#2325: Marine Links Dam Lubitz Way Points To Serco Base One Tor, Black Hand French Mirage
Plum City – (AbelDanger.net): United States Marine Field McConnell has linked way points which put Andreas Lubitz’s Airbus 320 on a potential collision course with the Serre-Ponçon dam, to Serco’s alleged use of a Base One Technologies’ onion router (tor) to relay ad hoc way points via French Mirage fighters and deflect Lubitz’s plane into a crash site about 20 km from the dam.
To the idiots out there who might say “Oh, the conspiracy crowd solved this before a single investigator arrived at the crash scene:” There are only a few things you need to know to solve this one, the rest is just scammery:
1. The plane descended for 10 minutes, and NO WORD FROM THE PILOTS. How can that happen? Jamming of communications. Who could have jammed communications?
2. The fighter jets, which were following this Airbus. THEY could have jammed the communications with ease, AND shot it down. They probably did not shoot it down OR EVEN NEED TO JAM COMMUNICATIONS because:
3. The plane was equipped with remote control (for “hijack recovery”) AS A STANDARD FEATURE. That level of external control would make switching off communications via remote control a NO BRAINER.
NO CONTACT WITH THE TOWER SAYS IT ALL; A REMOTE CONTROLLED CRASH REALLY IS THE OVERWHELMING ANSWER.
Why would fighter jets be following at just the right time anyway? That alone CINCHES IT. We really do need to figure out who was on that plane.
BUSTED: CENSORSHIP OF NEWS PROVES THE FIGHTER JETS DID INDEED DOWN THIS GERMAN AIRCRAFT, IF THEY DID NOT, WHY EXPUNGE THE NEWS OF THEIR PRESENCE?”
“We may never know exactly what really happened. The memory chip of the second black box recording flight data was missing, something which in itself is very odd. .. If the plane did crash, the cause may have been the hacking of the computer system during the repairs the day prior to the flight. The three French Mirage planes could have jammed the electronic communication and control system. Also, odd is the alleged appearance of an Italian fighter jet near the alsp, which squawked on the emergency channel of the Airbus the very time when radio contact was lost.”
“ouise attaque a dit… Bonjour à tous. Il me semble que le barrage de Serre-Ponçon, le plus grand barrage en terre d’Europe qui contient la plus importante retenue d’eau de France (lac artificiel de Serre-Ponçon) se situe sur la trajectoire de vol de l’A320. Le crash a eu lieu à seulement une vingtaine de kilomètre à vol d’oiseau du barrage. Je n’ose imaginer le nombre de morts supplémentaires si l’impact avait dû avoir lieu contre le barrage.”
McConnell claims that Serco and its protégé Base One converted the U.S Naval Research Lab‘s onion router into a patent thicket where devices accessible to State Department and Serco Black Hand navigators, could relay ad hoc waypoint into aircraft targeted for a crash (cf. United 93).
McConnell notes Serco (the world‘s largest air traffic controller) filed a tor patent application in 1998 and processed a 2 millionth patent application for the U.S. Patent and Trademark Office in March 2013 giving its Base One protégé and Black Hand navigators ample opportunities to hack military chains of command, crash passenger planes and remove evidence from crime scenes.
Black Hand* – Serco navigators‘ using the British Crown’s “Patent Rights to Track, Film and Kill” from the City of London’s Honourable Artillery Company 1537; The Master Mariners and The Air Pilots (formerly GAPAN) 1929, and The Ancient and Honorable Artillery Company of Massachusetts 1638 – whose alumni include U.S. Presidents James Monroe, Chester Alan Arthur, Calvin Coolidge and John F. Kennedy and – perhaps – Barack ‘Down Low’ Obama.
McConnell (30 year airline and 22 year military pilot with 23,000 hours of safety) is offering his expert-witness services to explain the apparent role of Serco and its Base One onion router in the deflection of Lubitz’s plane into a crash scene about 20 km from le barrage de Serre-Ponçon.
