#2374: Marine Briefs WSJ – Clinton’s NORAD Santa Wiretap Of Bilderberg Pedophiles – Soros 8(a) Spot Fixed Hedge Funds – Serco S.B.T.C JonBenet

United States Marine Field McConnell — Online Briefing of Brett Stevens, Deputy Editor, The Wall Street Journal at bstephens@wsj.com in re “The FIFA-Clinton Method” http://topics.wsj.com/person/A/biography/5463
From Plum City Online – (AbelDanger.net) – June 11, 2015

1. Hillary Clinton used Comverse (now Verint) to develop the NORAD Santa wiretapping network which forced Bilderberg pedophiles to support her husband’s 1992 presidential campaign and provide SBA loans for the 1993 bombing of NYC’s World Trade Center.

2. George Soros’s hedge funds use Verint call center monitoring networks to trade child pornography over the onion router for actionable intelligence needed by Small Business Administration (SBA) 8(a) companies to spot fix forex, sports and mass-casualty events.

3. Bilderbergers allegedly used Serco’s Small Business Time Clock (S.B.T.C) to time stamp snuff-film money shots as was allegedly the case at the wiretapped NORAD Santa crime scene where JonBenet Ramsey appears to have died at 02:00SBT on 12:26:1996.

McConnell notes that the 1996 Bilderberg delegates in Toronto included George Soros, President of Soros Fund Management, and Jean Chretien, the former Prime Minister of Canada whose pedophile-pimping pilot Russell Williams apparently scripted the NORAD Santa program which led JonBenet to open the door to a Serco 8(a) snuff-film crew which described itself as a small foreign faction and signed itself with “S.B.T.C Victory” on the ransom note.

Kerry Bilderberg wiretaps before Serco 8(a) 9/11

What Neighbors Reported

Page history last edited by Miss Marple 7 years ago

Secret Santa Visit

Lights in Kitchen

Missing Safety Light 
Early Morning Scream

Metal Scraping Sound

Dog That Didn’t Bark

Carnes Account. “On December 25, 1996, while playing at the home of a neighborhood friend, JonBenet told her friend’s mother that “Santa Claus” was going to pay her a “special” visit after Christmas and that it was a secret. (SMF P 124; PSMF P 124.) The person who may have said this to JonBenet has never been identified. (SMF P 125; PSMF P 125.)” (Carnes 2003:101). Time of Scream. Stanton “told the police on January 3 that she was certain she had heard a child’s scream at about 2:00 A.M. on the night of the murder” (Schiller 1999a:76-77); the scream also has been alleged to have occurred between midnight and 2:00 AM (Thomas 2000a:78-79; Sauers 1998); “She did not look at the clock, but estimated the time at somewhere between 12:00 a.m. and 2:00 a.m. She stayed awake and listened for any other noises for five to ten minutes, but heard absolutely nothing after that no cars, no voices, no footsteps, so she eventually went back to sleep” (Sauers 1998).

Nature of Scream. “Stanton said there had been only one scream but it was horrifying. If it came from the child, she assumed the scream had awakened her parents” (Schiller 1999a:76-77); in Thomas’s account, it was a “piercing scream” (Thomas 2000a:78-79); in the Bonita Papers, Stanton “was awakened by “one loud, incredible scream”. She related that it was “obviously from a child” and that it lasted 3 to 5 seconds and then abruptly stopped” (Sauers 1998).”

“The NORAD Tracks Santa program has always made use of a variety of media. From the 1950s to 1996, these were the telephone hotlinenewspapers, radio,  phonograph records and television. Many television newscasts in North America feature NORAD Tracks Santa as part of their weather updates on Christmas Eve.

From 1997 to the present, the program has had a highly publicized internet presence. As mobile media and social media have become popular and widespread as methods of direct communication, these newer media have also been embraced by the program.[7][8] The layout of the NORAD Tracks Santa website and its webpages have changed from 1997 to the present due to changes in internet technologies, and changes in partners and sponsors for a particular year.

Between 2004 and 2009, people who visited the NORAD Tracks Santa site were told they could “track” Santa in Google Earth.[9] They were given a link to download Google Earth, and then a KMZ file to download. From 2009-2011, the tracking in Google Earth has been done from the NORAD Santa site, and there is no KMZ file for Google Earth anymore.[10] In 2011, an iOS and Androidapplication was introduced, which features updates and an interactive game similar to Angry Birds.[11]

From mid-January until November 30, when one arrives at the NORAD Tracks Santa website, one is greeted with a message to come back on December 1 to “track Santa with NORAD”.

During December, one finds a NORAD Tracks Santa website with all the features available. On Christmas Eve, the NORAD Tracks Santa website videos page is generally updated each hour, when it is midnight in a different time zone. The “Santa Cam” videos show CGI images of Santa Claus flying over famous landmarks. Each video was accompanied by avoice-over until the end of the 2011 season, typically done by NORAD personnel, giving a few facts about the city or country depicted.[12] Celebrity voice-overs have also been used over the years. For the London “Santa Cam” video, English television personality and celebrity Jonathan Ross did the voice-over for 2005 to 2007 and the former Beatles drummer Ringo Starr narrated the same video in 2003 and 2004.[13][14] In
2002, Aaron Carter provided the voice-over for three

The locations and landmarks depicted in some of the “Santa Cam” videos have changed over the years. In 2009, twenty-nine “Santa Cam” videos were posted on the website. In previous years, twenty-four to twenty-six videos had been posted.

NORAD reported that for Christmas 2013, it logged 19.58 million unique visitors to its website on Christmas Eve, and 1,200 volunteers answered 117,371 calls. Through social media, it had 146,307 Twitter followers and 1.45 million “likes” on Facebook.[16] That year, NORAD contracted with Bing Maps to provide 2D map tracking, ending a five-year contract with Google.[17]

THE REAL HILLARY CLINTON: Episode #6 – Defiling the White House
Christmas Tree

UNLIMITED ACCESS | book — 1996 | Gary Aldrich; dfu comments

Posted on 12/26/2002, 8:06:03 PM by doug from upland

NOTE: the survival of our Republic is threatened by two things — fundamentalist Islamic terrorists and Hillary Rodham Clinton.

… I thought of all the children, grandmothers, and grandfathers waling past the White House’s Blue Room, looking at the first lady’s Christmas tree and wondering what in the hell had possessed the White House.

Here was another five golden rings ornament–five gold-wrapped condoms. I threw it in the trash. There were other condom ornaments, some still in the wrapper, some not. Two sets had been “blown” into balloons and tied to small trees. I wasn’t sure what the connection was to The Twelve Days of Christmas. Condoms in a pear tree?

When we were through, the first lady’s tree had all the beauty and majesty of a landfill.

Hillary’s social secretary, Ann Stock, came down, carefully looked at the tree and its decorations and pronounced it “perfect” and “delightful.” My shoulders sagged. Stock had been our last, best hope to clean up this “mistake” But instead, she thought it was “neat.” At least
we had turned the gingerbread man around so that his golden rings didn’t face the tour line. I came back later and took some pictures of the tree and “Mr. Gingerbread Man” with rings side out. I knew nobody would believe this without photographic proof.

While I was working on the tree, Craig Livingstone happened to stop by. He was surprised to see me placing ornaments on Hillary’s tree, but I told him I was an old hand at this decorating business. Livingstone was leading Oliver Stone and Michael Douglas in a tour around the White House. Stone was makingNixon, and Douglas was making An American President. Stone looked stoned to me, as he gazed around, obviously thinking of this “shot” or that. I wasn’t impressed. Still, this must have been a great moment for Livingstone, our White House security director, whose goal in life was to become a Hollywood producer.

But the cameras, surprisingly enough, soon fell not on Michael Douglas or on the dazed Oliver Stone or the photogenically challenged Craig Livingstone; they fell on me. I was interviewed by Martha Stewart, who was doing a Christmas special to be aired later on a major network morning show. She promised she would not blow my cover when she learned I was an FBI agent.

As she looked around the tree she made “hmmmm” sounds. If she didn’t like the tree, she was very diplomatic about it. I wondered what she really thought. It seemed to me most people could have only one thought: “Throw a tarp over it!”

Aside from displaying sex toys and self-mutilation devices on the nation’s Christmas tree, there was another “change” in the way the White House celebrated Christmas. Hillary decided to delete spouses from the invitation-only staff Christmas party. This caused a bit of a stir, not only because it broke with tradition, but because it raised a question I had heard several permanent staffers ask: “Why is Hillary so hostile to families?”

I think it’s because
they represent a sphere of loyalty outside her control. And Hillary likes to be in charge.”

“Soros emigrated to 
England in 1947 and became an impoverished student at the London School of Economics.[22] While a student of the philosopher Karl Popper, Soros worked as a railway porter and as a waiter. A university tutor requested aid for Soros, and he received £40 from a Religious Society of Friends (Quaker) charity.[23] In a discussion at the Los Angeles World Affairs Council in 2006,
Alvin Shuster, former foreign editor of the Los Angeles Times, asked Soros, “How does one go from an immigrant to a financier? … When
did you realize that you knew how to make money?” Soros replied, “Well, I had a variety of jobs and I ended up selling fancy goods on the
sea side, souvenir shops, and I thought, that’s really not what I was cut out to do. So, I wrote to every managing director in every 
merchant bank in London, got just one or two replies, and eventually that’s how I got a job in a merchant bank.”[24] That job was an entry-level position in Singer & Friedlander. Soros earned a BSc in philosophy in 1951 and a PhD in philosophy in 1954, both from the London School of Economics.[25] ..

In 1970, Soros began his business career. He founded 
Soros Fund Management and became its chairman. Among those who held senior positions there at various times were Jim Rogers, Stanley Druckenmiller, Mark Schwartz, Keith Anderson, and Soros’ two sons.[28][29][30]

In 1973, due to regulatory restrictions limiting his ability to run the funds, Soros resigned from his First Eagle funds. He then established the Quantum Fund.[27] 

Soros announced in July 2011 that he had returned funds from outside investors’ money (valued at $1 billion) and instead invested funds from his $24.5 billion family fortune
due to 
U.S. Securities and Exchange Commissiondisclosure rules.[31]

In 2013 the Quantum fund made $5.5 billion, making it again the most successful hedge fund in history. The fund has generated $40 billion since its inception in 1973.”

“According to Steering Committee rules:

“the invited guests must come alone; no wives, girlfriends, husbands or boyfriends. Personal assistants (meaning security, bodyguards, CIA or other secret service protectors) cannot attend the conference and must eat in a separate hall. (Also) The guests are explicitly forbidden from giving interviews to
journalists” or divulge anything that goes on in meetings.
Host governments provide overall security to keep away outsiders. One-third of attendees are political figures. The others are from industry, finance, academia, labor and communications.

Meeting procedure is by Chatham House Rules letting attendees freely express their views in a relaxed atmosphere knowing nothing said will be quoted or revealed to the public. Meetings “are always frank, but do not always conclude with consensus.”

Membership consists of annual attendees (around 80 of the world’s most powerful) and others only invited occasionally because of their knowledge or involvement in relevant topics. Those most valued are asked back, and some first-timers are chosen for their possible later usefulness.

Arkansas governor Bill Clinton, for example, who attended in 1991. “There, David Rockefeller told (him) why the North American Free Trade Agreement….was a Bilderberg priority and that the group needed him to support it. The next year, Clinton was elected president,”
and on January 1, 1994 NAFTA took effect. Numerous other examples are similar, including who gets chosen for powerful government, military and other key

On 21 September 1990, BNM sold between $500 million and $1 billion worth of pound sterlings in a short period, driving the pound
down 4 cents on the dollar (Millman, p. 228).
In response, bankers began front running Bank Negara’s orders. Two years later on Black Wednesday, Bank Negara attempted to defend the value of the British pound
against attempts by 
George Soros and others to devalue the pound sterling. George Soros won and Bank Negara reportedly suffered losses of more than US$4 billion. [1] Bank Negara lost an additional $2.2 billion in speculative trading a year later (Millman, p. 229). By 1994, the bank became technically insolvent and was bailed out by the Malaysian Finance Ministry (Millman, p. 229).”

“The Problem: Since Scicom’s inception in 1997, the Group has managed contact centres and related back-office functions in the Asia Pacific region for global multinational in the mobile handset industry, airlines, gaming, telecommunications, oil and gas, and IT hardware.
The company manages multiple contact centres in Asia, handling interactions from 35 countries globally in 24 languages, as well as English language support for the UK , Australian, and US markets. .. Following a thorough evaluation period, Scicom selected Verint Witness Actionable Solutions full-time recording solution with quality monitoring for its 1,400 agents. The system allows Scicom to reliably capture all customer interactions, and retrieve and evaluate them as required. The phone conversations can be searched and retrieved using a variety of selection criteria. This information helps Scicom ensure that agent performance is consistently monitored and improved, service processes are maximized, and customer satisfaction is optimized.”

Verint’s products include speech analysis software (used for 
IVR systems) and IP surveillance cameras and “smart” video surveillance analysis software.[21][22][23]

Verint’s RELIANT software provides law enforcement agencies with the ability to monitor and analyze voice, video, and data for a “vast number of targets” on all types of large, complex computer networks, in order to collect evidence for CALEA wiretaps.[24] Multiple national governments including the U.S., U.K., and various European, Asian, and Pacific nations have purchased millions of dollars in Verint surveillance software and equipment.[25][26][27][28]

On January 27, 1997, Comverse Technology Inc. announced the formation of a new private equity fund in partnership with Quantum Industrial Holdings Ltd.[29]

Verint has also received millions of dollars in 
government contracts to outfit airports, shipping ports, and government facilities with intelligent
video surveillance systems with tracking, 
biometrics, and video analysis features. For example, Unisys chose Verint as a subcontractor on its contract with the Transportation Security
, to install video surveillance devices in secure areas of airports across the U.S.[30]

In July 2009, 
AMR Research ranked Verint 20th in its list of the top 50 global enterprise application vendors.[31]During the latter portion of the decade of the 2000s, the company has won several awards from CRM Magazine.[32]

In 2011, Verint announced the launch of enhancements to its Nextiva Video Business Intelligence solution. The solution is part of the Nextiva IP Video portfolio from Verint Video Intelligence solutions.[33]

“The Communications Assistance for Law Enforcement Act (CALEA) is a 
United States wiretapping law passed in 1994, during the presidency of Bill Clinton (Pub. L. No. 103-414, 108 Stat. 4279, codified at 47 USC 1001-1010).
CALEA’s purpose is to enhance the ability of law enforcement agencies to conduct electronic surveillance by requiring that telecommunications carriers and manufacturers of telecommunications equipment modify and design their equipment, facilities, and services to ensure that they have built-in surveillance capabilities, allowing federal agencies to wiretap any telephone traffic; it has since been extended to cover broadband internet and VoIP traffic. Some government agencies argue that it covers monitoring communications rather than just tapping specific lines and that not all CALEA-based access requires a warrant.

The original reason for adopting CALEA was the 
Federal Bureau of Investigation‘s worry that increasing use of digital telephone exchange switches would make tapping phones at the phone company’s central office harder and slower to execute, or in some cases impossible.[citation needed] Since the original requirement to add CALEA-compliant interfaces required phone companies to modify or replace hardware and software in their systems, U.S. Congress included funding for a limited time period to cover such network
] CALEA was passed into law on October 25, 1994 and came into force on January 1, 1995.[citation
In the years since CALEA was passed it has been greatly expanded to include all VoIP and broadband internettraffic. From 2004 to 2007 there was a 62 percent growth in the number of wiretaps performed under CALEA — and more than 3,000 percent growth in interception of internet data such as email.[1]

By 2007, the FBI had spent $39 million on its DCSNet system, which collects, stores, indexes, and analyzes communications data.[1]

“The disturbing world of the Deep Web, where contract killers and drug dealers ply their trade on the internet
Dozens of ‘hitmen’ are available for hire through the ‘Deep Web’, or Tor .. They all offer their services for a price paid in mysterious currency Bitcoin .. One boasts: ‘I always do my best to make it look like an accident or suicide’ .. Others market services: ‘The best place to put your problems is in a grave’ By DAILY MAIL REPORTER PUBLISHED: 16:27 GMT, 11 October 2013 | UPDATED: 17:39 GMT, 11 October 2013 … Hiring a hitman has never been easier. Nor
has purchasing cocaine or heroin, nor even viewing horrific child pornography.
Such purchases are now so easy, in fact, that they can all be done from the comfort of one’s home at the click of a button… and there’s almost nothing the police can do about it. This worrying development of the criminal black market is down entirely to the Deep Web – a seething matrix of encrypted websites – also known as Tor – that allows users to surf beneath the everyday internet with complete anonymity. …. Some even seem to offer others the chance to profit from their killing by allowing users to bet on when a victim will die by putting money in a pool. The closest guess takes home the pot. Read more: 
“Serco farewell to NPL after 19 years of innovation 8 January 2015
 .. During that period under Serco’s management and leadership.. ..  NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing 
rigour to high frequency [Clinton spot fixed forex, FIFA and mass casualty events] trading in the City through NPLTime.”

“City A.M. Outsourcing firm 
Serco has finally received some good news .. After being asked last year to conduct an investigation into whether Serco staff had been misleadingly recording [tagged child porn] prisoners as ready for court when they were not, the Crown Prosecution Service has accepted the view of the City of London Police and put Serco in the clear.”

[Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994.This file was obtained from the [Clinton] Secretary of State and has a file number of 1795583]..  Conducts IT Security and Risk Assessment in Federal government as well as security testing, implementing security for multiple platforms and operating systems [onion router] around the world … Develops, implements and supports Information Security Counter measures such as honey-pots and evidence [snuff film] logging and incident documentation processes and solutions.

The 8(a) Business Development Program assists in the development of small businesses owned and operated by individuals who are socially and economically disadvantaged, such as women and minorities. The following ethnic groups are classified as eligible: Black Americans; Hispanic Americans; Native Americans (American Indians, Eskimos, Aleuts, or Native Hawaiians); Asian Pacific Americans (persons with origins from Burma, Thailand, Malaysia, Indonesia, Singapore, Brunei, Japan, China (including Hong Kong), Taiwan, Laos, Cambodia (Kampuchea), Vietnam, Korea, The Philippines, U.S. Trust Territory of the Pacific Islands (Republic of Palau), Republic of the Marshall Islands, Federated States of Micronesia, the Commonwealth of the Northern Mariana Islands, Guam, Samoa, Macao, Fiji, Tonga, Kiribati, Tuvalu, or Nauru); Subcontinent Asian Americans (persons with origins from India, Pakistan, Bangladesh, Sri Lanka, Bhutan, the Maldives Islands or Nepal). In 2011, the SBA, along with the FBI and the IRS, uncovered a massive scheme to defraud this program. Civilian employees of the U.S. Army Corps of Engineers, working in concert with an employee of Alaska Native Corporation Eyak Technology LLC allegedly submitted fraudulent bills to the program, totaling over 20 million dollars, and kept the money for their own use.[26] It also alleged that the group planned to steer a further 780 million dollars towards their favored contractor.[27]

“The following positions have the status of
[Obama] Cabinet-rank: .. Small Business Administration Administrator [of 8(a) Tor stand down, spot fix and Serco digital fires network] Maria Contreras-Sweet sba.gov
“Serco’s Office of Partner Relations (OPR) helps facilitate our 
aggressive small business utilization and growth strategies. Through the OPR, Serco [and its drug hub banker HSBC] mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals.”

McConnell invites Bret Stevens, deputy editor, editorial page, The Wall Street Journal to study his work at the Abel Danger website and accept a briefing on how “We the People” can win a cyberwar with Bilderberg pedophiles, Clinton wiretappers, Soros hedge funds and Serco’s Small Business Time Clock.

Prequel 1: #2373: Marine Brief WSJ – Clinton’s Bilderberg Verint Wiretaps – Matthias Spot Fixed Moneylenders – The Serco Crash By 8(a) Tor

Prequel 2: The FIFA-Clinton Method – Nothing embarrasses them, so nobody stops them

Serco… Would you like to know more? 
SWISSLEAKS – “HSBC developed dangerous clients:
arms merchants, drug dealers, terrorism financers” 
Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! (Mobile Playback Version) [HSBC is Serco’s drug-hub Silk Road banker and a major shareholder with the 8(a) 9/11 instant lenders including, Her Majesty’s Government and JPMorgan] 

Onion routing network for securely moving data through communication networks US 6266704 B1 ABSTRACT
The onion routing network is used to protect Internet initiators and responders against both eavesdropping and traffic analysis from other users of the Internet. In the onion routing of the invention, instead of making connections directly to a responding machine, users make connections through onion routers. The onion routing network allows the connection between the initiator and responder to remain anonymous. Anonymous connections hide who is connected to whom and for what purpose from outside eavesdroppers.”

Base One Technologies .. Clients Banking, Finance and Insurance Oversee the integration of two separate networks, as well as business office operations Key participant in network architecture design for a network handling real time stock/bond trading world-wide. Provide interactive access to equity markets in the Americas, Europe, Asia, Middle East & Africa Engineer/implement architecture for client inter-entity links; Develop overall technical solutions including network components, physical and logical topologies, routing policies and disaster recovery schemes; Design ISDN solution for client network and provide contingency planning and disaster recovery design strategies …. Authored the IGRP to EIGRP plan for Data Highway which consist of over 1000 routers. .. Designed, deployed network architecture and disaster recovery solutions [on the onion router] that withstood 9/11/01 disaster without a single transaction failure despite carrier failure .. Design, implement,provision, procure new network solutions and fault tolerant architecture, architect contingency plan, site relocation cost analysis, Network Impact analysis, WAN bandwidth cost analysis, strategic business analysis, global project planning,enterprise router architecture; Consolidate and merge various technologies and equipment – routers,switches, Gigabit Ethernet,token ring,layer2 & 3 switching, IGRP, OSPF, BGP, (HRSP),DECnet Phase III & IV routing,DECnet, LAT bridging, SNA, DLSW+, SRB,SDLC Tunneling, Frame Relay, X.25, ISDN, ATM, VLAN, Point to Point Transport, SNMP, VAX, HP UNIX, EMS, VTAM”


Corporate Diversity 
We are a Government Certified Women-Owned Business We practice Diversity Recruitment and Staffing for IT positions Base One was founded in 1994 by a women engineer who had made a career in technology research for many years. Base One has been very successful in focusing on diversity recruiting and staffing for IT projects. It has been our experience that the greater the diversity mix, the more creative the solution. As in any field the more diverse the viewpoint the more thorough your analysis. Our engineers can think out of the box. Because of our affiliations we have access to pools of resources among more diverse groups & individuals. We work with a large pool of minority professionals who specialize in IT skills. We are able to have access to these resources through our status as a D/MWBD firm and our affiliations. These affiliations assist us in working with resources among more diverse groups & individuals. We are also partnered with firms that are 8A certified as Minority firms, Disabled Veteran firms [such as Metris the coordinator of Jade Helm, see below], Native American firms, Vietnam veteran firms, women owned firms.

Yours sincerely,

Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222

David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation

1784 Total Views 1 Views Today
Please follow and like us:

Related Post

One comment