#2323: Marine Links Base One Serco ESCORT to Black Hand Death of Dog Named Bart
Plum City – (AbelDanger.net): United States Marine Field McConnell has linked a Base One Technologies and Serco honeypot service involving extortion through Serco and Clinton onion-router patent thickets (ESCORT) to the Black-Hand* ambush of a Boeing CH-47 military helicopter in Wardak province, west of Kabul, Afghanistan on August 6, 2011, and the resulting deaths of all 38 people on board and a military working dog named Bart.
“On 6 August 2011, a U.S. Boeing CH-47 Chinook military helicopter was shot down while transporting a quick reaction force attempting to reinforce an engaged unit of Army Rangers in Wardak province, west of Kabul, Afghanistan. The resulting crash killed all 38 people on board—25 American special operations personnel, five United States Army National Guard and Army Reserve crewmen, seven Afghan commandos, and one Afghan interpreter—as well as a U.S. military working dog … Other reports alleged that the Taliban had laid an elaborate trap for U.S. special operations forces, luring them in with false information. A senior Afghan government official, speaking anonymously, said that Taliban commander Qari Tahir had fed U.S. forces false information about a meeting of insurgent leaders and fighters waited for the helicopter from both sides of a steep valley: “The Taliban knew which route the helicopter would take. That’s the only route, so they took position on either side of the valley on mountains and as the helicopter approached, they attacked it with rockets and other modern weapons [Serco runs the U.S. Defense Ammunition Cneter]. It was brought down by multiple shots.”
McConnell claims Base One has helped Serco and former patent lawyer Hillary Clinton to use the U.S Naval Research Lab’s onion router as a honeypot patent thicket to camouflage State Department treason on 9/11 and the Black Hand ambush which killed a dog named Bart.
McConnell notes that Serco (world’s largest air traffic controller, operator of the U.S. National Visa Center) filed the onion router patent application in 1998 and processed a 2 millionth patent application for the U.S. Patent and Trademark Office in March 2013 giving its Base One protégé and Black-Hand navigators ample opportunities to compromise military chains of command, create honeypot terrorist groups and ESCORT crucial evidence from crime scenes.
Black-Hand* – Serco navigators’ using the British Crown’s “Patent Rights to Track, Film and Kill” from the City of London’s Honourable Artillery Company 1537; The Master Mariners and The Air Pilots (formerly GAPAN) 1929, and The Ancient and Honorable Artillery Company of Massachusetts 1638 – whose alumni include U.S. Presidents James Monroe, Chester Alan Arthur, Calvin Coolidge and John F. Kennedy and – perhaps – Barack ‘Down Low’ Obama.
McConnell (30 year airline and 22 year military pilot with 23,000 hours of safety) is offering his expert-witness services to groups’ seeking damages for wrongful deaths associated with Serco’s alleged use of the onion router to camouflage Base One murder-for-hire services for its Black-Hand shareholders including the drug-hub banker HSBC and Her Majesty’s Government.
“AFGHANISTAN: HONORING THE HEROES OF EXTORTION 17
Thursday, February 27, 2014
HOUSE OF REPRESENTATIVES, SUBCOMMITTEE ON NATIONAL SECURITY, COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM
…we have Colonel John Devillier. Devillier? Devillier—my apologies—is the Commander of Air Force Mortuary Affairs Operations at the United States Department of Defense … STATEMENT OF COLONEL JOHN DEVILLIER Colonel DEVILLIER. Chairman Chaffetz, Ranking Member Tierney and distinguished members of the subcommittee, I appreciate the opportunity to appear before you today to discuss the process of disposition of our fallen heroes from Extortion 17. Since March 2012, I have had the honor and privilege to serve with some of the finest soldiers, sailors, airmen, marines and civilians who work behind the scenes providing dignity, honor and respect to our Nation’s combat fallen as well as care, service and support to their families. While the port mortuary has been associated with Dover Air Force Base, Delaware, since the 1950s, the organization I command was activated in early 2009 in response to Department of Defense directed changes surrounding authorized family travel to Dover Air Force Base and media access to dignified transfer. My organization has both Air Force specific rules, along with being the lead service component for dignified transfers and effecting final disposition of our fallen as directed by the Person Authorized to Direct Disposition, the PADD. Since the implementation of policy changes in April 2009, team Dover has welcomed home over 1,800 of our Nation’s fallen and supported over 8,700 of their families. The events surrounding the return of the fallen from Extortion 17 are seen as a watershed for our operation at Dover in terms of mass fatalities. Team Dover has supported well over 800 family, friends and unit members, as well as more than 40 distinguished visitors desiring to pay their respects to these brave heroes. While I was not present for this event, it was a monumental undertaking for the entire team in terms of support. As with every fallen service member who arrives at Dover, the fallen from this event were taken into the medical-legal custody of the Armed Forces medical examiner system for scientific identification, which may include fingerprinting, dental and/or DNA testing followed by a medical autopsy. Upon the scientific identification, the chain of custody for the fallen is then passed to my organization to effect final disposition, as directed by the PADD. For this incident as a whole, my organization effected these disposition instructions for our 30 heroes, eight of which included written requests for cremation from the PADD. For those eight cases, four were cremated at the port mortuary, and four were cremated at their final resting place. Again, we consider this incident a watershed moment and we have made a number of changes in terms of our in place support mechanisms. In January 2013, we opened a new command and control facility to enhance communication between the branches of service and my organization. Additionally in February 2013, a new chapel was opened on Dover with one-third of the space dedicated to our operation in terms of facilities to further support families. In my nearly 21 years of active military service, I have never served in a more honorable or humbling mission. The men and women who work tirelessly behind the scenes under my command see the worst results of conflict. Not only do they honor the fallen, they serve the families, who are often experiencing the worst moments of their life, and these quiet professionals ask for nothing in return. I’m proud to serve as their commander. Thank you for your time this morning and your strong support for the men and women of the Department of the Air Force.”