Prequel #1: TRIAL BY MEDIA: co-pilot Andreas Lubitz – Abel Danger In Germany – Field McConnell besucht Deutschland – Der Whistleblower der Luftfahrtindustrie, Field McConnell – The Hegelian Odyssey of Andreas Lubitz Continues – SHOT DOWN 4U9525 UNITES FRANCE & GERMANY
Prequel 2: #2324: Marine Links FAA Fuddy To Huerta Hack By Base One Tor, Black Hand Deaths By Serco Towers
“UPDATE: DID THE GERMANWINGS AIRBUS REALLY CRASH?
theories circulating about why a Germanwings Airbus crashed in the French Alps.
The latest theory
offered by French prosecutors, allegedly based on the retrieval of a damaged
voice recorder, is that the pilot was locked out of the cockpit by a
suicidal co pilot, Andreas Lubitz.
Yet this version
raises many questions, especially as it has emerged that the Airbus’ glide to
destruction ‘took 18 minutes and not 8′.
communication blackout for 18 minutes and given the disappearance of the Airbus
from the radar screen in the final six minutes, can we really be sure the
Airbus crashed at all? Can we really be sure the debris shown to us on TV comes
from the Airbus? Crucially, the memory card of the flight recorder black
box was missing. What motive might anyone have for taking the memory card as
appears to have happened?
mountain guide and witness reports hearing no explosion on impact. Shouldn t a
plane on the start of its journey to Dusseldorf and still packed with jet fuel
explode with lots of noise, smoke and fire?
crash, a glide for eighteen minutes is a long time, time enough for passengers
and crew to send text messages or make calls. Yet none did. How can this be
who was allegedly locked out of the cockpit, use, for example, a mobile
or emergency phone to raise the alarm during those 18 minutes?
Why, in fact, did none
of the 144 passengers in the plane use their phones to call or text their
relatives as soon as they realised there was a problem with the cockpit and
the plane was plunging towards earth at the rate of one kilometre per
The claim that the
passengers only realized at the last moment what was happening is not
Passengers must have heard the pilot trying to hammer down the
cockpit door if these sounds are indeed on the voice recorder retrieved from
the wreckage as French prosecutors claim. They must have seen the way the
plane was rapidly losing altitude and passed through the cloud cover.
They must have seen the mountain range below looming closer and closer. They
must also, surely, have seen the three French Mirage fighter jets, sent up
by air traffic control, and which circled the plane within minutes.
A 3D video of the
Germanwings descent gives us some idea of what the passengers experienced.
Bear in mind, there
were school children on board. Even if the adults remained calm, the children,
unaccompanied by their parents, certainly wouldn t have. As soon as they saw
the Mirage jets, the children would have started getting excited, shouting and
texting their parents.
The real puzzle in all
this is why none of the 144 passengers or crew sent any text messages during a
plunge lasting 18 minutes.
As mentioned, in a
perilous situation like this, the first instinct of everyone, especially school
children is, surely, to grab their mobile phones and sms or text their
relatives. But there are no reports of any messages received by relatives. The
parents of the German school children heard of the crash from the director of
the local school and airport officials, according to media.
The story of the co
pilot Andreas Lubitz is also curious. He gave no sign of being troubled
and had cleared all tests of his flightworthiness, according to his
employers and German media reports.
Lubitz was allegedly
treated for burnout and depression six years ago. That means, he was able to
articulate feelings of burnout and depression, and recognize its symptoms. Yet
he gave no warning he was so desperate as to consider not just suicide but mass
If Lubitz was gripped by a sudden murderous, suicidal death wish, why
did he choose to glide to destruction on autopilot for 18 minutes? And if he was in such inner turmoil and
could hear the other pilot banging on the door to gain entry, why didn t he
wrestle with the controls and computer systems and try to crash the plane
headlong into the mountains more quickly? Wouldn t there have been a more
erratic emergency descent, the fuel cut or some other action more likely to
bring the plane down quickly to avert the risk that the other pilot, crew
members and passengers would succeed in breaking down the door or cracking the
code, entering the cockpit and stopping the descent in the 18 minutes that it
Cabin crew can gain
entry to the cockpit in an emergency. A pilot can only override this access for
between five to 20 minutes, according to media.
So, the glide to
destruction took almost the maximum time that Lubitz could conceivably have
overriden the emergency access code. Would he have taken the risk of the door
In addtion, for all
Lubitz knew the door could have slid open any moment, allowing people to enter
the cockpit. In this high pressure situation, surely the instinct of any
suicidal, impulsive maniac is to shift to manual control and point the nose of
the plane straight down. A suicidal, impulsive maniac with people hammering on
the cockpit door and his ability to override the emergency access code
restricted to at most 20 minutes would not choose to glide down for 18
minutes. That does not add up.
According to the
French officials, Lubitz said nothing. That s possible but more likely is that
he would shout out something in the heat of the moment, especially as the
impact with sheer rock face was imminent like
“What have I done?”
The official version
is like a one dimensional film script. People behave differently in real life.
he complete lack of
all communications from the pilot and passengers suggests, more than anything
else, that the plane s computer system was indeed hacked. If the electronic
communications systems were jammed that would explain why there were no
communications from the pilot and co pilot, passengers or crew.
investigators are claiming that is what happened until the last moments when
screaming can be heard.
exactly what really happened. The memory chip of the second black box
recording flight data was missing, something which in itself is very odd.
crash, the cause may have been the hacking of the computer system during the
reparis the day prior to the flight. The three French Mirage planes could have
jammed the electronic communication and control system.
alleged appearance of an Italian fighter jet near the alsp, which squawked on
the emergency channel of the Airbus the very time when radio contact was lost.
check back through FR24. MM7168 at 09.35 (GMT) shouted 7700 near the alps.
M7168 (NOT the Airbus) squawks 7700 at 09:35 GMT, which is 10:35am Central
European Time (Promise!) just to the East in Northern Italy.
Another theory is that
CERN was involved. CERN shut down hours after Germanwings crash. Is there a
connection asks Kev Baker?https://www.youtube.com/watch?v=obuDgxn49fE “Smashing
protons at such high energy and speed causes electro magnetic lightnings which
can travel far. The plane was hit by abnormally strong electro magnetic pulse
which disabled crafts engines. US army already have this as a weapon in smaller
version. ” Reply · 7
explanation, the French prosecutors’ version does not add up. It assumes
complete passivity and silence on the part of 148 other people on board the
plane as they crashed with terrifying speed to their death in the Alps.
In real life, danger
releases adrenaline, which converts into action, sending an sms, talking,
planning, crying, screaming banging on a door, finding a lever to smash a door
ould react. Imagine it s you who are in a plane plunging into the Alps with a
pilot banging furiously at the cockpit door and shouting at the co pilot to
open it in German, a language you understand. What would you do? Imagine you
look outside the window and see the plane entering the clouds, and then exiting
the clouds. Imagine you hear a roar and see Mirage fighter jets flying
parallel, so close you can see the markings on the fusilage and the pilot in
his cockpit. The mission of the Mirage fighter jets was to ascertain what
was wrong with the plane, so these planes would have flown close to the Airbus
to make a visual inspection of the cockpit area especially. Imagine that as the
plane drops down into the valley, you start to see peaks towering above you.
Would you really sit in silence through all this and for 18 minutes just
screaming seconds before impact?”
“Base One Technologies …. N/WAN Design
Provide an IP based
Network Solution in response to an RFI from the FAA (Federal Aviation Agency)
to re-engineer their existing networks (FTI 2000).
providing and demonstrating the capabilities of an IP Network Architectural
Design including a Disaster Recover Solution in response to an RFI for the
FAA to upgrade or replace their current Mission Critical Network in the
providing a solution and a plan to transition the FAA’s current X.25
environment to the proposed IP (BGP/OSPF) network.
performance requirements, such high availability (99.9997%) with very strict
and aggressive Mean-Time-To-Recover (6 seconds), were exceeded or met. Using
Networking solutions from Nortel Networks and Cisco Systems, we provided a
highly scaleable, deterministic and secured IP network running over ATM.
FT1/T1 was provided in areas where ATM was not available. ISDN dial backup
and dial-on-demand routing were used to increase availability and enhance
MTTR. User connectivity was provided with Hot-Standby-Routing-Protocol (HSRP)
through robust and highly available Cisco Catalyst switches.
providing a security solution included for the entire network using
technologies such as Nokia/CheckPoint Firewall, Cylink ATM DS3, T1/FT1 &
ISDN Encryptors, and Dragon LAN based Intrusion Detection Systems.
integrated Network Management Platform solution to monitor the entire
proposed network. Management solution included HP OpenView, HP NetMetrix, NAI
Distributed Sniffers, CiscoWorks2000, Preside Multiservice Data Manager, etc.
Provided a prototype
lab using loaned equipment from major network device vendors. The equipment
included Nortel Networks WAN Passport Switches, Cisco Systems Routers and LAN
Switches, Adtran ISDN PRI/BRI simulators/switches, in addition to security
and network management hardware and software.
Proof-of-Concept presentation to MCI/WorldCom and the FAA representatives to
demonstrate the capabilities of the proposed Network Architecture.
the RFI submitted by the Federal Agency of Aviation. Produced lists of
questions on items that needed clarifications and submit to FAA. Reviewed all
responses and adjust our proposals accordingly.
Managed all loaned
personnel who assisted in installing, maintaining, configuring and
documenting loaned hardware and software.“
“Serco Awarded $187 Million Federal Aviation Administration Contracts
Date : 16 April 2015
Serco Inc., a provider of professional, technology and managed services,
announced today the award of two contracts to continue its 20-plus years of
supporting the Federal Aviation Administration’s (FAA) Contract Tower (FCT)
Program. Serco will provide air traffic control specialists, safety managers,
and program management services in support of 58 Air Traffic Control Towers
(ATCTs) in 11 western states, including Alaska, California and Colorado. The
two five-year contracts each have one base year and four one-year option
periods, with a combined value of $187 million, if all options are exercised.
Under these contracts, Serco’s Air Traffic Controllers will be responsible for
the safe and efficient movement of commercial, general aviation and military
aircraft on the airport and in the airspace surrounding the airport. The
Company will also provide risk management, quality assurance and program
management to meet FAA service standards and quality metrics. Serco will
utilise its Aviation Safety Management System to improve safety and mitigate
risks in the National Airspace System.
“Air Traffic Control Towers provide vital services ensuring that airports
are safer for pilots and passengers at airports across the country.” said
Dan Allen, Serco Inc.’s Chairman and Chief Executive officer. “As experts
in aviation and management solutions, we are honored and eager to continue
supporting the FAA in 2015 and beyond.”
As part of Serco Group, one of the largest contracted providers of Air
Navigation Services worldwide, the company is responsible for more than 960,000
miles of airspace and handles more than seven million aircraft movements a
year. Serco employs more than 700 air traffic control specialists at over 75
airports – located in the U.S., U.K. and Middle East – who help maintain flight
safety. In the US, the company has also been honored with the prestigious
Willie F. Card Federal Aviation Administration (FAA) Contract Tower Award at
towers in Lewiston, ID, Phoenix-Mesa Gateway, AZ, Jackson Hole, WY, Goodyear,
AZ, and San Luis Obispo, CA.”
routing network for securely moving data through communication networks
US 6266704 B1 ABSTRACT The onion routing network is used to protect
Internet initiators and responders against both eavesdropping and traffic
analysis from other users of the Internet. In the onion routing of the
invention, instead of making connections directly to a responding machine,
users make connections through onion routers. The onion routing network allows
the connection between the initiator and responder to remain anonymous.
Anonymous connections hide who is connected to whom and for what purpose from
“The best security: A trip through The Onion Router How TOR
works. Courtesy TOR Project. Published: April 24, 2013, 11:38 am .. Before the
Internet, people flocked to secret and well-hidden underground markets to
purchase either illegal or morally questionable items. With the birth of the
Internet, unlimited access to these items from around the world became a
reality. The issue was creating a tunnel to transfer anything from heroin to
full libraries of downloaded books, from one part of the world to the next
securely and secretly. Enter Tor. The U.S Naval Research Lab created Tor, or The Onion Router, as an
experiment in 1996. The lab has been studying different methods of carrying out
anonymous communication between governments for years. The result was the
original Tor network. .. Perhaps what Tor has become most well known for,
though, is the Silk Road. Run by an anonymous individual who refers to
themselves only as the Dread Pirate Roberts, the Silk Road is a highly illegal
and highly profitable passageway for very illegal items. Buyers can purchase pounds of heroin or an arsenal and have it
delivered to their home without leaving a trace. Discussions take place on a
huge number of Tor forums daily between drug dealers from around the world
discussing the latest trends and their future purchases. .. It may have
been underground at one point, but it is no longer just a whisper in the dark
forums of the Internet’s underbelly. It’s become a tool for activists, hackers,
drug dealers, and curious minds. It’s the beginning of a line of networks that
will become commonplace very soon. .. © COPYRIGHT – POSTMEDIA NEWS”
“Hillary wiped her server clean: As NBC’s Kristen Welker
reported over the weekend, the top Republican investigating the 2012 Benghazi
attack, Rep. Trey Gowdy (R-SC), revealed that Hillary Clinton had wiped her
server clean of her emails. “Clinton’s attorney, David Kendall, said Gowdy was
looking in the wrong place,” the AP says. “In a six-page letter released late
Friday, Kendall said Clinton had turned over to the State Department all
work-related emails sent or received during her tenure as secretary of state
from 2009 to 2013. ‘The Department of State is therefore in possession of all
Secretary Clinton’s work-related emails from the (personal email) account,’
Kendall wrote.” Here’s the “Meet the Press” discussion over the Clinton emails.”
“[Base One Technologies, Ltd. is a DOMESTIC
BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15,
1994.This file was obtained from the Secretary of State and has a
file number of 1795583] Expertly researches, designs, and develops information
security policies that protect your data and manage your firm’s information
technology risk at levels acceptable to your business. Performs architectural
assessments and conducts both internal and external penetration testing. The
results of these efforts culminate in an extensive risk analysis and
vulnerabilities report. Develops and implements multi-layer Information
Security Solutions, practices and procedures. We deploy Intrusion Detection
Systems (IDS) and IP Security with VPN solutions using Cisco routers, Frame
Relay, firewalls, address and port translation, obscurity standards and
authentication technologies (AAA, 3DES, TACACS, etcŠ), to enhance and meet the
level of Data Security required for global organizations. Conducts IT Security
and Risk Assessment in Federal government as well as security testing,
implementing security for multiple platforms and operating systems around the
world. Ability to conduct business process analysis to provide technical
security countermeasures, risk management and data communications security
planning for large organizations. Provides computer security integration for
web server and traditional client-server based applications. We secure
environments up to as many layers as required by our clients’ policies, industry
practices, and regulating bodies – including the desktop and user experience as
required. Develops, implements and
supports Information Security Counter measures such as honey-pots and evidence logging and incident
documentation processes and solutions.”
Technologies, Inc. Continues Operations in Government Space NEW ROCHELLE,
NY–(Marketwire – September 2, 2008) – Base One Technologies, Inc. is pleased
to announce that it has sold its affiliate, Base One Technologies Ltd., to
Apptis Inc. Base One Technologies, Inc. will continue to compete in the
government space as an 8(a), HubZone and Woman Owned Small Disadvantage
Company. Base One Technologies, Inc. is an IT Engineering and Technical
Services company founded in 1994. Base One has a Top Secret Facilities
Clearance and specializes in: Enterprise Architecture, Network Infrastructure
Support, Data Security, Software & Database Services, Disaster Recovery
& Contingency Planning, and Independent Validation & Verification. Base
One is a privately-held organization with headquarters in New Rochelle, NY. For
more information visit: www.base-one.com. Contact Information: Liza R. Zaneri Base One Technologies 914
633-0200 x205 “www.base-one.com“
“Serco’s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth
strategies. Through the OPR, Serco mentors four local small businesses
under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One
Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the
fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services
were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring
airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well
blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation