#2327: Marine Links Serco Black Hand Patents To Base One Clinton Server, Lubitz Death By TORT

Plum City – (AbelDanger.net): United States Marine Field McConnell has linked Serco’s development of a patent pool for Black Hand* navigators to a Base One Technologies’ war room, allegedly operated through Hillary Clinton’s server, and the wrongful death of Andreas Lubitz as an apparent result of bogus guidance and control signals sent through the onion router (patent) thicket (TORT) to the autopilot of his Airbus 320.

The War Room is a 1993 American documentary film about Bill Clinton‘s campaign for President of the United States during the1992 presidential election. It is frequently cited as one of the greatest documentaries ever made.[1]”

Dark web ethnographic method Because this is an ethnography of a dark web SNS, there were several methodological challenges. The dark web is different from the “clear web” in important ways. The dark web is part of the Internet that cannot be accessed by mainstream software.1 It includes hidden sites that end in “.onion” or “.i2p” or other Top-Level Domain names only available through modified browsers or special software. Accessing I2P sites requires a special routing program. Accessing non-mainstream Top-Level Domains through OpenNIC requires the user to change the DNS server addresses on his or her router. Accessing .onion sites requires Tor (for a tutorial on Tor and .onions, see Hoffman (2012)). Moreover, those who run dark websites that end in .onion are able to hide their identities and locations from most, if not all, Internet users (Dingledine et al., 2004). In most cases, a visitor to a .onion site will not know the identity of the host, nor will the host know the identity of the visitor. This is very different from the mainstream Internet, where sites are often associated with a company or location (e.g. google.com is associated with the company headquartered in Mountain View, CA), and visitors are often identified and monitored through sundry tracking technologies such as cookies, account registrations, Flash cookies, IP addresses, and geolocation.”

Base One Technologies “[DOMESTIC BUSINESS CORPORATION, located in New Rochelle, NY and was formed on Feb 15, 1994.This file was obtained from the [Clinton] Secretary of State and has a file number of 1795583] …. N/WAN Design Provide an IP based Network Solution in response to an RFI from the FAA (Federal Aviation Agency) to re-engineer their existing networks (FTI 2000). .. Responsible for providing and demonstrating the capabilities of an IP Network Architectural Design including a Disaster Recover Solution in response to an RFI for the FAA to upgrade or replace their current Mission Critical Network in the United States [allegedly to prepare for the attacks of 9/11] … Responsible for providing a security solution included for the entire network using technologies such as Nokia/CheckPoint Firewall, Cylink ATM DS3, T1/FT1 & ISDN Encryptors, and Dragon LAN based Intrusion Detection Systems. .. Managed [Clinton war room for] all loaned personnel who assisted in installing, maintaining, configuring and documenting loaned hardware and software.

We may never know exactly what really happened. The memory chip of the second black box recording flight data was missing, something which in itself is very odd. .. If the plane did crash, the cause may have been the hacking of the computer system during the repairs the day prior to the flight. The three French Mirage planes could have jammed the electronic communication and control system. Also, odd is the alleged appearance of an Italian fighter jet near the alsp, which squawked on the emergency channel of the Airbus the very time when radio contact was lost.”

ouise attaque a dit… Bonjour à tous. Il me semble que le barrage de Serre-Ponçon, le plus grand barrage en terre d’Europe qui contient la plus importante retenue d’eau de France (lac artificiel de Serre-Ponçon) se situe sur la trajectoire de vol de l’A320. Le crash a eu lieu à seulement une vingtaine de kilomètre à vol d’oiseau du barrage. Je n’ose imaginer le nombre de morts supplémentaires si l’impact avait dû avoir lieu contre le barrage.”

McConnell notes former patent lawyer Hillary Clinton authorized Serco (the world’s largest air traffic controller) to file a tor patent application by 1998 (published July 24, 2001!) and process a 2 millionth patent application for the U.S. Patent and Trademark Office by March 2013.

McConnell claims that Serco and its protégé Base One converted the U.S Naval Research Lab’s onion router into a Clinton war-room patent thicket allegedly accessible to Serco’s Black Hand navigators to relay way points into aircraft pre-selected for a crash (cf. United 93, MH17 etc.).

McConnell claims Serco (formerly RCA GB 1929) operates Clinton’s Base One war room under Crown Rights rules so it (Serco) can practice any patent issued with ample opportunities for a Black Hand hack of pre-selected passenger planes and removal of evidence from (black box 1 memory chip), or placement of evidence (black box 2 data ) at, crime scenes.

Black Hand* – Serco navigators’ using the British Crown’s “Patent Rights to Track, Film and Kill from the City of London’s Honourable Artillery Company 1537; The Master Mariners and The Air Pilots (formerly GAPAN) 1929, and The Ancient and Honorable Artillery Company of Massachusetts 1638 – whose alumni include U.S. Presidents James Monroe, Chester Alan Arthur, Calvin Coolidge and John F. Kennedy and – perhaps – Barack ‘Down Low’ Obama.

McConnell (30 year airline and 22 year military pilot with 23,000 hours of safety) is offering his expert-witness services to explain how Andreas Lubitz died after Serco used the onion router on a Base One war room server to guide his Airbus 320 through a smooth descent at 430 mph into a mountainside about 20 km from the Serre-Ponçon dam in the French Alps on 24 March 2015.

Prequel 1: #2326: Marine Links HSBC To Clinton Base-One Mafia War Room, Serco Black Hand Lubitz Tor

Prequel 2: TRIAL BY MEDIA: co-pilot Andreas Lubitz – Abel Danger In Germany – Field McConnell besucht Deutschland – Der Whistleblower der Luftfahrtindustrie, Field McConnell – The Hegelian Odyssey of Andreas Lubitz Continues – SHOT DOWN 4U9525 UNITES FRANCE & GERMANY

Serco… Would you like to know more? 
SWISSLEAKS – “HSBC developed dangerous clients:
 arms merchants, drug dealers, terrorism financers”
Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! (Mobile Playback Version) 
[Note that HSBC is Serco’s banker and, with Allianz and Her Majesty’s Government, one of Serco’s major shareholders ] 

German Wings 4U9525: Could Andreas Lubitz even be innocent?

I wrote a few days ago that though the guilt of Andreas Lubitz was being taken as proved beyond all reasonable doubt, I felt that even if it was so, the French prosecutor was rushing a little too fast to judgement. I wrote then:

Maybe there are no other alternatives and all the conclusions being reached are perfectly justified. Maybe the sounds of his breathing which are being used to state that he was fully conscious and breathing normally are absolutely conclusive. Maybe there was no possibility that he could have been incapacitated and still have that breathing pattern. Maybe his 5 month break from his training for what a friend has called “depression and burn-out” is conclusive proof – as the media seem to assume – that he was mentally disturbed.

I am far from any kind of expert on airplanes and on the black boxes and what they can and can’t reveal, but my discomfort with the rush to judgement is apparently shared by some who are experts:
Helsingborgs Dagblad:

The German co-pilot Andreas Lubitz has been painted as being solely responsible for the plane crash in the French Alps. But now some voices claim that it is too early to rule out technical problems. “It is too early to judge anyone”says flight safety expert Hans Kjäll.
Investigations are continuing in the French Alps where 150 people died in plane crash a week ago. The German co-pilot Andreas Lubitz is suspected of deliberately crashing the plane and, among other things, it has been revealed that he had been treated for suicidal tendencies and suffered from a psychosomatic illness.

Meanwhile, only one of the two so-called black boxes has been found, which means that it can not be completely ruled out that some technical fault on the plane may have been significant.

“Currently no hypothesis about a technical fault can be entirely ruled out”, admits one of the French prosecutors to EKOT. According to Hans Kjäll it is only when the second black box is found that the plane’s flight data can provide the answers as to exactly when the disaster occurred and what data was input by the co-pilot can be determined.

“It is argued that 100 feet was set as the minimum height, but then that would mean flying below the ground surface. But how do we know?” Another possible reason for the crash is that there was a lack of oxygen in the cabin and that was why Lubitz began a descent. “He could have suffered from a lack of oxygen and passed out” says Hans Kjäll.

That the first pilot was not allowed into the cockpit may then have a natural explanation and then Lubitz can not be held responsible for the crash. “The first pilot may actually have left the cockpit to get an extra oxygen mask or oxygen bottle and then found the door locked” says Kjäll.
He believes that the scenario of how the co-pilot has been convicted before the completion of the investigation is similar to that with the missing Malaysian plane MH370, where the captain was very early on blamed for the incident. But later reports then showed no evidence that the pilot did anything intentionally.
Kjäll believes that Swedish prosecutors would have been more cautious in their statements than the French after the air disaster in the Alps. “They probably should not have gone out so early with details. The Accident Investigation Commission probably would not have said anything at all before finding the flight data recorder”, he says.

Maybe Andreas Lubitz is as guilty as everyone seems to believe. But he has not received his due process before he has been indicted and his guilt has been proclaimed as a settled fact. I understand that French prosecutors are not just investigators and prosecutors but also judges to some extent. Brice Robin, the French prosecutor (full transcript here) may be entirely right in his assessment of Lubitz’s guilt, but I still feel his press conference was not merely to allege guilt as a prosecutor but to pronounce guilt as a judge – and in that he went too fast, too far.”

Base One Technologies …. N/WAN Design Provide an IP based Network Solution in response to an RFI from the FAA (Federal Aviation Agency) to re-engineer their existing networks (FTI 2000). .. Responsible for providing and demonstrating the capabilities of an IP Network Architectural Design including a Disaster Recover Solution in response to an RFI for the FAA to upgrade or replace their current Mission Critical Network in the United States. Responsible for providing a solution and a plan to transition the FAA’s current X.25 environment to the proposed IP (BGP/OSPF) network. Challenging performance requirements, such high availability (99.9997%) with very strict and aggressive Mean-Time-To-Recover (6 seconds), were exceeded or met. Using Networking solutions from Nortel Networks and Cisco Systems, we provided a highly scaleable, deterministic and secured IP network running over ATM. FT1/T1 was provided in areas where ATM was not available. ISDN dial backup and dial-on-demand routing were used to increase availability and enhance MTTR. User connectivity was provided with Hot-Standby-Routing-Protocol (HSRP) through robust and highly available Cisco Catalyst switches. Responsible for providing a security solution included for the entire network using technologies such as Nokia/CheckPoint Firewall, Cylink ATM DS3, T1/FT1 & ISDN Encryptors, and Dragon LAN based Intrusion Detection Systems. .. Managed all loaned personnel who assisted in installing, maintaining, configuring and documenting loaned hardware and software.” … “[Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994.This file was obtained from the [Clinton] Secretary of State and has a file number of 1795583] .. Conducts IT Security and Risk Assessment in Federal government as well as security testing, implementing security for multiple platforms and operating systems around the world … Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions.

SOURCE: Base One Technologies 
September 02, 2008 09:00 ET 
Base One Technologies, Inc. 
Continues Operations in Government Space NEW ROCHELLE, NY–(Marketwire – September 2, 2008) – Base One Technologies, Inc. is pleased to announce that it has sold its affiliate, Base One Technologies Ltd., to Apptis Inc. Base One Technologies, Inc. will continue to compete in the government space as an 8(a), HubZone and Woman Owned Small Disadvantage Company. Base One Technologies, Inc. is an IT Engineering and Technical Services company founded in 1994. Base One has a Top Secret Facilities Clearance and specializes in: Enterprise Architecture, Network Infrastructure Support, Data Security, Software & Database Services, Disaster Recovery & Contingency Planning, and Independent Validation & Verification. Base One is a privately-held organization with headquarters in New Rochelle, NY. For more information visit: www.base-one.com. Contact Information: Liza R. Zaneri Base One Technologies 914 633-0200 x205 “www.base-one.com

Serco’s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals.”

Serco Awarded $187 Million Federal Aviation Administration Contracts

Date : 16 April 2015

Serco Inc., a provider of professional, technology and managed services, announced today the award of two contracts to continue its 20-plus years of supporting the Federal Aviation Administration’s (FAA) Contract Tower (FCT) Program. Serco will provide air traffic control specialists, safety managers, and program management services in support of 58 Air Traffic Control Towers (ATCTs) in 11 western states, including Alaska, California and Colorado. The two five-year contracts each have one base year and four one-year option periods, with a combined value of $187 million, if all options are exercised.

Under these contracts, Serco’s Air Traffic Controllers will be responsible for the safe and efficient movement of commercial, general aviation and military aircraft on the airport and in the airspace surrounding the airport. The Company will also provide risk management, quality assurance and program management to meet FAA service standards and quality metrics. Serco will utilise its Aviation Safety Management System to improve safety and mitigate risks in the National Airspace System.

“Air Traffic Control Towers provide vital services ensuring that airports are safer for pilots and passengers at airports across the country.” said Dan Allen, Serco Inc.’s Chairman and Chief Executive officer. “As experts in aviation and management solutions, we are honored and eager to continue supporting the FAA in 2015 and beyond.”

As part of Serco Group, one of the largest contracted providers of Air Navigation Services worldwide, the company is responsible for more than 960,000 miles of airspace and handles more than seven million aircraft movements a year. Serco employs more than 700 air traffic control specialists at over 75 airports – located in the U.S., U.K. and Middle East – who help maintain flight safety. In the US, the company has also been honored with the prestigious Willie F. Card Federal Aviation Administration (FAA) Contract Tower Award at towers in Lewiston, ID, Phoenix-Mesa Gateway, AZ, Jackson Hole, WY, Goodyear, AZ, and San Luis Obispo, CA.”

Onion routing network for securely moving data through communication networks
US 6266704 B1
ABSTRACT The onion routing network is used to protect Internet initiators and responders against both eavesdropping and traffic analysis from other users of the Internet. In the onion routing of the invention, instead of making connections directly to a responding machine, users make connections through onion routers. The onion routing network allows the connection between the initiator and responder to remain anonymous. Anonymous connections hide who is connected to whom and for what purpose from outside eavesdroppers.”

The best security: A trip through The Onion Router How TOR works. Courtesy TOR Project. Published: April 24, 2013, 11:38 am .. Before the Internet, people flocked to secret and well-hidden underground markets to purchase either illegal or morally questionable items. With the birth of the Internet, unlimited access to these items from around the world became a reality. The issue was creating a tunnel to transfer anything from heroin to full libraries of downloaded books, from one part of the world to the next securely and secretly. Enter Tor. The U.S Naval Research Lab created Tor, or The Onion Router, as an experiment in 1996. The lab has been studying different methods of carrying out anonymous communication between governments for years. The result was the original Tor network. .. Perhaps what Tor has become most well known for, though, is the Silk Road. Run by an anonymous individual who refers to themselves only as the Dread Pirate Roberts, the Silk Road is a highly illegal and highly profitable passageway for very illegal items. Buyers can purchase pounds of heroin or an arsenal and have it delivered to their home without leaving a trace. Discussions take place on a huge number of Tor forums daily between drug dealers from around the world discussing the latest trends and their future purchases. .. It may have been underground at one point, but it is no longer just a whisper in the dark forums of the Internet’s underbelly. It’s become a tool for activists, hackers, drug dealers, and curious minds. It’s the beginning of a line of networks that will become commonplace very soon. .. © COPYRIGHT – POSTMEDIA NEWS”

Hillary wiped her server clean: As NBC’s Kristen Welker reported over the weekend, the top Republican investigating the 2012 Benghazi attack, Rep. Trey Gowdy (R-SC), revealed that Hillary Clinton had wiped her server clean of her emails. “Clinton’s attorney, David Kendall, said Gowdy was looking in the wrong place,” the AP says. “In a six-page letter released late Friday, Kendall said Clinton had turned over to the State Department all work-related emails sent or received during her tenure as secretary of state from 2009 to 2013. “The Department of State is therefore in possession of all Secretary Clinton’s work-related emails from the (personal email) account,’ Kendall wrote.” Here’s the “Meet the Press” discussion over the Clinton emails.”

Yours sincerely,

Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222

David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation

337 Total Views 2 Views Today
Please follow and like us:

Related Post