#2366: Marine Brief – White’s And Clinton Kill Team Clock – Serco Spot-Fixed Fifa Bags – Gareth Death By 8(a) Tor
1. White’s Club members David Cameron and Nicholas Soames, with patent lawyer Hillary Clinton, outsourced the operation of the National Physical Laboratory’s kill-team clock to Serco in 1994.
2. In 1994, Serco agents began using North Face travel bags containing clock and communications gear to spot fix Fifa and other sports events and synchronize whistleblower contract hits.
3. In 2010, White’s bookmakers hired a kill team to film the death of Gareth Williams — the GCHQ spy and hacker of the Clinton’s spot-fixing racket in New York — with images transmitted from mobile devices in a North Face sports bag over SBA 8(a) onion router networks (Tor).
“The disturbing world of the Deep Web, where contract killers and drug dealers ply their trade on the internet
Dozens of ‘hitmen’ are available for hire through the ‘Deep Web’, or Tor
They all offer their services for a price paid in mysterious currency Bitcoin
One boasts: ‘I always do my best to make it look like an accident or suicide’
Others market services: ‘The best place to put your problems is in a grave’
By DAILY MAIL REPORTER
PUBLISHED: 16:27 GMT, 11 October 2013 | UPDATED: 17:39 GMT, 11 October 2013
Hiring a hitman has never been easier. Nor has purchasing cocaine or heroin, nor even viewing horrific child pornography.
Such purchases are now so easy, in fact, that they can all be done from the comfort of one’s home at the click of a button… and there’s almost nothing the police can do about it.
This worrying development of the criminal black market is down entirely to the Deep Web – a seething matrix of encrypted websites – also known as Tor – that allows users to surf beneath the everyday internet with complete anonymity. …..
Read more: http://www.dailymail.co.uk/news/article-2454735/The-disturbing-world-Deep-Web-contract-killers-drug-dealers-ply-trade-internet.html#ixzz3botDbJhr”
“Dead Brit spy Gareth Williams could have been mobile phone hacker
Published on Friday, November 15th
by Tony Dennis
Body-in bag man had been to Def Con 18
paget @ def con 18 hacking gsm
There’s been a lot of publicity recently in the UK about the mysteriously death of Brit, Gareth Williams, who worked for the spying agency MI6 (officially known as SIS [Unofficially run by White’s Gaming Club]). His body was found in a bag in his own bath. The British Police have controversially concluded that there’s no evidence that Williams was unlawfully killed when he died back in August 2010. However, GoMo News has developed a new theory that maybe Williams was actually a mobile phone hacker. Rather than someone who dealt with computers of other forms of espionage. We just think there was something strange about the number of SIM cards and mobile phone found in his flat after his death.
According to a report here in the Daily Mail here, “An iPhone left lying on a table in Gareth Williams’ flat was one of the key lines of inquiry after the inquest.”
The publication claims that just hours before Mr Williams died, the device was restored to factory settings.
As regular GoMo News readers will know, this is the most effective way of destroying all data held on a mobile phone.
The newspaper then says that “a mobile phone network operator [MNO] told British Police it had not been used over the previous three months.”
How did the MNO possibly know this? Because in a separate part of the story, the publication reported that, “his mobile phone and two SIM cards were neatly arranged on a table and a [Mac] laptop was on the floor.”
So if neither of his two SIM cards were actually inside the iPhone, how could an MNO possibly know it hadn’t been used for three months?
GoMo News believes that the crucial SIM wasn’t recovered. And as one Frenchman captured after evading French police proved – swallowing the SIM card is the best way to prevent its recovery.
The UK newspaper also said that his iPhone was just one of four owned by the MI6 officer. How many people keep four handsets? The old ones are so easy to resell.
Anyway, the real clincher for us is that Williams was known to have attended the Black Hat and Def Con 18 security conferences held in Las Vegas back in July 2010, the month before he died.
Now most observers associate this event with hacking into desktop computers and other forms of computing. But the event is also well know for its coverage of mobile phone [cell] phone hacking.
By a strange co-incidence a well known security specialist, Chris Paget (another Brit) was at the very same conference. Was he the person who Williams was shadowing?
Because Paget made his name at Def Con 18 by presenting a paper on mobile phone hacking. See the video of his presentation here.
Curiously Chris Paget is now Kristin Paget and who does she work for now? Answer – Apple.
Again, because of her work with Microsoft on its Vista OS, most people assume she must be working on the Mac OS. But perhaps she is really helping to ensure that iOS 7 is safe?
We just love conspiracy theories here.”
“Soccer stars have plenty of spare time, and plenty of money, so this week’s revelations of players gambling on events during English Premier League matches should come as no surprise.
Claus Lundekvam’s claims that “spot-fix” betting was rife when he was a player have attracted the attention of world governing body FIFA, which is also battling against the widespread problem of match-fixing.
The Premier League has a well-documented gambling culture, with big names such as Michael Owen and Wayne Rooney owning race horses and featuring in big-stake “card schools” on international and club duty.
Before them, England internationals Tony Adams and Paul Merson had highly-publicized problems with gambling and alcohol.
Former Southampton player Lundekvam is the latest to talk candidly about footballers’ vices, revealing that he and other top-flight stars made money out of betting on minor events in games such as the first throw-in or corner kick.
Swiss court: Former FIFA president took $1.5M in bribes
“For a while we did this almost every week,” Lundekvam told a Norwegian television channel. “We made a fair bit of money. We could make deals with the opposing captain.
“For example, betting on the first throw, the first corner, who started with the ball, a yellow card or a penalty. Those were the sorts of thing we had influence over.
“The results were never on the agenda. That is something I would never have done. We were professional competitors. Even though what we did, of course, was illegal, it was just a fun thing.”
Strict regulations and laws govern what professional footballers are able to gamble on, but are football’s lawmakers taking the problem seriously enough?
World governing body FIFA released a statement on Wednesday outlining its intention to look into Lundekvam’s claims.
“FIFA is monitoring this issue and involved its chief investigator in England,” FIFA told CNN. “Once all information is known it will be decided who is leading the investigations.”
The Premier League, which recently raised $4.5 billion selling broadcasting rights in Britain, declined to comment on the matter, while the English Football Association gave no indication it would be investigating Lundekvam’s claims.
“The FA has strict policies on this and our sanctions are wide-ranging. All participants also have a duty to report any such activity,” it told CNN.
“Football works closely with the gambling industry to monitor all markets and activity and we have a unit focused on maintaining the integrity of the sport.””
05.27.1510:00 AM ET
Corrupt FIFA Has Clinton Foundation Ties; World Cup Host Qatar Gave Millions
Both Bill Clinton and his family’s charity have been tied to soccer’s governing body, as well as Qatar’s disastrous World Cup bid.
And just like that, another Clinton Foundation donor is in the news.
The Clinton global charity has received between $50,000 and $100,000 from soccer’s governing body and has partnered with the Fédération Internationale de Football Association on several occasions, according to donor listings on the foundation’s website.
Several top FIFA executives were arrested Wednesday in Zurich and face corruption charges stretching back two decades, according to the U.S. Department of Justice.
Involvement with the embattled body extends beyond the foundation to Bill Clinton himself. The former president was an honorary chairman of the bid committee put together to promote the United States as a possible host nation for the 2018 or 2022 World Cup.
When the U.S. lost the 2022 bid to Qatar, Clinton was rumored to be so upset he shattered a mirror.
But apparently Qatar tried to make it up to him.
The Qatar 2022 Supreme Committee, partnering with the State of Qatar, “committed to utilizing its research and development for sustainable infrastructure at the 2022 FIFA World Cup to improve food security in Qatar, the Middle East, and other arid and water-stressed regions throughout the world,” according to the Clinton Foundation website.
The cost of the two-year project is not listed on the Clinton Foundation website, but the Qatar 2022 committee gave the foundation between $250,000 and $500,000 in 2014 and the State of Qatar gave between $1 million and $5 million in previous, unspecified years.”
“ Chris Hyman … One of the few non-whites to make it to the University of Natal, Hyman went on to join accountant Arthur Andersen, before moving to London in 1989 to be with Ernst & Young. After South Africa, he says, the UK was a breath of fresh air and he claims never to have found his race to be an issue. ‘My parents brought us up in a certain way. They told us that God created everyone. You do the best you can and you will be spotted.’ In 1994, he was head-hunted by Serco to be its European finance director, although, as he puts it: ‘I found Serco – the company fitted everything I was looking for.’ When he joined, annual turnover was £238m. In 2006, it was £2.5bn. On 11 September 2001, he was in the World Trade Center. He was on the 47th floor when the plane hit, talking to Serco shareholders. They got out – but not the people in his previous meeting. He does not like talking about that terrible day. ‘It confirmed my faith. It renewed my zest for getting the balance right and made me realise that time is not always your own. It made me think about my family and my health more – and about putting the balance back. You know, it’s not a bad thing, to step back sometimes.'”
“UK banks named in football bribery scandal: Barclays and HSBC ‘handled millions in suspect transactions’
Barclays and HSBC have been named in legal papers filed in the US … Documents have also named London-based Standard Chartered Bank .. Allegedly moved suspect transactions linked to Fifa through their accounts .. Britain’s Serious Fraud Office is understood to be monitoring situation ..
By RUPERT STEINER, CHIEF CITY CORRESPONDENT FOR THE DAILY MAIL .. PUBLISHED: 22:32 GMT, 28 May 2015 | UPDATED: 06:46 GMT, 29 May 2015 ..
Two of Britain’s biggest High Street banks have been dragged into the bribery and corruption scandal engulfing football’s world governing body. … Barclays and HSBC have been named in legal papers filed by the US Department of Justice after millions of dollars in suspect transactions linked to Fifa were allegedly moved through their accounts. .. On Wednesday the Americans charged 14 officials following a four-year FBI probe into bribes to obtain lucrative marketing rights to football tournaments.”
“DOUBLE DEALING 06.14.145:45 AM ET America’s Allies Are Funding ISIS
The Islamic State of Iraq and Syria (ISIS), now threatening Baghdad, was funded for years by wealthy [Clinton] donors in Kuwait, Qatar, and Saudi Arabia, three U.S. allies that have dual agendas in the war on terror.
The extremist group that is threatening the existence of the Iraqi state was built and grown for years with the help of elite donors from American supposed allies in the Persian Gulf region. There, the threat of Iran, Assad, and the Sunni-Shiite sectarian war trumps the U.S. goal of stability and moderation in the region.
It’s an ironic twist, especially for donors in Kuwait (who, to be fair, back a wide variety of militias). ISIS has aligned itself with remnants of the Baathist regime once led by Saddam Hussein. Back in 1990, the U.S. attacked Iraq in order to liberate Kuwait from Hussein’s clutches. Now Kuwait is helping the rise of his successors.
As ISIS takes over town after town in Iraq, they are acquiring money and supplies including American made vehicles, arms, and ammunition. The group reportedly scored $430 million this week when they looted the main bank in Mosul. They reportedly now have a stream of steady income sources, including from selling oil in the Northern Syrian regions they control, sometimes directly to the Assad regime.
But in the years they were getting started, a key component of ISIS’s support came from wealthy individuals in the Arab Gulf States of Kuwait, Qatar and Saudi Arabia. Sometimes the support came with the tacit nod of approval from those regimes; often, it took advantage of poor money laundering protections in those states, according to officials, experts, and leaders of the Syrian opposition, which is fighting ISIS as well as the regime.”
“Advisory (ICSA-14-353-01C) Network Time Protocol Vulnerabilities (Update C)
Original release date: February 05, 2015 | Last revised: February 09, 2015
All information products included in http://ics-cert.us-cert.gov are provided “as is” for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see http://www.us-cert.gov/tlp/.
This updated advisory is a follow-up to the updated advisory titled ICSA-14-353-01B Network Time Protocol Vulnerabilities that was published February 4, 2015, on the NCCIC/ICS-CERT web site.
Google Security Team researchers Neel Mehta and Stephen Roettger have coordinated multiple vulnerabilities with CERT/CC concerning the Network Time Protocol (NTP). As NTP is widely used within operational industrial control systems deployments, ICS-CERT is providing this information for US critical infrastructure asset owners and operators for awareness and to identify mitigations for affected devices. ICS-CERT may release updates as additional information becomes available.
These vulnerabilities could be exploited remotely.
Products using NTP service prior to ntp-4.2.8p1 are affected. This is an open source protocol.
AUTHENTICATION BYPASS BY SPOOFINGp
The IPv6 address ::1 can be spoofed, allowing an attacker to bypass access control lists (ACLs) based on ::1. All NTP4 releases before 4.2.8 are vulnerable. Linux and slightly older Mac OSX kernels are vulnerable, but other tested OSes are not vulnerable to the ::1 spoofing. Proper firewall rulings can mitigate this problem. As this issue may be a kernel issue, rather than NTPD, source-IP based ACLs may be vulnerable as well.
This vulnerability is resolved with NTP-stable4.2.8p1 on February 04, 2014.
CVE-2014-9297q has been assigned by CERT/CC to this vulnerability. A CVSS v2 base score of 9.0 has been assigned; the CVSS vector string is (AV:N/AC:L/Au:N/C:P/I:P/A:C).r
An attacker with a low skill and an exploit script would be able to exploit these vulnerabilities. However, a higher-level of skill would be necessary to craft usable exploit scripts.”
“[Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994.This file was obtained from the [Clinton] Secretary of State and has a file number of 1795583].. Conducts IT Security and Risk Assessment in Federal government as well as security testing, implementing security for multiple platforms and operating systems [onion router] around the world … Develops, implements and supports Information Security Counter measures such as honey-pots and evidence [snuff film] logging and incident documentation processes and solutions.”
“The 8(a) Business Development Program assists in the development of small businesses owned and operated by individuals who are socially and economically disadvantaged, such as women and minorities. The following ethnic groups are classified as eligible: Black Americans; Hispanic Americans; Native Americans (American Indians, Eskimos, Aleuts, or Native Hawaiians); Asian Pacific Americans (persons with origins from Burma, Thailand, Malaysia, Indonesia, Singapore, Brunei, Japan, China (including Hong Kong), Taiwan, Laos, Cambodia (Kampuchea), Vietnam, Korea, The Philippines, U.S. Trust Territory of the Pacific Islands (Republic of Palau), Republic of the Marshall Islands, Federated States of Micronesia, the Commonwealth of the Northern Mariana Islands, Guam, Samoa, Macao, Fiji, Tonga, Kiribati, Tuvalu, or Nauru); Subcontinent Asian Americans (persons with origins from India, Pakistan, Bangladesh, Sri Lanka, Bhutan, the Maldives Islands or Nepal). In 2011, the SBA, along with the FBI and the IRS, uncovered a massive scheme to defraud this program. Civilian employees of the U.S. Army Corps of Engineers, working in concert with an employee of Alaska Native Corporation Eyak Technology LLC allegedly submitted fraudulent bills to the program, totaling over 20 million dollars, and kept the money for their own use. It also alleged that the group planned to steer a further 780 million dollars towards their favored contractor.”
“The following positions have the status of [Obama] Cabinet-rank: .. United States Mission to the United Nations Ambassador Samantha Power usun.state.gov .. Small Business Administration Administrator [of 8(a) Tor stand down, spot fix and Serco digital fires network] Maria Contreras-Sweet sba.gov
“Serco farewell to NPL after 19 years of innovation 8 January 2015 .. During that period under Serco’s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry .. .. NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency [Clinton 100 Women in Hedge Funds and spot fixed] trading in the City through NPLTime.”
“Serco’s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco [and its drug hub banker HSBC] mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals.”
“The Marine Corps Intelligence Activity (MCIA) is a field activity headquarters, U.S. Marine Corps, and a member of both the Defense Intelligence Agency and the United States Intelligence Community. The MCIA describes itself as: “a vital part of military intelligence ‘corporate enterprise,’ and functions in a collegial, effective manner with other service agencies and with the joint intelligence centers of the Joint Chiefs of Staff and Unified Commands.” images and video links below and is standing by to make his briefing.”
McConnell invites The Marine Corps Intelligence Activity (MCIA) to study his work at the Abel Danger website and he offers to brief Marine General Joseph Dunford, the incoming Chairman of the Joint Chiefs of Staff, on how to win a cyberwar with White’s and Clinton 8(a) kill teams.
“Digital Fires Instructor Serco – Camp Pendleton, CA
Posted 377 days ago
Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.
•Works directly with customers and team members to determine project scope and specifications.
•Provides research and analysis to support military organizations.
•May support development and analysis of products, including training modules, evaluation tools, etc.
•Presents analysis or products to customers.
•May support policy and procedure development for agency, interagency, or community-wide support.
•May interact with outside customers and functional peer groups.
• Participates in the development, testing, maintenance and delivery of training and educational programs and related materials in support of complex products and/or procedures.
• Knowledge on the operational employment and TTPs of the following C2 systems and software applications in the COC operating environment is required:, AFATDS, FBCB2-BFT, JADOCS, and supporting C2 systems/software applications found available for use the regimental/battalion Combat Operations Center (COC).
• Conducts training sessions and assists in evaluating the effectiveness of training activities.
• May assist with updating course documentation on a continuous basis to ensure timeliness and relevance.
• May work with engineering, technical support and manufacturing to ensure that course material reflects current product features.
Desired Skills and Experience
•Requires a bachelor’s degree in a related field; graduate degree preferred, plus 3 years’ experience as a Military Analyst and/or formal military training. Appropriate clearance level required.
•Work is usually performed at a government site, some of which may be remote.
•Working conditions may vary.
•Travel may be required.
• Have attended DoD formal instructor courses, such as the Marine Corps’ Formal School’s Instructor’s Course, or service equivalent
• Four years of documented experience instructing and employing their respective C2 system in support of MAGTF operations
• Background as an 0844 or 0848 MOS (USMC MOS, or equivalent USA MOS appropriate), with formal training and experience utilizing AFATDS (Advanced Field Artillery Target Data System), EMT (Effects Management Tool), PSS-SOF (Precision Strike Suite – Special Ops Forces)
• Active Secret Clearance or the ability to obtain a Secret clearance is required.
• Formal AFATDS Training required, Strike-Link, PSS-SOF, JADOCS experience desirable”
“Onion routing network for securely moving data through communication networks US 6266704 B1 ABSTRACT The onion routing network is used to protect Internet initiators and responders against both eavesdropping and traffic analysis from other users of the Internet. In the onion routing of the invention, instead of making connections directly to a responding machine, users make connections through onion routers. The onion routing network allows the connection between the initiator and responder to remain anonymous. Anonymous connections hide who is connected to whom and for what purpose from outside eavesdroppers.”
“VATC Provides exercise support to FLINTLOCK 14 VATC Inc. Press Providing Global Strategies for Secure Operations in a Rapidly Changing World VATC PROVIDES EXERCISE SUPPORT TO FLINTLOCK 14 April 2, 2014 Tampa, Florida – Visual Awareness Technologies & Consulting (VATC) was recently selected to provide exercise support during FLINTLOCK 14, an annual regional exercise among African, Western, and U.S. Counterterrorism forces. Directed by the Chairman of the Joint Chiefs of Staff, and sponsored by Joint-Special Operations Task Force-Trans Sahara (JSOTF-TS), the Special Operations Forces (SOF) exercise develops security capabilities and strengthens bonds among exercise participants. This year’s event, planned by Special Operations Command Africa (SOCAFRICA), had more than 500 participants from Burkina Faso, Canada, Chad, France, Italy, Mauritania, the Netherlands, Niger, Nigeria, Norway, Senegal, Spain, the United Kingdom, and the United States. … VATC’s support included world-class Counter-Terrorism (CT), Foreign Internal Defense (FID), and Counter-Insurgency (COIN) subject matter expertise from SOF leaders and operators, scenario development based on operational realities and existent and emergent threats, and scripting of customer tailored orders and injects to include Campaign Plans, Operational Orders, Fragmentary Orders, Order of Battle or Pattern Analysis Databases, Intelligence Fusion products, and Targeting Data. The company also provided 24/7 Joint Exercise Control Group (JECG) support to exercise participants through all phases of planning and execution of strategic, operational, and tactical missions.”
“INTERNATIONAL FIRE TRAINING CENTRE CREW COMMANDER INCIDENT COMMAND INITIAL ACTIONS OF THE CREW COMMANDER Throughout this note he means he/she and his means his/hers. INTRODUCTION Although the Incident Commander will have overall control of the accident or incident ground, it can happen, on occasion, that a Crew Commander, the vehicle and its crew can be the first to arrive. Under these circumstances, it will then fall to the Crew Commander to initiate the first actions necessary to mitigate the incident. This training note is designed to stimulate thought and discussion on the subject of the actions that may need to be considered at an incident, initially under the control of a Crew Commander. .. IFTC/CM/05/119/08/CREW COMMANDER INCIDENT COMMAND INITIAL/TRAINING NOTE/ACTIONS OF THE CREW COMMANDER/Page 7 of 7/ISSUE 2/FEBRUARY 2015 G:fire training globalAVIATIONCC Incident CommandInitialTng NotesActions of the CC Serco Internal”
“About Us Welcome to the International Fire Training Centre (IFTC). We are part of the globally respected services company, Serco.
International Fire Training Centre is the leading aviation fire training centre in the world. Since 1981 it has been located at Durham Tees Valley Airport in the North East of England in what was once a historic Royal Air Force base. During the Second World War it was home to a detachment from the Royal Canadian Air Force flying Lancaster bombers.
The centre is situated in the countryside between Middlesbrough and Darlington both of which are only a few miles away and the city of Newcastle lies 30 minutes away by train.
IFTC trained firefighters are the best in the world. As a graduate of our internationally renowned training centre you will become an elite firefighter of the highest calibre armed with the skills, knowledge and instincts necessary to deal with extreme emergencies at any location in any country.
The training we provide is thorough and rigorous and we set stringent and demanding standards. We have been training new and experienced firefighters from across the globe for decades and our facilities are second to none.
Extensive Dedicated Facilities
A 20 acre dedicated training site with world class simulators and the largest confined space rigs in the UK.
fully equipped classrooms with laboratory equipment to teach firefighting theory.
A virtual reality suite to test decision making under pressure in real time [Digital Fires and The Onion Router].
Our training is designed for those working in the aviation, marine, industrial and offshore sectors. We offer hands on, totally authentic ‘real life’ emergency scenarios including hot fire and black smoke situations. Dealing with chemical spills, confined space situations and casualty recovery are also included.
We train both dedicated firefighters and those whose duties include dealing with fires and other emergency situations. Our trainers are firefighting professionals with extensive hands on experience across all sectors including military, civil and industrial.
Certified and Accredited
All our courses are certified and accredited to meet international requirements including CAA, OPITO, JOIFF and STCW offering you absolute peace of mind. Alternatively we can arrange internationally recognised bespoke courses to meet your particular needs. A number of our courses are also certificated and accredited within the UK with standards including BTEC, City & Guilds and PTLLS.”
“Base One Technologies .. Clients Banking, Finance and Insurance
Oversee the integration of two separate networks, as well as business office operations Key participant in network architecture design for a network handling real time stock/bond trading world-wide.
Provide interactive access to equity markets in the Americas, Europe, Asia, Middle East & Africa
Engineer/implement architecture for client inter-entity links
Develop overall technical solutions including network components, physical and logical topologies, routing policies and disaster recovery schemes
Design ISDN solution for client network and provide contingency planning and disaster recovery design strategies
Participate in the operational turn down of the client network to migrate traffic to the Chase Network in a controlled manner
Management of all IPX issues on Data Highway (the entire USA local and Domestic) with a staff of two.
Performed network designs and provided guidance to different groups on requirements to implement networks on DH
Designed and installed an application specific DS3 ATM network off SONET Ring.
Redesigned Merrill Lynch’s External network, to provide redundancy (dynamically) between buildings.
Engineered and implemented the first true VLAN project for Merrill Lynch using Cisco’s 5500s and 5000 hardware
Authored the IGRP to EIGRP plan for Data Highway which consist of over 1000 routers.
Designed and Implemented a new Market Data Backbone for Merrill Lynch including the engineering of the distribution of the information.
Evaluated Cisco’s Voice Over IP, Voice Over Frame Relay and Voice Over ATM Technologies
Redesigned CITICORP North America OSPF/BGP router network using ATM as the primary transport media, with ISDN for backup.
Redesign various OSPF/BGP areas where sites within an area were closing and areas were merging.
Fine tune ABR routes within BGP Autonomous Systems to provide optimum routing.
Consolidate Tier 3 Feeder Routers in an effort to provide optimum routing and efficient bandwidth usage.
Redesigned the INTRA Area 0 transport medium using ATM and fine tune the routing configuration to provide logical resilience in case of Frame Relay link failures from the ABRs to the feeder sites.
Provide DEC LAT-to-IP and IP-to-LAT translations, Replace access method to SNA from RSRB to DLSw+ and IP
Feasibility study/cost analysis/ resource management/capacity planning for IP over ATM/Frame Relay migration
Architect new network design topology and increase bandwidth via DS3’s
Designed, deployed network architecture and disaster recovery solutions [on the onion router] that withstood 9/11/01 disaster without a single transaction failure despite carrier failure
Client Cards FDDI Migration Project – Architect, manage and implement the client backbone Network Migration from FDDI & token Ring to switched Fast Ethernet
Perform business analysis, feasibility study, budgetary estimate, project management, relocate and consolidate network data sites to new client facilities in support of network expansion. Plan implementation and roll-out Solutions
Site Survey, data collection, facilities management planning, data center environmental facilities planning and cable infrastructure to relocate and consolidate network data
Network management, 3rd level support in NOC
Client Mid-Range Data Center Relocation – consolidate, merge divergent networks, systems, data centers, decommission WAN bridged architecture
Design, implement,provision, procure new network solutions and fault tolerant architecture, architect contingency plan, site relocation cost analysis, Network Impact analysis, WAN bandwidth cost analysis, strategic business analysis, global project planning,enterprise router architecture
Consolidate and merge various technologies and equipment – routers, switches, Gigabit Ethernet, token ring, layer2 & 3 switching, IGRP, OSPF, BGP, (HRSP), DECnet Phase III & IV routing, DECnet, LAT bridging, SNA, DLSW+, SRB, SDLC Tunneling, Frame Relay, X.25, ISDN, ATM, VLAN, Point to Point Transport, SNMP, VAX, HP UNIX, EMS, VTAM”
“Corporate Diversity We are a Government Certified Women-Owned Business We practice Diversity Recruitment and Staffing for IT positions Base One was founded in 1994 by a women engineer who had made a career in technology research for many years. Base One has been very successful in focusing on diversity recruiting and staffing for IT projects. It has been our experience that the greater the diversity mix, the more creative the solution. As in any field the more diverse the viewpoint the more thorough your analysis. Our engineers can think out of the box. Because of our affiliations we have access to pools of resources among more diverse groups & individuals. We work with a large pool of minority professionals who specialize in IT skills. We are able to have access to these resources through our status as a D/MWBD firm and our affiliations. These affiliations assist us in working with resources among more diverse groups & individuals. We are also partnered with firms that are 8A certified as Minority firms, Disabled Veteran firms [such as Metris the coordinator of Jade Helm, see below], Native American firms, Vietnam veteran firms, women owned firms.”
“City A.M. Outsourcing firm Serco has finally received some good news .. After being asked last year to conduct an investigation into whether Serco staff had been misleadingly recording [tagged] prisoners as ready for court when they were not, the Crown Prosecution Service has accepted the view of the City of London Police and put Serco in the clear.”
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation