March 2015
pilot Andreas Lubitz claim he is being framed for murder as part of an
elaborate cover-up by his airline company to hide mechanical faults with the
They have set up a
Facebook page titled ‘Andreas Lubitz A320, we are against the hunt’ where they
have been sharing their theories about the cause of the Alps disaster.
Some suggest the black
box voice recorder had been tampered with by Germanwings parent company,
Lufthansa, to make it appear as if Lubitz had deliberately crashed the plane.
Meanwhile, it has
emerged that Lubitz’s home that he shared with his girlfriend in Dusseldorf has
been blurred out on Google Maps in an apparent attempt by family to quell
frenetic focus on his life.
Data extracted from
the voice recorder last week revealed how senior pilot Patrick Sonderheimer
desperately tried to smash the cockpit door down after being locked out by his
Lubitz then proceeded to set the plane on a collision course with the mountain,
killing all 150 people on board.
allege that the recordings were manufactured in some way by Lufthansa to hide
mechanical problems with the plane, according to a report by Vocativ.
Hundreds of its
followers are understood to be from the pilot’s home of Montabaur in Germany
and its surrounding area.
One supporter, who
claims to be a former classmate, said: ‘I believe in the innocence of Andy!’
They also point out
that the second black box data recorder had not yet been recovered from the
crash site, which they claim was also proof of a cover-up.
Others also suggested
that one of Lubitz’s former girlfriends was paid by the media to say that he
had once planned to commit a ‘heinous act’ that would go down in history.
Lufthansa declined to
separate development relatives have apparently asked Google to blur out
Lubitz’s home in Dusseldorf that he shared with girlfriend Kathrin
Goldbach from its Maps service.
The move came at some
point over the last week since the Alps disaster.
governments can ask for Google Maps images to be blurred over privacy concerns.
After concerns from
government officials in 2010, the internet giant offered an opt-out policy to
Germans in order to ‘obey local privacy laws.’
Around 250,000 Germans
are believed to have taken up the offer, according to Vocativ.
The flat has been the
scene of intense focus since the crash and reported claims that Miss Goldbach,
26, discovered that she was expecting his baby as little as two weeks ago.
The pair, who are said
to have had a patchy relationship over the last seven years, were letting the
pregnancy news sink in when Lubitz crashed the jet, according to German
Strict German privacy laws which prevented doctors treating Andreas
Lubitz from telling his airline about his ‘suicidal tendencies’ were introduced
as a consequence of the Nazis.
The Germanwings pilot
had been forced to stop his training because of severe depression and had
received psychotherapy for several years before last week’s Alps disaster.
it was left entirely up to him to volunteer his mental health problems to his
employer, something he failed to do with devastating consequences after tearing
up a sick note for the day of the crash.
The findings from the
investigation have prompted heated debate in Germany on a patient’s right to
privacy, with Chancellor Angela Merkel proposing an inquiry to re-examine the
Draconian legislation was initially brought in after World War Two to
prevent a repeat of government spying during the Nazi era and subsequently the
Stasi secret police in East Germany.
This extends far
beyond confidential medical data, however, to stringent protection of someone’s
identity, meaning many German publications only referred to Lubitz as Andreas
L, even after his death.
protection laws traced back to 1907, which enshrines the ‘right to your own
picture’, also mean images can only be published with the individual’s consent.
With respect to
medical data, the criminal code means doctors are only allowed to breach
confidentiality when they have reason to believe that sharing their knowledge
could prevent ‘a particularly serious crime’ or a threat to someone’s life.
They can face a year
in prison if they wrongly breach privacy, but up to five years in jail for
withholding ‘credible information about the planning or commission’ of serious
acts like murder.
Despite the variation
in sentences, doctors have tended to favour the individual’s privacy.
Many in Germany are
now debating whether the potential to neutralise threats to public safety
should trump doctor-patient privilege. Follow us: @MailOnline on Twitter | DailyMail on Facebook”
“Reinhard Tristan Eugen Heydrich (German: [ˈʁaɪnhaʁt ˈtʁɪstan ˈɔʏɡn̩ ˈhaɪdʁɪç] (
1942) was a high-ranking German Nazi official
during World War II, and one of the main architects of the
Holocaust. He was SS–Obergruppenführer (General) and General
der Polizei, chief of the Reich Main Security Office (including
the Gestapo, Kripo, and SD)
and Stellvertretender Reichsprotektor (Deputy/Acting Reich-Protector)
of Bohemia and Moravia (in
what is now the Czech Republic). Heydrich served as president of the ICPC (later known as Interpol) and
chaired the January 1942 Wannsee Conference, which formalised plans for
the “final solution to the Jewish Question“—the
deportation and murder of all Jews in German-occupied territory.
Historians regard him
as the darkest figure within the Nazi elite; Adolf
Hitler described him as “the man with the iron heart”. He
was the founding head of theSicherheitsdienst (SD),
an intelligence organisation charged with seeking out and neutralising
resistance to the Nazi Party via arrests, deportations, and killings.
He helped organise Kristallnacht, a series of co-ordinated attacks against
Jews throughout Nazi Germany and parts of Austria on
9–10 November 1938. The attacks, carried out by SA
stormtroopers and civilians, presaged the Holocaust.
Upon his arrival in Prague, Heydrich sought to eliminate opposition to the Nazi
occupation by suppressing Czech
culture and deporting and executing members of the Czech resistance. He was
directly responsible for the Einsatzgruppen,
the special task forces which travelled in the wake of the German armies and
murdered over one million people, including Jews, by mass shooting.
Heydrich was attacked
in Prague on 27 May 1942 by a British-trained team of Czech and Slovak soldiers who
had been sent by the Czechoslovak government-in-exile to
kill him in Operation Anthropoid. He died from his
injuries a week later. Intelligence falsely linked the assassins to the
villages of Lidice and Ležáky.
Lidice was razed to the ground; all men and boys over the age of 16 were
murdered, and all but a handful of its women and children were deported and
murdered in Nazi concentration camps.”
“Where in the world is Hillary Clinton’s server? POSTED AT 2:01 PM
ON MARCH 20, 2015 BY NOAH ROTHMAN ..
It was less than two weeks ago that former
Secretary of State Hillary Clinton assured the nation that her “homebrew” email
server was safely secure in her home in Chappaqua, New York. She insisted that
the hardware was fortified behind a locked door and had a Secret Service detail
mentoring it night and day, as though the greatest security threat that system
faced was via a physical attack by a team of cartoonish cat burglars…. Now,
working with publicly available tools that map network connectivity, experts
have established that the last “hop” before the mail server’s Internet
Protocol, or IP, address (listed as 22.214.171.124) is Internap’s aggregator in
Manhattan (listed as 126.96.36.199) [allegedly linked to the Serco/Base One war
room in the Bronx]“
“USA POLITICS Did
Hillary Clinton destroy evidence in ‘wiping clean’ her email server? Friday was the deadline for Hillary Clinton
to respond to a congressional subpoena for emails and documents related to the
terrorist attack in Benghazi, Libya. She provided nothing since her email
server had been wiped clean. By Brad Knickerbocker, Staff writer MARCH 28, 2015”
“U.S. Activities to Advance Global CNS Operations The United States
actively works with international partners and INTERPOL to advance counter
nuclear smuggling capacity worldwide. Since 2011, the U.S. has worked with
the governments of Lithuania, Slovakia, Ukraine, and others, to establish
national CNS teams. Through the State Department’s Nuclear Smuggling Outreach
Initiative (NSOI), the United States partners with key countries around the
world to strengthen capabilities to prevent, detect, and respond to incidents
of nuclear smuggling. NSOI develops Joint Action Plans with partner governments
that include CNS teams as a key element. Through the Federal Bureau of
Investigation, the U.S. supports INTERPOL’s Radiological and Nuclear Terrorism
Prevention Unit (RNU) which provides operational and analytical resources to
global law enforcement services. This unit also provides training and workshops
that build counter nuclear smuggling capability to investigate nuclear
smuggling networks and locate and secure black market nuclear materials.”
“The FBI Announced Successful Deployment of its Public Key
Infrastructure (PKI) .. Washington, D.C. August 03, 2005 — The FBI
announced that it has successfully completed deployment of its Public Key
Infrastructure (PKI). The deployment of PKI is critical to the FBI’s Sentinel
program, as PKI’s enhanced security features enable the FBI to move towards an
automated, paperless case management system, which further enables information
sharing with law enforcement partners and members of the Intelligence Community
.. PKI was deployed to 33,000 desktop computers and has made advanced security
features available to 28,000 FBI employees, taskforce members, and contract
employees. This deployment was made possible through an effective partnership
between FBI management and PKI contractor Northrop-Grumman Information
Technology and its subcontractors PEC, Entrust,
and BAE. Through this partnership, the PKI capability was delivered ahead
of schedule and under budget. PKI provides individuals with a Digital Identity,
eliminating the need for “wet” signature hard copies. This new
capability allows for digital signature approval, which further supports the
FBI’s goal of developing Sentinel, a fully automated information management
“From the early days of the Republic, Congress and the federal courts
grappled with the government’s rights to own or use patents it issued.
Courts rejected the British “Crown Rights” rule that allowed the sovereign to
practice whatever patents it issued. Instead, the federal government was
conceptualized as a legal person on par with any other persons with regard to
issued patents. But, this simple rule presented challenges as complexities
arose in three intertwined patent rights scenarios. The first involved
inventions by government employees. The second revolved around government and
government contractor use of patents held by private citizens. And the third
involved inventions by federal contractors and their employees arising under
federal funding. While these three scenarios seem quite distinct today,
nineteenth and early twentieth century courts often treated them as
overlapping. The confusion was not resolved until the mid-twentieth century
when a combination of executive branch and Congressional legislation set the
roots of current government patent policy. This Article reviews the history in
detail and illuminates current government patent policy debate occurring
through such seemingly diverse cases as Stanford v. Roche and Zoltek Corp. v.
Processes 2 Millionth Patent Application for U.S. Patent and Trademark Office
March 19, 2013 RESTON, VIRGINIA – March 18, 2013 – Serco Inc., a leading
provider of professional, technology, and management services to the federal
government, announced today that their Pre-Grant Publication (PGPubs)
Classification Services team recently processed their 2 millionth patent
application for the U.S. Patent & Trademark Office (USPTO). Each
application was also processed within the contractually required 28-day
“Base One Technologies
designs, and develops information security policies that protect your data and
manage your firm’s information technology risk at levels acceptable to your
assessments and conducts both internal and external penetration testing. The
results of these efforts culminate in an extensive risk analysis and
implements multi-layer Information Security Solutions, practices and
procedures. We deploy Intrusion Detection Systems (IDS) and IP Security with
VPN solutions using Cisco routers, Frame Relay, firewalls, address and port
translation, obscurity standards and authentication technologies (AAA, 3DES,
TACACS, etcŠ), to enhance and meet the level of Data Security required for
Conducts IT Security
and Risk Assessment in Federal government as well as security testing,
implementing security for multiple platforms and operating systems around the
Ability to conduct
business process analysis to provide technical security countermeasures, risk
management and data communications security planning for large organizations.
security integration for web server and traditional client-server based
applications. We secure environments up to as many layers as required by our
clients’ policies, industry practices, and regulating bodies – including the
desktop and user experience as required.
Develops, implements and supports Information Security Counter measures
such as honey-pots and evidence logging and
incident documentation processes and solutions.”
New York, NY 10011
Base One Technologies,
Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed
on Feb 15, 1994. This file was obtained
from the Secretary of State and has a file
number of 1795583.
This business was
created 7,695 days ago in the New York SOS Office and the registered agent is C
T Corporation System that does business at 111 Eighth Avenue , New York in New
After conducting a
search for principals and owners of Base One Technologies, Ltd., we were able
to find 2 owners and/or executives. Their information is listed below.
This file was last
updated on May 14, 2013.
Chief Executive Officer
15 Irving Place
New Rochelle, NY 10801
Principal Executive Office
15 Irving Place
New Rochelle, NY 10801
111 EIGHTH AVENUE
NEW YORK, NY 10011
“SOURCE: Base One Technologies
Inc. Continues Operations in Government Space
NY–(Marketwire – September 2, 2008) – Base One Technologies, Inc. is pleased
to announce that it has sold its affiliate, Base One Technologies Ltd., to
Apptis Inc. Base One Technologies, Inc. will continue to compete in the
government space as an 8(a), HubZone and Woman Owned Small Disadvantage
Company. Base One Technologies, Inc. is an IT Engineering and Technical
Services company founded in 1994. Base One has a Top Secret Facilities
Clearance and specializes in: Enterprise Architecture, Network Infrastructure
Support, Data Security, Software & Database Services, Disaster Recovery
& Contingency Planning, and Independent Validation & Verification. Base
One is a privately-held organization with headquarters in New Rochelle, NY. For
more information visit: www.base-one.com.
About Base One
Base One Technologies, Inc. is an IT Engineering and Technical Services
company certified as an 8(a), Woman Owned, SDB, HUBZone Business. Founded in
1994, Base One has a Top Secret Facilities Clearance and
specializes in: Enterprise Architecture, Network Infrastructure Support, Data
Security, Software & Database Services, Disaster Recovery & Contingency
Planning, and Independent Validation & Verification. Please visit www.base-one.com for more information.
“Serco’s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth
strategies. Through the OPR, Serco mentors four local small businesses
under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One
Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the
fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services
were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring
“Opened in 1994 as the successor to the
Transitional Immigrant Visa Processing Center in Rosslyn, Va., the NVC
centralizes all immigrant visa preprocessing and appointment scheduling for overseas
posts. The NVC collects paperwork and fees before forwarding a case, ready
for adjudication, to the responsible post.
The center also handles immigrant and fiancé visa petitions, and while it does
not adjudicate visa applications, it provides technical assistance and support
to visa-adjudicating consular officials overseas.
Only two Foreign Service officers, the director and deputy director, work at
the center, along with just five Civil Service employees. They work with almost
500 contract employees doing preprocessing of visas, making the center one of
the largest employers in the Portsmouth area.
The contractor, Serco, Inc., has worked with the NVC since its inception and
with the Department for almost 18 years.
The NVC houses more than 2.6 million immigrant visa files, receives almost two
million pieces of mail per year and received more than half a million petitions
from the U.S. Citizenship and Immigration Service (USCIS) in 2011. Its file
rooms’ high-density shelves are stacked floor-to-ceiling with files, each a
collection of someone’s hopes and dreams and each requiring proper
The NVC also preprocesses the chief of mission (COM) application required for
the filing of a petition for a Special Immigrant Visa (SIV). Such visas, for
foreign nationals who have performed services for the U.S. government in Iraq
and Afghanistan, require COM concurrence before the applicant can file a
petition with USCIS. The NVC collects the requisite documents from such
applicants and, when complete, forwards the package to the U.S. embassies in
Baghdad or Kabul for COM approval”
“Update on Serco’s Strategy Review including the Contract & Balance
Sheet Reviews; capital structure and funding; latest trading and outlook
Date : 10 November 2014
THIS ANNOUNCEMENT AND THE INFORMATION CONTAINED HEREIN IS RESTRICTED AND IS NOT
FOR RELEASE, PUBLICATION OR DISTRIBUTION, DIRECTLY OR INDIRECTLY, IN WHOLE OR
IN PART, IN, INTO OR FROM THE UNITED STATES, CANADA, AUSTRALIA, JAPAN, SOUTH
AFRICA OR ANY OTHER JURISDICTION IN WHICH THE SAME WOULD BE UNLAWFUL. PLEASE
SEE THE IMPORTANT NOTICE AT THE END OF THIS ANNOUNCEMENT.
… Strategy Review: Serco’s future to be as an international B2G business. A
successful, innovative and market-leading provider of services to Governments.
Core sectors: Justice & Immigration, Defence, Transport, Citizen Services
In the Americas Division, our work for the US Affordable [Obama] Care Act (ACA)
has begun an expanded first option year. Other awards in the period included:
career transition services for US soldiers; health outreach services for the US
Naval Reserve; deployable medical systems solutions also for the Navy; and two
contracts for fleet maintenance services for commercial clients. In total, the ACA
and all other awards in the period are valued at over $550m. Meanwhile, our
contract supporting the Department of State’s National Visa
Center and Kentucky Consular Center (NVC/KCC) came to an end during the
period, as did some Acquisition and Program Management support work for US
intelligence agency customers. C4I2TSR services for the US Air
Force and Naval installation task order work under the Sea Enterprise
frameworks are also reducing. …
For further information please contact Serco:
Stuart Ford, Head of Investor Relations T +44 (0) 1256 386 227
Marcus De Ville, Head of Media Relations T +44 (0) 1256 386 226
Jonathan Glass, Brunswick T +44 (0) 207 404 5959
Analyst and institutional investor meeting…….
Download PDF [PDF, 387 KB] (Please note: this link will open the page in a new
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year
airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well
blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation