#2355: Marine Links TSol Serco Onion Router To 8(a) Dando Hit, Digital Fire 7/7 Lynch
Plum City – (AbelDanger.net): United States Marine Field McConnell has linked Serco’s ongoing onion router (Tor) operations for the United Kingdom Treasury Solicitor (TSol) to the military-style coordination of SBA 8(a) companies in the contract killing (hit) of Jill Dando in 1999 and the ignition of the 7/7 bombs in London with digital fires allegedly authorized by United States Attorney General Loretta Lynch formerly with law firm Hogan Lovells.
“Digital Fires Instructor Serco – Camp Pendleton, CA Posted 377 days ago Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”
McConnell notes that in 1998, the U.S. Naval Research Lab transferred custody of its onion router to his sister Kristine Marcy, then Chief Operating Officer of the Small Business Administration, who allegedly procured Tor timing signals from the Serco NPL cesium clock to synchronize 8(a) live-webcast snuff-film productions with spoliation of evidence at crime scenes.
McConnell claims his sister and Lynch had Dando killed after Crimewatch agents discovered that TSol had authorized the BBC to backhaul 8(a) snuff-film images over the Serco onion router for news broadcasts of the digital fires attack on the US East Africa embassies in 1998.
McConnell claims that TSol authorized his sister and Ms. Lynch to set up a major law firm in the City of London with an exercise involving bombs on the underground where the exercise could be covertly switched from simulation to real through Serco 8(a) onion router network.
“Peter Power is a “crisis management specialist” who went out of his way to reveal on 7-7 that he was running a drill at “precisely” the same stations at the same time as the attacks took place. After a couple of years of near silence on the matter, he issued some further details but has never been asked to testify under oath about the events of that day. .. I rarely respond to allegations that there was a direct connection between an exercise my company was running on 7 July 2005 and the real events that happened that day, but having just seen on You Tube a highly misleading video following a childish stunt against me on 12/12/07 I feel I have little choice but to make three important points:
First, I chose to meet 2 people that day who requested an interview with me while I was attending a conference in a London hotel. Having shaken their hands and asked where they were from I noticed I was being covertly filmed by one of them who denied it, although it was obvious. As it is not possible to have a civilised conversation when deceit from one side was apparent from the outset, I apologised that I could not help in such circumstances and suggested another time perhaps? I then walked back to the conference – suddenly pursued by 2 or 3 shouting people trying to make it appear I was fleeing?
Second, it’s worth reminding some people that the London underground system has so far been the subject of terrorist bombings on 21 occasions, going back to 1885. Also, on the same day as our exercise, a major law firm in the City of London was running an exercise that involved bombs on the underground. A few days before so did a major German bank in London and even the Metropolitan Police. We were not alone.
Third, our table top exercise was to involve a very small group of crisis managers under test, from a company employing c1000 people. No one was on the streets at all. Just one part of the scenario was similar to IRA incendiary bombs planted on the underground in 1992 to start fires on three underground trains, albeit the locations were by sheer coincidence, more 2005 that 1992. That’s not so surprising when we had a limited number of underground lines to choose from, given the location of our client in the centre of London.
There will be no convincing some very odd people who think actors were on the bus that was actually bombed and the UK Government staged the whole thing on 7/7, the World Trade Centre was pre-wired with explosives on 9/11 and even that tragedy was a US Government setup.
At a time when this country is under a sustained terrorist threat it makes sense to base any exercise scenario on realism and historical events and in so doing hopefully increase our overall resilience to this threat. Had the odd people I met on 12.12.07 bothered to have a proper conversation with me I would have explained all this to them but fantasists will, no matter what I say, always prefer sensationalism to sense and conspiracy to coincidence.”
“Lovells traced its history in the UK back to 1899, when John Lovell set up on his own account at Octavia Hill, between St Paul’s and Smithfield. He was later joined by Reginald White, a clerk in his previous firm, to whom he gave articles. In 1924, they were joined by Charles King, forming Lovell, White & King. Soon after formation, the firm moved to Thavies Inn at Holborn Circus and later to Serjeant’s Inn, Fleet Street, before moving to 21 Holborn Viaduct in October 1977.
Lovells was formed as a result of a number of earlier mergers. In 1966, Lovell, White & King merged with Haslewoods, a firm with a much longer history of private client work. Haslewoods diverse clients included the Treasury Solicitor. In 1988, Lovell, White & King, which by then had a large international commercial practice, merged with Durrant Piesse, known, in particular, for its specialism in banking and financial services, forming Lovell White Durrant. It then changed to Lovells in 2000 when the firm merged with German law firm Boesebeck Droste. Other mergers then followed in other European countries during the early 2000s (decade).
In the early 2000s Lovells invested strongly in China, expanding is office in Beijing and opening an office in Shanghai becoming the second largest foreign firm in China. Following five years of growth, culminating in the opening of the firm’s Madrid office in 2004, Lovells had a presence in every major European jurisdiction. In 2007, Lovells opened an office in Dubai, offering legal services to corporations, financial institutions and individuals in the Middle East and at the beginning of 2009 opened an office in Hanoi. In September 2009, Lovells opened an associated office in Riyadh.
At the time of the merger, Lovells was a London-based international law firm with over 300 partners and around 3,150 employees operating from 26 offices in Europe, Asia and the United States.
Hogan & Hartson and Lovells announced their agreement to merge on 15 December 2009. Hogan Lovells was officially formed on May 1, 2010.”
“Onion routing network for securely moving data through communication networks US 6266704 B1 ABSTRACT The onion routing network is used to protect Internet initiators and responders against both eavesdropping and traffic analysis from other users of the Internet. In the onion routing of the invention, instead of making connections directly to a responding machine, users make connections through onion routers. The onion routing network allows the connection between the initiator and responder to remain anonymous. Anonymous connections hide who is connected to whom and for what purpose from outside eavesdroppers.”
“Digital Fires Instructor Serco – Camp Pendleton, CA
Posted 377 days ago
Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.
•Works directly with customers and team members to determine project scope and specifications.
•Provides research and analysis to support military organizations.
•May support development and analysis of products, including training modules, evaluation tools, etc.
•Presents analysis or products to customers.
•May support policy and procedure development for agency, interagency, or community-wide support.
•May interact with outside customers and functional peer groups.
• Participates in the development, testing, maintenance and delivery of training and educational programs and related materials in support of complex products and/or procedures.
• Knowledge on the operational employment and TTPs of the following C2 systems and software applications in the COC operating environment is required:, AFATDS, FBCB2-BFT, JADOCS, and supporting C2 systems/software applications found available for use the regimental/battalion Combat Operations Center (COC).
• Conducts training sessions and assists in evaluating the effectiveness of training activities.
• May assist with updating course documentation on a continuous basis to ensure timeliness and relevance.
• May work with engineering, technical support and manufacturing to ensure that course material reflects current product features.
Desired Skills and Experience
•Requires a bachelor’s degree in a related field; graduate degree preferred, plus 3 years’ experience as a Military Analyst and/or formal military training. Appropriate clearance level required.
•Work is usually performed at a government site, some of which may be remote.
•Working conditions may vary.
•Travel may be required.
• Have attended DoD formal instructor courses, such as the Marine Corps’ Formal School’s Instructor’s Course, or service equivalent
• Four years of documented experience instructing and employing their respective C2 system in support of MAGTF operations
• Background as an 0844 or 0848 MOS (USMC MOS, or equivalent USA MOS appropriate), with formal training and experience utilizing AFATDS (Advanced Field Artillery Target Data System), EMT (Effects Management Tool), PSS-SOF (Precision Strike Suite – Special Ops Forces)
• Active Secret Clearance or the ability to obtain a Secret clearance is required.
• Formal AFATDS Training required, Strike-Link, PSS-SOF, JADOCS experience desirable”
“Loan Improvement Jan 31, 2001 SBA modernizes to help feed its growing programs BY PATRICIA DAUKANTAS | GCN STAFF Under a five-year plan for overhauling its information technology systems, the Small Business Administration recently acquired new software for financial and other administrative tasks. .. In the first phase of the modernization, the agency has upgraded systems for managing its extensive portfolio of guaranteed loans, chief operating officer Kristine Marcy [Field McConnell’s sister] said. SBA processed its first electronic loan last November through its Sacramento, Calif., office and plans to add more private lenders during fiscal 2001. .. Marcy said. Banks had been asking SBA to make faster decisions on loan guarantees. The agency decided to aim for a [onion router] turnaround time of one hour. In the second phase of modernization, SBA is revamping its financial, human resources, procurement and travel systems with Web-enabled Oracle Corp. applications. .. The second-phase integrator, SRA International Inc. of Arlington, Va., has subcontracted with a number of small firms for things such as training and data conversion [Note Serco protégé Base One opened a document conversion center in the Bronx in 2006, presumably to deal with Obama’s passport problems]. .. In the final phase of the modernization, SBA will upgrade the computers in its 8(a) Business Development Program, which assists small businesses in competing for government contracts, Marcy said. The agency wants to be able to improve its tracking of clients’ successes and failures [through to liquidation by the SBA’s preferred lenders and sureties such as HSBC and Travelers Casualty and Surety Company of America – note merged with Citigroup and John Deutch’s CIA friends!].”
Office of Capital Access | Resources The Preferred Lenders Program (PLP) The Preferred Lenders Program (PLP) is part of SBA’s effort to streamline the procedures necessary to provide financial assistance to the small business community. Under this program, SBA delegates the final credit decision and most servicing and liquidation authority and responsibility to carefully selected PLP lenders. SBA, however, will continue to check loan eligibility criteria. Lenders are considered for PLP status based on their record with SBA, and must have demonstrated a proficiency in processing and servicing SBA-guaranteed loans. In the event of payment default by the borrower and the need for enforced collections, the PLP lender agrees to liquidate all business assets before asking SBA to honor its guaranty.”
“The 8(a) Business Development Program assists in the development of small businesses owned and operated by individuals who are socially and economically disadvantaged, such as women and minorities. The following ethnic groups are classified as eligible: Black Americans; Hispanic Americans; Native Americans (American Indians, Eskimos, Aleuts, or Native Hawaiians); Asian Pacific Americans (persons with origins from Burma, Thailand, Malaysia, Indonesia, Singapore, Brunei, Japan, China (including Hong Kong), Taiwan, Laos, Cambodia (Kampuchea), Vietnam, Korea, The Philippines, U.S. Trust Territory of the Pacific Islands (Republic of Palau), Republic of the Marshall Islands, Federated States of Micronesia, the Commonwealth of the Northern Mariana Islands, Guam, Samoa, Macao, Fiji, Tonga, Kiribati, Tuvalu, or Nauru); Subcontinent Asian Americans (persons with origins from India, Pakistan, Bangladesh, Sri Lanka, Bhutan, the Maldives Islands or Nepal). In 2011, the SBA, along with the FBI and the IRS, uncovered a massive scheme to defraud this program. Civilian employees of the U.S. Army Corps of Engineers, working in concert with an employee of Alaska Native Corporation Eyak Technology LLC allegedly submitted fraudulent bills to the program, totaling over 20 million dollars, and kept the money for their own use. It also alleged that the group planned to steer a further 780 million dollars towards their favored contractor.”
McConnell offers a proof by contradiction for his allegation that TSol used Serco’s 8(a) onion router network to assassinate Ms. Dando and trigger the 7/7 bombs — No other C2 network combines root-key access for BBC news crews with eavesdropper blocks and synchronisation of snuff-film production and spoliation crews at crimes scenes which consequentially stay cold.
Serco… Would you like to know more?
“HOW TOR ENABLED SILK ROAD Central to the operation of Silk Road was a complex underground computer routing system known as Tor. Ulbricht allegedly used the system to hide the location of the computer servers that hosted the Silk Road website. But Tor is no secret, especially to the U.S. government. The U.S. Naval Research Lab developed onion routing, the concept behind Tor, as a way to protect naval communication so an enemy could not trace computer messages and detect a ship’s position. Every computer on the Internet has an Internet Protocol, or IP, address that can be used to find its physical location. Tor ensures privacy by randomly routing computer messages through several places on the Internet, wrapped in layers of encryption, so no single point can link the source to the destination. .. Tor also hosts black markets, such as Sheep Marketplace and Black Market Reloaded, that deal in guns, drugs, stolen credit card numbers and child pornography. The United States seeks the extradition of Eric Marques, who was arrested in Ireland for allegedly hosting a website on the Tor network that allowed people to share child pornography. Silk Road created a private network through Tor by using software to build encrypted connections through relays on the network. The system is created so no single relay, or server, knew the complete path. A computer algorithm on Tor generates a complex Web address that ends in .onion and can be accessed only by downloading Tor software. … DEA agents learned of Silk Road within months after it went online. In June 2011, Sen. Charles Schumer, D-N.Y., called on federal agents to investigate it. Court papers indicate federal agents began making hundreds of undercover purchases from the site in November 2011.”
“INTERNATIONAL FIRE TRAINING CENTRE CREW COMMANDER INCIDENT COMMAND INITIAL ACTIONS OF THE CREW COMMANDER Throughout this note he means he/she and his means his/hers. INTRODUCTION Although the Incident Commander will have overall control of the accident or incident ground, it can happen, on occasion, that a Crew Commander, the vehicle and its crew can be the first to arrive. Under these circumstances, it will then fall to the Crew Commander to initiate the first actions necessary to mitigate the incident. This training note is designed to stimulate thought and discussion on the subject of the actions that may need to be considered at an incident, initially under the control of a Crew Commander. .. IFTC/CM/05/119/08/CREW COMMANDER INCIDENT COMMAND INITIAL/TRAINING NOTE/ACTIONS OF THE CREW COMMANDER/Page 7 of 7/ISSUE 2/FEBRUARY 2015 G:fire training globalAVIATIONCC Incident CommandInitialTng NotesActions of the CC Serco Internal”
“About Us Welcome to the International Fire Training Centre (IFTC). We are part of the globally respected services company, Serco.
International Fire Training Centre is the leading aviation fire training centre in the world. Since 1981 it has been located at Durham Tees Valley Airport in the North East of England in what was once a historic Royal Air Force base. During the Second World War it was home to a detachment from the Royal Canadian Air Force flying Lancaster bombers.
The centre is situated in the countryside between Middlesbrough and Darlington both of which are only a few miles away and the city of Newcastle lies 30 minutes away by train.
IFTC trained firefighters are the best in the world. As a graduate of our internationally renowned training centre you will become an elite firefighter of the highest calibre armed with the skills, knowledge and instincts necessary to deal with extreme emergencies at any location in any country.
The training we provide is thorough and rigorous and we set stringent and demanding standards. We have been training new and experienced firefighters from across the globe for decades and our facilities are second to none.
Extensive Dedicated Facilities
A 20 acre dedicated training site with world class simulators and the largest confined space rigs in the UK.
fully equipped classrooms with laboratory equipment to teach firefighting theory.
A virtual reality suite to test decision making under pressure in real time [Digital Fires and The Onion Router].
Our training is designed for those working in the aviation, marine, industrial and offshore sectors. We offer hands on, totally authentic ‘real life’ emergency scenarios including hot fire and black smoke situations. Dealing with chemical spills, confined space situations and casualty recovery are also included.
We train both dedicated firefighters and those whose duties include dealing with fires and other emergency situations. Our trainers are firefighting professionals with extensive hands on experience across all sectors including military, civil and industrial.
Certified and Accredited
All our courses are certified and accredited to meet international requirements including CAA, OPITO, JOIFF and STCW offering you absolute peace of mind. Alternatively we can arrange internationally recognised bespoke courses to meet your particular needs. A number of our courses are also certificated and accredited within the UK with standards including BTEC, City & Guilds and PTLLS.”
“Base One Technologies .. Clients Banking, Finance and Insurance
Oversee the integration of two separate networks, as well as business office operations Key participant in network architecture design for a network handling real time stock/bond trading world-wide.
Provide interactive access to equity markets in the Americas, Europe, Asia, Middle East & Africa
Engineer/implement architecture for client inter-entity links
Develop overall technical solutions including network components, physical and logical topologies, routing policies and disaster recovery schemes
Design ISDN solution for client network and provide contingency planning and disaster recovery design strategies
Participate in the operational turn down of the client network to migrate traffic to the Chase Network in a controlled manner
Management of all IPX issues on Data Highway (the entire USA local and Domestic) with a staff of two.
Performed network designs and provided guidance to different groups on requirements to implement networks on DH
Designed and installed an application specific DS3 ATM network off SONET Ring.
Redesigned Merrill Lynch’s External network, to provide redundancy (dynamically) between buildings.
Engineered and implemented the first true VLAN project for Merrill Lynch using Cisco’s 5500s and 5000 hardware
Authored the IGRP to EIGRP plan for Data Highway which consist of over 1000 routers.
Designed and Implemented a new Market Data Backbone for Merrill Lynch including the engineering of the distribution of the information.
Evaluated Cisco’s Voice Over IP, Voice Over Frame Relay and Voice Over ATM Technologies
Redesigned CITICORP North America OSPF/BGP router network using ATM as the primary transport media, with ISDN for backup.
Redesign various OSPF/BGP areas where sites within an area were closing and areas were merging.
Fine tune ABR routes within BGP Autonomous Systems to provide optimum routing.
Consolidate Tier 3 Feeder Routers in an effort to provide optimum routing and efficient bandwidth usage.
Redesigned the INTRA Area 0 transport medium using ATM and fine tune the routing configuration to provide logical resilience in case of Frame Relay link failures from the ABRs to the feeder sites.
Provide DEC LAT-to-IP and IP-to-LAT translations, Replace access method to SNA from RSRB to DLSw+ and IP
Feasibility study/cost analysis/ resource management/capacity planning for IP over ATM/Frame Relay migration
Architect new network design topology and increase bandwidth via DS3’s
Designed, deployed network architecture and disaster recovery solutions [on the onion router] that withstood 9/11/01 disaster without a single transaction failure despite carrier failure
Client Cards FDDI Migration Project – Architect, manage and implement the client backbone Network Migration from FDDI & token Ring to switched Fast Ethernet
Perform business analysis, feasibility study, budgetary estimate, project management, relocate and consolidate network data sites to new client facilities in support of network expansion. Plan implementation and roll-out Solutions
Site Survey, data collection, facilities management planning, data center environmental facilities planning and cable infrastructure to relocate and consolidate network data
Network management, 3rd level support in NOC
Client Mid-Range Data Center Relocation – consolidate, merge divergent networks, systems, data centers, decommission WAN bridged architecture
Design, implement,provision, procure new network solutions and fault tolerant architecture, architect contingency plan, site relocation cost analysis, Network Impact analysis, WAN bandwidth cost analysis, strategic business analysis, global project planning,enterprise router architecture
Consolidate and merge various technologies and equipment – routers, switches, Gigabit Ethernet, token ring, layer2 & 3 switching, IGRP, OSPF, BGP, (HRSP), DECnet Phase III & IV routing, DECnet, LAT bridging, SNA, DLSW+, SRB, SDLC Tunneling, Frame Relay, X.25, ISDN, ATM, VLAN, Point to Point Transport, SNMP, VAX, HP UNIX, EMS, VTAM”
“[Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994.This file was obtained from the [Clinton] Secretary of State and has a file number of 1795583] .. Conducts IT Security and Risk Assessment in Federal government as well as security testing, implementing security for multiple platforms and operating systems [onion router] around the world … Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions.”
“Corporate Diversity We are a Government Certified Women-Owned Business We practice Diversity Recruitment and Staffing for IT positions Base One was founded in 1994 by a women engineer who had made a career in technology research for many years. Base One has been very successful in focusing on diversity recruiting and staffing for IT projects. It has been our experience that the greater the diversity mix, the more creative the solution. As in any field the more diverse the viewpoint the more thorough your analysis. Our engineers can think out of the box. Because of our affiliations we have access to pools of resources among more diverse groups & individuals. We work with a large pool of minority professionals who specialize in IT skills. We are able to have access to these resources through our status as a D/MWBD firm and our affiliations. These affiliations assist us in working with resources among more diverse groups & individuals. We are also partnered with firms that are 8A certified as Minority firms, Disabled Veteran firms [such as Metris the coordinator of Jade Helm, see below], Native American firms, Vietnam veteran firms, women owned firms.”
“Serco’s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco [and its drug hub banker HSBC] mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals.”
“City A.M. Outsourcing firm Serco has finally received some good news .. After being asked last year to conduct an investigation into whether Serco staff had been misleadingly recording [tagged] prisoners as ready for court when they were not, the Crown Prosecution Service has accepted the view of the City of London Police and put Serco in the clear.”
“Serco farewell to NPL after 19 years of innovation 8 January 2015 .. During that period under Serco’s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry .. .. NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency [hedge fund] trading in the City through NPLTime.”
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation