#2328: Marine Links Serco’s Clinton State Of Treason To FAA Base One Onion Router, Black Hand Lubitz Dam

Plum City – (AbelDanger.net): United States Marine Field McConnell has linked Serco’s outsourcing of an alleged Clinton State of Treason to FAA onion routers apparently used to stage a Base One Technologies’ decoy for the Black Hand* crash of the Airbus 320 of killer pilot Andreas Lubitz about 20 km from the Serre-Ponçon dam in the French Alps.

The War Room is a 1993 American documentary film about Bill Clinton‘s campaign for President of the United States during the1992 presidential election. It is frequently cited as one of the greatest documentaries ever made.[1]”

ouise attaque a dit… Bonjour à tous. Il me semble que le barrage de Serre-Ponçon, le plus grand barrage en terre d’Europe qui contient la plus importante retenue d’eau de France (lac artificiel de Serre-Ponçon) se situe sur la trajectoire de vol de l’A320. Le crash a eu lieu à seulement une vingtaine de kilomètre à vol d’oiseau du barrage. Je n’ose imaginer le nombre de morts supplémentaires si l’impact avait dû avoir lieu contre le barrage.”

Serco’s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals.”

Base One Technologies “[DOMESTIC BUSINESS CORPORATION, located in New Rochelle, NY and was formed on Feb 15, 1994.
This file was obtained from the [Clinton] Secretary of State and has a file number of 1795583] …. N/WAN Design Provide an IP based Network Solution in response to an RFI from the FAA (Federal Aviation Agency) to re-engineer their existing networks (FTI 2000). .. Responsible for providing and demonstrating the capabilities of an IP Network Architectural Design including a Disaster Recover Solution in response to an RFI for the FAA to upgrade or replace their current Mission Critical Network in the United States [allegedly to prepare for the attacks of 9/11] … Responsible for providing a security solution included for the entire network using technologies such as Nokia/CheckPoint Firewall, Cylink ATM DS3, T1/FT1 & ISDN Encryptors, and Dragon LAN based Intrusion Detection Systems. .. Managed all loaned [by Clinton State of Treason?] personnel who assisted in installing, maintaining, configuring and documenting loaned hardware and software.

Dark web ethnographic method Because this is an ethnography of a dark web SNS, there were several methodological challenges. The dark web is different from the “clear web” in important ways. The dark web is part of the Internet that cannot be accessed by mainstream software.1 It includes hidden sites that end in “.onion” or “.i2p” or other Top-Level Domain names only available through modified browsers or special software. Accessing I2P sites requires a special routing program. Accessing non-mainstream Top-Level Domains through OpenNIC requires the user to change the DNS server addresses on his or her router. Accessing .onion sites requires Tor (for a tutorial on Tor and .onions, see Hoffman (2012)). Moreover, those who run dark websites that end in .onion are able to hide their identities and locations from most, if not all.

McConnell notes that Serco (world’s largest air traffic controller) would have built the Clinton State of Treason from its outsourced operations of the U.K. 4-minute warning system, the FAA Contract Towers, the U.S. National Visa Center and the U.S. Patent and Trademark Office which published the onion router patent on July 24, 2001 about six weeks before 9/11!

McConnell claims Serco and its Base One protégé in New Rochelle transferred the U.S Naval Research Labs onion router to the FAA for use by Black Hand navigators to decoy Ziad Jarrah’s United 93 into a droned crash to save the Capitol Building on 9/11 and Andreas Lubitz’s Germanwings 9525 into a droned crash to save the Serre-Ponçon dam on March 24, 2015.

McConnell claims Serco (formerly RCA GB 1929) operates the Clinton State of Treason under Crown Rights rules; Serco can then practice any patent issued including the use of FAA onion-router and Boeing Uninterruptible Autopilot devices for a Black Hand hack of passenger planes and the removal of evidence of decoy and drone maneuvers from crime scenes.

Black Hand* – Serco navigators using the British Crown’s Patent Rights to Track, Film and Kill” from the City of London’s Honourable Artillery Company 1537; The Master Mariners and The Air Pilots (formerly GAPAN) 1929, and The Ancient and Honorable Artillery Company of Massachusetts 1638 – whose alumni include U.S. Presidents James Monroe, Chester Alan Arthur, Calvin Coolidge and John F. Kennedy and – perhaps – Barack ‘Down Low’ Obama.

McConnell (30 year airline and 22 year military pilot with 23,000 hours of safety) is offering his expert-witness services to explain how Serco agents in the Clinton State of Treason used FAA onion routers to execute Base One decoy and drone maneuvers during the Black Hand crash of Andreas Lubitzs Airbus 320 about 20 km from the Serre-Ponçon dam in the French Alps.

Prequel 1: #2327: Marine Links Serco Black Hand Patents To Base One Clinton Server, Lubitz Death By TORT

Prequel 2: TRIAL BY MEDIA: co-pilot Andreas Lubitz – Abel Danger In Germany – Field McConnell besucht Deutschland – Der Whistleblower der Luftfahrtindustrie, Field McConnell – The Hegelian Odyssey of Andreas Lubitz Continues – SHOT DOWN 4U9525 UNITES FRANCE & GERMANY

Serco tests FAA onion router during Amalgam Virgo — a Clinton State of Treason continuity of government exercise June 1-2, 2001

Serco… Would you like to know more? 
SWISSLEAKS – “HSBC developed dangerous clients:
 arms merchants, drug dealers, terrorism financers”
Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! (Mobile Playback Version) 
[Note that HSBC is Serco’s banker and, with Allianz and Her Majesty’s Government, one of Serco’s major shareholders ] 

“We may never know exactly what really happened. The memory chip of the second black box recording flight data was missing, something which in itself is very odd. .. If the plane did crash, the cause may have been the hacking of the computer system during the repairs the day prior to the flight. The three French Mirage planes could have jammed the electronic communication and control system. Also, odd is the alleged appearance of an Italian fighter jet near the alsp, which squawked on the emergency channel of the Airbus the very time when radio contact was lost.”

Hello World,
Another commercial plane went down and again the blame is on the pilot. The Germanwings 9525, an Airbus A320-211, crashed into the Alps mountains after what is being defined as a constant descent, beginning few minutes after a routine contact with air traffic control. I sincerely believe, this accident has more to do with the aircraft than the pilot. Here are the reasons why I do not buy the ‘Crazy-Pilot’ theory.

This time, instead of waiting for the media to speculate, the Crisis-Management efforts have efficiently used the media elements to prevent the general public from thinking anywhere near the actual root-cause of the incident.

Firstly, the very fact that the prosecutors’ claims are being published as key findings and then publishing the findings as support indicates that this effort is avoiding the acceptance and analysis of possibilities that will indicate the mistake of individuals other than the flight crew.
How did a German media-house get hold of cockpit voice recording (or its transcript) at a time when no such information was officially released? If the report was alleged and the claim unsupported by facts of the leak, what actions are being taken against the German media-house that published such a report? [Nobody will talk about it because it probably was a paid media campaign] ….


In my view, the aircraft was an aging platform, well near or over its design operational life and it might have been subjected to a very questionable ‘Life-Extension-Program’ which in part or full might have rendered the aircraft vulnerable to multiple unidentified failure modes, one of which struck the aircraft during its final flight that ended in the crash. The Life-Extension-Program was approved by EASA but FAA refused to allow its inclusion at one point of time. If one regulator finds enough evidence to agree why does another find enough evidence to disagree? What does that tell about the very viability of the Life-Extension-Program and its impact on the aircraft it is approved for, irrespective of its full/partial implementation?

The possibility of co-pilot deliberately crashing the plane is a story being cooked up to cover up this incident so as to protect multiple commercial interests. In the end, as it turns out, pilots can no longer divulge their health issues or personal fronts to their managements as those details will be cleverly used against them, when they are not even alive to defend their stand.

At this point I am even curious to learn if those individuals who get angry at speculators online (and drag the discussion to the most insignificant bolt on the plane) might be part of a specially constituted online-clean-up team reporting to the crisis-management team that is trying to keep operator, manufacturer, maintainer and the regulator from any possible blame, every time a plane goes down (debris recovery is irrelevant here).

How in the world do these stakeholders remain untouched while pilots alone get blamed for ‘tendencies’ and ‘depressions’ based on what everyone proudly calls ‘initial reports’?????

The lack of exceptions in this trend is what keeps me wondering what really happens to these untouched possibilities of plane crashes.”

Meanwhile United 93 reaches cruising altitude of 35,000 feet and as the passengers relax and are being served breakfast the terrorists wait for the right moment to hijack the plane. After al-Haznawi returns from a toilet wearing an artificial bomb around his torso al-Ghamdi holds one of the flight attendants Debbie Welsh at knife point while the passengers are moved to the rear of the plane after al-Haznawi displays the “bomb.” Both Jarrah and al-Ghamdi force Debbie to let them into the cockpit and both pilots as well as Debbie are murdered. Jarrah then takes over as the pilot and claims they have 50 minutes left to live as he flies the plane for their chosen target which is implied to be the Capitol Building. However the passengers decide to save themselves after discovering that the pilots are dead as well as learning via air phones the World Trade Center and Pentagon have been struck. After coming up with a plan and praying, the passengers attempt to take back the airplane. After al-Haznawi is killed al-Nami warns Jarrah and al-Ghamdi and despite his vain attempts to delay the passengers he is killed after Jeremy Glick snaps his neck. The male passengers frantically break into the cockpit and attempt to land the plane but Jarrah manages to turn the plane upside down before the aircraft crashes into Pennsylvania and the scene fades out implying everyone on board has been killed instantly.”

“I remember a long time ago (2002) when some of the actions of the hijackers of the September 11 planes, namely the United 93 one, included trying to turn off the autopilot several times, then re-engaging it (at which point it returned to it cruise altitude and course). Apparently on the ‘transmissions’ they made over the ATC frequency (telling the “Air Traffic Controller” to sit down and remain calm and remain seated) there was the Autopilot disconnect horn going off in the background. This was also shown in Paul Greengrass’ movie United 93 with the actor playing Ziad Jarrah (UAL93 hijacker pilot) trying desperate to silence the Autopilot alarm by pressing random buttons, (Including the “engage autopilot” Button) and not getting anywhere. The alarm continues wailing for several minutes through the cockpit scenes in the movie. Later he decides that he will “Descend to speed up”, thereby increasing the aircraft’s Indicated airspeed (into Overspeed clacker warning) but ultimately decreasing the aircraft’s Ground speed and Mach (ie: he actually slowed due to not understanding what Indicated Airspeed is). Maybe these details make me more annoyed/angry at n00bs than I would otherwise be, since they seem to have the same misconceptions about the operation of airliners that the movie (and possibly real) UAL93 hijackers did.”

Base One Technologies …. N/WAN Design Provide an IP based Network Solution in response to an RFI from the FAA (Federal Aviation Agency) to re-engineer their existing networks (FTI 2000). .. Responsible for providing and demonstrating the capabilities of an IP Network Architectural Design including a Disaster Recover Solution in response to an RFI for the FAA to upgrade or replace their current Mission Critical Network in the United States. Responsible for providing a solution and a plan to transition the FAAs current X.25 environment to the proposed IP (BGP/OSPF) network. Challenging performance requirements, such high availability (99.9997%) with very strict and aggressive Mean-Time-To-Recover (6 seconds), were exceeded or met. Using Networking solutions from Nortel Networks and Cisco Systems, we provided a highly scaleable, deterministic and secured IP network running over ATM. FT1/T1 was provided in areas where ATM was not available. ISDN dial backup and dial-on-demand routing were used to increase availability and enhance MTTR. User connectivity was provided with Hot-Standby-Routing-Protocol (HSRP) through robust and highly available Cisco Catalyst switches. Responsible for providing a security solution included for the entire network using technologies such as Nokia/CheckPoint Firewall, Cylink ATM DS3, T1/FT1 & ISDN Encryptors, and Dragon LAN based Intrusion Detection Systems. .. Managed all loaned personnel who assisted in installing, maintaining, configuring and documenting loaned hardware and software.” … “[Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994.This file was obtained from the [Clinton] Secretary of State and has a file number of 1795583] .. Conducts IT Security and Risk Assessment in Federal government as well as security testing, implementing security for multiple platforms and operating systems around the world … Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions.

SOURCE: Base One Technologies September 02, 2008 09:00 ET Base One Technologies, Inc. Continues Operations in Government Space NEW ROCHELLE, NY–(Marketwire – September 2, 2008) – Base One Technologies, Inc. is pleased to announce that it has sold its affiliate, Base One Technologies Ltd., to Apptis Inc. Base One Technologies, Inc. will continue to compete in the government space as an 8(a), HubZone and Woman Owned Small Disadvantage Company. Base One Technologies, Inc. is an IT Engineering and Technical Services company founded in 1994. Base One has a Top Secret Facilities Clearance and specializes in: Enterprise Architecture, Network Infrastructure Support, Data Security, Software & Database Services, Disaster Recovery & Contingency Planning, and Independent Validation & Verification. Base One is a privately-held organization with headquarters in New Rochelle, NY. For more information visit: www.base-one.com. Contact Information: Liza R. Zaneri Base One Technologies 914 633-0200 x205 “www.base-one.com

Serco Awarded $187 Million Federal Aviation Administration Contracts

Date : 16 April 2015

Serco Inc., a provider of professional, technology and managed services, announced today the award of two contracts to continue its 20-plus years of supporting the Federal Aviation Administration’s (FAA) Contract Tower (FCT) Program. Serco will provide air traffic control specialists, safety managers, and program management services in support of 58 Air Traffic Control Towers (ATCTs) in 11 western states, including Alaska, California and Colorado. The two five-year contracts each have one base year and four one-year option periods, with a combined value of $187 million, if all options are exercised.

Under these contracts, Serco’s Air Traffic Controllers will be responsible for the safe and efficient movement of commercial, general aviation and military aircraft on the airport and in the airspace surrounding the airport. The Company will also provide risk management, quality assurance and program management to meet FAA service standards and quality metrics. Serco will utilise its Aviation Safety Management System to improve safety and mitigate risks in the National Airspace System.

“Air Traffic Control Towers provide vital services ensuring that airports are safer for pilots and passengers at airports across the country.” said Dan Allen, Serco Inc.’s Chairman and Chief Executive officer. “As experts in aviation and management solutions, we are honored and eager to continue supporting the FAA in 2015 and beyond.”

As part of Serco Group, one of the largest contracted providers of Air Navigation Services worldwide, the company is responsible for more than 960,000 miles of airspace and handles more than seven million aircraft movements a year. Serco employs more than 700 air traffic control specialists at over 75 airports – located in the U.S., U.K. and Middle East – who help maintain flight safety. In the US, the company has also been honored with the prestigious Willie F. Card Federal Aviation Administration (FAA) Contract Tower Award at towers in Lewiston, ID, Phoenix-Mesa Gateway, AZ, Jackson Hole, WY, Goodyear, AZ, and San Luis Obispo, CA.”

Onion routing network for securely moving data through communication networks
US 6266704 B1
ABSTRACT The onion routing network is used to protect Internet initiators and responders against both eavesdropping and traffic analysis from other users of the Internet. In the onion routing of the invention, instead of making connections directly to a responding machine, users make connections through onion routers. The onion routing network allows the connection between the initiator and responder to remain anonymous. Anonymous connections hide who is connected to whom and for what purpose from outside eavesdroppers.”

The best security: A trip through The Onion Router How TOR works. Courtesy TOR Project. Published: April 24, 2013, 11:38 am .. Before the Internet, people flocked to secret and well-hidden underground markets to purchase either illegal or morally questionable items. With the birth of the Internet, unlimited access to these items from around the world became a reality. The issue was creating a tunnel to transfer anything from heroin to full libraries of downloaded books, from one part of the world to the next securely and secretly. Enter Tor. The U.S Naval Research Lab created Tor, or The Onion Router, as an experiment in 1996. The lab has been studying different methods of carrying out anonymous communication between governments for years. The result was the original Tor network. .. Perhaps what Tor has become most well known for, though, is the Silk Road. Run by an anonymous individual who refers to themselves only as the Dread Pirate Roberts, the Silk Road is a highly illegal and highly profitable passageway for very illegal items. Buyers can purchase pounds of heroin or an arsenal and have it delivered to their home without leaving a trace. Discussions take place on a huge number of Tor forums daily between drug dealers from around the world discussing the latest trends and their future purchases. .. It may have been underground at one point, but it is no longer just a whisper in the dark forums of the Internet’s underbelly. It’s become a tool for activists, hackers, drug dealers, and curious minds. It’s the beginning of a line of networks that will become commonplace very soon. .. © COPYRIGHT – POSTMEDIA NEWS”

Hillary wiped her server clean: As NBC’s Kristen Welker reported over the weekend, the top Republican investigating the 2012 Benghazi attack, Rep. Trey Gowdy (R-SC), revealed that Hillary Clinton had wiped her server clean of her emails. “Clinton’s attorney, David Kendall, said Gowdy was looking in the wrong place,” the AP says. “In a six-page letter released late Friday, Kendall said Clinton had turned over to the State Department all work-related emails sent or received during her tenure as secretary of state from 2009 to 2013. ‘The Department of State is therefore in possession of all Secretary Clinton’s work-related emails from the (personal email) account,’ Kendall wrote.” Here’s the “Meet the Press” discussion over the Clinton emails.”

Yours sincerely,

Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222

David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation

347 Total Views 1 Views Today
Please follow and like us:

Related Post