Onion routing network for securely moving data through communication networks
US 6266704 B1 ABSTRACT The onion routing network is used to protect Internet initiators and responders against both eavesdropping and traffic analysis from other users of the Internet. In the onion routing of the invention, instead of making connections directly to a responding machine, users make connections through onion routers. The onion routing network allows the connection between the initiator and responder to remain anonymous. Anonymous connections hide who is connected to whom and for what purpose from outside eavesdroppers.”
“The best security: A trip through The Onion Router How TOR works. Courtesy TOR Project. Published: April 24, 2013, 11:38 am .. Before the Internet, people flocked to secret and well-hidden underground markets to purchase either illegal or morally questionable items. With the birth of the Internet, unlimited access to these items from around the world became a reality. The issue was creating a tunnel to transfer anything from heroin to full libraries of downloaded books, from one part of the world to the next securely and secretly. Enter Tor. The U.S Naval Research Lab created Tor, or The Onion Router, as an experiment in 1996. The lab has been studying different methods of carrying out anonymous communication between governments for years. The result was the original Tor network. .. Perhaps what Tor has become most well known for, though, is the Silk Road. Run by an anonymous individual who refers to themselves only as the Dread Pirate Roberts, the Silk Road is a highly illegal and highly profitable passageway for very illegal items. Buyers can purchase pounds of heroin or an arsenal and have it delivered to their home without leaving a trace. Discussions take place on a huge number of Tor forums daily between drug dealers from around the world discussing the latest trends and their future purchases. .. It may have been underground at one point, but it is no longer just a whisper in the dark forums of the Internet’s underbelly. It’s become a tool for activists, hackers, drug dealers, and curious minds. It’s the beginning of a line of networks that will become commonplace very soon. .. © COPYRIGHT – POSTMEDIA NEWS”
“Hillary wiped her server clean: As NBC’s Kristen Welker reported over the weekend, the top Republican investigating the 2012 Benghazi attack, Rep. Trey Gowdy (R-SC), revealed that Hillary Clinton had wiped her server clean of her emails. “Clinton’s attorney, David Kendall, said Gowdy was looking in the wrong place,” the AP says. “In a six-page letter released late Friday, Kendall said Clinton had turned over to the State Department all work-related emails sent or received during her tenure as secretary of state from 2009 to 2013. ‘The Department of State is therefore in possession of all Secretary Clinton’s work-related emails from the (personal email) account,’ Kendall wrote.” Here’s the “Meet the Press” discussion over the Clinton emails.”
“[Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994.This file was obtained from the Secretary of State and has a file number of 1795583] Expertly researches, designs, and develops information security policies that protect your data and manage your firm’s information technology risk at levels acceptable to your business. Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report. Develops and implements multi-layer Information Security Solutions, practices and procedures. We deploy Intrusion Detection Systems (IDS) and IP Security with VPN solutions using Cisco routers, Frame Relay, firewalls, address and port translation, obscurity standards and authentication technologies (AAA, 3DES, TACACS, etcŠ), to enhance and meet the level of Data Security required for global organizations. Conducts IT Security and Risk Assessment in Federal government as well as security testing, implementing security for multiple platforms and operating systems around the world. Ability to conduct business process analysis to provide technical security countermeasures, risk management and data communications security planning for large organizations. Provides computer security integration for web server and traditional client-server based applications. We secure environments up to as many layers as required by our clients’ policies, industry practices, and regulating bodies – including the desktop and user experience as required. Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions.”
SOURCE: Base One Technologies September 02, 2008 09:00 ET Base One Technologies, Inc. Continues Operations in Government Space NEW ROCHELLE, NY–(Marketwire – September 2, 2008) – Base One Technologies, Inc. is pleased to announce that it has sold its affiliate, Base One Technologies Ltd., to Apptis Inc. Base One Technologies, Inc. will continue to compete in the government space as an 8(a), HubZone and Woman Owned Small Disadvantage Company. Base One Technologies, Inc. is an IT Engineering and Technical Services company founded in 1994. Base One has a Top Secret Facilities Clearance and specializes in: Enterprise Architecture, Network Infrastructure Support, Data Security, Software & Database Services, Disaster Recovery & Contingency Planning, and Independent Validation & Verification. Base One is a privately-held organization with headquarters in New Rochelle, NY. For more information visit: www.base-one.com. Contact Information: Liza R. Zaneri Base One Technologies 914 633-0200 x205 “www.base-one.com”
Serco’s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals.”
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation