#2379: Marine Brief – Pig Farm Scripts on Clinton Server – Starnet Bets on Benghazi Deaths – Serco 8(a) Digital Fires
1. Hillary Clinton has allegedly been registering scripts on her server for use in pay-per-view snuff-film betting following a Dark Web model for a Piggy’s Palace charity launched in 1996 by David Johnston, Governor General of Canada, at the Pickton Family pig farm in British Columbia.
2. Clinton agents allegedly used a 9/11/12 pig-farm script from Sidney Blumenthal to set up a Starnet (now World Gaming) playbook and take bets on the predicted time of death of the former SEALs Glen Doherty and Tyrone S. Woods on the roof of the CIA “Annex” in Benghazi.
3. Clinton agents allegedly positioned a drone over the CIA annex to send video directly to Obama’s 8(a) Cabinet in the White House in support of online pig-farm snuff-film betting where the precise time of death of the former SEALS was determined by the atomic clock of Serco Digital Fires.
McConnell is offering to serve as an expert witness in any action for wrongful deaths related to Clinton’s support for online assassination betting and Serco digital fires during the attacks of 9/11/2001 and 9/11/2012.
Gowdy: Confidant who sent Libya memos to Clinton didn’t write them
Published June 17, 2015
Rep. Trey Gowdy sounds off about latest Benghazi e-mails
Longtime Clinton confidant Sidney Blumenthal was “merely a conduit” and did not write the numerous memos about Libya he forwarded to then-Secretary of State Hillary Clinton, the chairman of the House panel investigating the deadly 2012 Benghazi attacks said Tuesday.
Blumenthal was forwarding information from someone who may have had business interests in Libya, Rep. Trey Gowdy, R-S.C. told Fox News’ Megyn Kelly after Blumenthal spent nearly nine hours at the Capitol as Gowdy’s committee met in closed session. Gowdy later named former high-ranking CIA official Tyler Drumheller as the man behind the information.
Gowdy said that Blumenthal has never been to Libya, is not an expert on the country and therefore “has no idea” as to the validity of the information he was sending to Clinton, now a Democratic presidential candidate.
“Not only was [Blumenthal] providing unvetted, uncorroborated, unsubstantiated intelligence to our top diplomat, he was just simply forwarding on intelligence that somebody by the name of Tyler Drumheller was sending him,” Gowdy said.
Gowdy did not specify the author’s business interest. But the original report in The New York Times on Blumenthal’s memos said the information was coming from “business associates” Blumenthal was advising — including Drumheller — who reportedly were trying to win contracts from the transitional government, including to create floating hospitals and temporary housing. They were not successful.
“[Blumenthal] didn’t know if the sources were legitimate, he didn’t know whether or not the information had been corroborated. He was merely a conduit between somebody who may have had a financial interest in Libya and our nation’s top diplomat,” Gowdy said.
Blumenthal was not a member of the Obama administration at the time. When Megyn Kelly posed Clinton’s claim that she has many friends emailing her, Gowdy responded: “Her other friends are not emailing her about Libya. He is.”
Gowdy also took issue with Clinton’s claim that the information from Blumenthal was unsolicited.
“Secondarily, she used the word unsolicited,” Gowdy said. “Megyn, when these emails are released, I want you to count the number of times she says “keep ’em coming” “this is great, ‘useful information.’ I don’t know what her definition of unsolicited is, but it is very strikingly different from my own.”
Both Gowdy and Blumenthal agreed that Blumenthal shed little light on the Benghazi attack, but Gowdy called the all-day session interrupted by lunch and floor votes “productive” and informative. Blumenthal, however, said his appearance “was for one reason and one reason only, and that reason is politics,” The Associated Press reported.
Blumenthal, meeting with reporters after his testimony ended, said the memos were written by a former high-ranking CIA official, adding that he passed them on to Clinton as a friend. Blumenthal declined to name the source of the information.
The evening after the September 2012 Benghazi attack, Blumenthal forwarded to Clinton an analysis of the situation from Drumheller which purported to contain information from “sources with direct access to the Libyan National Transitional Council as well as the highest levels of European governments as well as Western intelligence and security services.”
The memo said a top Libyan official, Mohamed Yousef el-Magariaf, had told close associates that the Benghazi attack was carried out by the militant group Ansar al-Sharia and that Libyan security officials believed the group “took advantage of cover provided by” demonstrations against an Internet video seen as insulting to the Prophet Mohammed to conduct it.
Blumenthal said he “explained the facts” about his correspondence with Clinton to the committee and “dispelled some myths recklessly disseminated” by some committee members.
“I answered every question,” Blumenthal said, adding that he “shed no light on events in Benghazi” because he has no firsthand knowledge and never worked for the Obama administration.
Earlier Tuesday it was revealed that dozens of emails handed over to Congress from Blumenthal were not part of the trove of emails originally submitted by the State Department, raising questions over why those emails were apparently withheld.
One source told Fox News the newly submitted emails from Blumenthal show a “significant gap” in the record.
Blumenthal’s role in sending the near-monthly missives emerged when nearly 350 pages of emails about the 2012 attacks on the U.S. diplomatic post in Benghazi were publicly released last month.
Fox News learned that Blumenthal’s attorney handed over 60 emails, totaling nearly 180 pages.
Those documents, though, were never made available by the State Department.
It was unclear whether the State Department withheld them, or whether they were never provided by Hillary Clinton to the department for review.
“Clearly, the committee should have gotten this information sooner,” Gowdy told reporters before the session.
Fox News was told the documents show Blumenthal providing policy advice to Clinton on Libya, and acting as a de facto intelligence operative for her, especially in 2011 before Libyan dictator Muammar Qaddafi was forced from office and killed.
However, committee Democrats called the delay understandable after Gowdy and majority Republicans expanded the panel’s scope from a probe of the September 2012 attacks that killed four Americans, including the U.S. ambassador, to a broader examination of U.S. policy toward Libya.
Democrats cited a May 29 letter from Gowdy to Blumenthal seeking “any and all documents and communications” sent to or received by Blumenthal related to Libya, “but not limited to Benghazi and Tripoli.” The letter also asks for information on weapons found in, imported to or removed from Libya. Gowdy made similar, broad requests in a March subpoena issued to the State Department.
Blumenthal’s testimony came days after Clinton formally kicked off her presidential campaign on Saturday.
State Department spokesman Alec Gerlach said the department has worked to make public all emails received from Clinton.
“Secretary (John) Kerry has been clear that the State Department will be both transparent and thorough in its obligations to the public on this matter,” Gerlach said.
However, Gowdy told Megyn Kelly that Kerry has not yet handed over the documents that the committee has requested from the State Department. Gowdy says that he wants those emails before he can arrange a time for Clinton to appear in front of the committee.
“I don’t have a police force, I can’t send somebody over to the State Department to seize these documents,” Gowdy said. “[Kerry] is the one person standing between me and Secretary Clinton having our, as she put it, “single conversation.'”
Fox News’ Catherine Herridge and The Associated Press contributed to this report.”
“THE DEEP WEB, THE DARK WEB, AND MEMEX
February 12, 2015
The Deep Web and Dark Web garnered global attention again this week, with DARPA announcing Memex. “Memex seeks to develop the next generation of search technologies and revolutionize the discovery, organization and presentation of search results.” In sum, Memex is a search technology that searches the Deep Web and Dark Web, as well as provides a variety of analyses among and between search results.
As discussed in the first part of this blog post, the Deep Web is:
“[t]he portion of the Web that is not theoretically indexable through the use of “spidering” technology, because other Web pages do not link to it.” The Deep Web includes academic library databases, proprietary databases, results of database queries, and form- and/or password-controlled access databases. Thomson Reuters’s Westlaw is an example of data that is available on the Deep Web – that is, reachable via a common web browser, but additionally requiring password-only, search query access for most of its core content.
The Dark Web is generally defined as a small subset of the Deep Web: like the Deep Web it can be only accessed using specialized tools or interfaces. Unlike the rest of the Deep Web, the Dark Web is not accessible via a common Surface Web web browser such as Chrome or Internet Explorer, but must be accessed using a specialized anonymized browser such as Tor. Using Tor (the only Dark Web browser used by the author in preparation of this post), the “hidden services” at assigned .onion domains within the Dark Web can be accessed without disclosing a user’s IP address, thus concealing a user’s network identity and location.
It is well-publicized that criminal elements use Tor; however, lesser-known is that a “branch of the U.S. Navy uses Tor for open source intelligence gathering” and other uses, and “law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations. “In addition to the criminal and military/law enforcement uses of Tor, the users within that community include business executives, journalists and their audiences, activists and whistleblowers, IT professionals, bloggers, and “normal people”. All of these groups undoubtedly do more while in Tor than work, or buy and sell illegal goods and services. Many “normal” Internet users are simply seeking additional anonymity to escape the privacy-invasive commercial browsers and search engines, and Tor accordingly has a subset of the surface web users who may be attracted to conducting increasing amounts of their Surface Web activities while within the Tor environment.
There is a massive amount of data in all forms (e.g. text, videos, music, photographs, etc.) on the Dark Web that is not, due to anonymity demands, generally available on the “Surface Web” or even the upper level of the Deep Web. For example, the Dark Web includes the following:
bank account details, passwords, so-called “personally identifiable information” (PII) such as social security numbers, customer credit card details, patents, blueprints and other trade secrets, are all for sale. The Dark Web is used extensively by hackers, who break into company networks and search for this kind of potentially valuable information. . .extract the data, break it up into smaller bundles, and sell it to black market [Deep Web] vendors.
In addition, the Dark Web holds a significant amount of information that is relevant to business intelligence (including trade secrets), trademark, copyrights, and patents. This content is discussed in more detail in the 2015 edition of my treatise, Intellectual Property Due Diligence in Corporate Transactions.
My next blog will outline some of the more pertinent trademark issues arising out of use in the Deep Web and Dark Web, particularly in light of Memex.
– See more at: http://blog.legalsolutions.thomsonreuters.com/law-and-techology/the-deep-web-the-dark-web-and-memex/#sthash.BNzBGcK5.dpuf”
“Behind the Sordid World of Online Assassination Betting
I have heard rumors about this website, but I still cannot quite believe that it exists. I am looking at what I think is a hit list.
There are photographs of people I recognize—prominent politicians, mostly—and, next to each, an amount of money. The site’s creator, who uses the pseudonym Kuwabatake Sanjuro, thinks that if you could pay to have someone murdered with no chance—I mean absolutely zero chance—of being caught, you would.
That’s one of the reasons why he has created the Assassination Market.
There are four simple instructions listed on its front page:
Add a name to the list
Add money to the pot in the person’s name
Predict when that person will die
Correct predictions get the pot
The Assassination Market can’t be found with a Google search. It sits on a hidden, encrypted part of the internet that, until recently, could only be accessed with a browser called The Onion Router, or Tor. Tor began life as a U.S. Naval Research Laboratory project, but today exists as a not-for-profit organization, partly funded by the U.S. government and various civil liberties groups, allowing millions of people around the world to browse the internet anonymously and securely.”
“Benghazi: The CIA “Annex” and the Main Compound
Posted on November 1, 2012 | 2 Comments
On September the 11th 2012, Ambassador Stevens is attacked at the Main Compound of the U.S. Consulate in Benghazi, Libya. At this time, former SEALs Glen Doherty and Tyrone S. Woods, both working under the State Department (on contract to the CIA), were at the CIA “annex,” a second compound 1.2 miles away.
Tyrone Woods was providing security for CIA operatives at the “annex.” Glen Dougherty had arrived on a rescue flight dispatched by the CIA Chief of Station in Tripoli.
Both were denied permission by their CIA chain of command on the ground to go to the aid of Ambassador Stevens and the others at the main compound. Two times the former SEALs were told to “stand down.”
But the two former SEALs went anyway to the Main Compound, AGAINST ORDERS. And they RESCUED those who remained there.
Nobody is able to find the Ambassador.
The annex is about two kilometers away. My agents pile into an armored vehicle with the body of Sean, and they exit the main gate.
— Background Conference Call With Senior State Department Officials
They took the body of Information Management Officer Sean Smith, who had been killed. Glen Doherty and Tyrone S. Woods saved everyone that was still alive at the Main Compound. It took them three hours. And then they went back with all of them to the CIA Annex building, where they came from.
The attack continued. In fact, it had never stopped. The crew was fired upon during the entire ride running the gauntlet through the streets, from the Main Compound back to the CIA annex. They arrived back at about midnight.
Once at the annex, the annex has its own security – a security force there. There are people at the annex. The guys in the car join the defense at the annex. They take up firing positions on the roof – some of them do – and other firing positions around the annex. The annex is, at this time, also taking fire and does take fire intermittently, on and off, for the next several hours. The fire consists of AK-47s but also RPGs [rocket-propelled grenades], and it’s, at times, quite intense.
— Background Conference Call With Senior State Department Officials
Tyrone Woods was on the roof manning a heavy machine gun while bullets, grenades and even mortars were being fired on them.
They were taking fire, but there were no communication problems at the CIA annex. The ex-SEALs were in constant radio contact with their headquarters.
At that point they requested military backup again, at least to silence the mortar fire that they had been able to identify by laser “painting” it. And a THIRD time were denied.
This CIA annex was a very high value target. It contained a LOT of cash for the Benghazi Gun Running, as well as weapons, and a case files containing the names of the folks who were assisting the US diplomatic mission in this regard.
The fighting at the CIA annex went on for more than 4 hours.
Keep in mind, the Sigonella Naval Air base in Italy is only 480 miles away. Back up could have gotten over Benghazi in due time.
A Spectre AC-130 gunship carrying commandos could have been there in less than two hours. Such a gunship with a Gatling gun in the side is unbelievably lethal. It’s a tornado of steal blazing with devastating power and pinpoint accuracy.
Two Tier-One Special Operations groups were at Sigonella, including Delta Force, which happened to be training in Europe.
Delta Force’s primary tasks are counter-terrorism, direct action, and national intervention operations, although it is an extremely versatile group capable of conducting many types of covert missions, including, but not limited to, hostage rescues and raids.
No less than two drones were overhead during the attack and one of those drones was actually ordered in from Tripoli and sending back images in real time. At one point, one drone probably was replaced by the other, “maybe it ran out of fuel and the second one came in and took its place,” speculates Clare Lopez.
This raging battle at the CIA annex was sent on video directly to the ‘Situation Room’ at the White House. There WAS “real-time information,” despite what Secretary of Defense Leon Panetta said. We need to understand that that’s WHAT THE MILITARY DOES, everywhere around the world, on land or on a ship. Wherever it may be, they practice over and over again, repeatedly, the rescue of civilians and the rescue of embassy personnel, in each area wherever it is that they’re posted. They have drills, they have plans, they have practice situations, and they have role players that play the part of the bad guys.
In addition to Delta Force in Sicily, there were also guys on ships right off the coast of Libya when it happened. There were loads of assets, and every one of them had practiced repeatedly a scenario just like Banghazi. Not Benghazi per say, but a rescue situation where an American mission is under attack.
We know that at 5 pm eastern time (about an hour and a half into the attack of the Main Compound), President Obama met with Vice President Biden and Secretary of Defense Panetta in the White House for over an hour. Obama watched in real time the attack from a drone-cam. Then, at some point later, President Obama went to bed. He had that fund raising trip in Las Vegas the next day. He slept, he got up the next day and he skips his National Security briefing. Yet again.
somewhere around 4 o’clock in the morning the annex takes mortar fire. It is precise and some of the mortar fire lands on the roof of the annex. It immediately killed two security personnel that are there, severely wounds one of the agents that’s come from the compound.
— Background Conference Call With Senior State Department Officials
Both ex SEALs died, the terrorists got to keep all of the arms and cash of the CIA “annex.”
Ansar al-Shariah took credit for the attack.”
“Mike Aymong: Rebuilding World Gaming, (fka Starnet)
24 September 2001
Michael Aymong likes to talk about milestones, and quarterly goals. Since he took over as chief executive of Starnet Communications International, now World Gaming plc, on April 9, three achievements can be described as milestones in the company’s history, and he’s got very specific goals for the coming quarters.
Aymong, 36, previously served as executive vice president of marketing, sales and customer service at GT Group Telecom, a publicly traded Canadian provider of telecommunications services. Before that, he held executive positions at MetroNet Communications and Telus Advanced Communications.
The first milestone came on May 29, when the old Starnet officially became World Gaming, still a public company but incorporated in the United Kingdom rather than in Delaware. The stock is registered with the Securities and Exchange Commission as American Depositary Receipts, which are negotiable U.S. securities representing a non-U.S. company’s equity.
Prices are quoted in U.S. dollars, and the stock is still listed on NASDAQ’s over-the-counter market, under the new symbol WGMGY.
The transition to a UK corporation had been in the works since well before Aymong’s arrival. The change was announced in October, but seemed to take forever for shareholders to approve.
The company said at the time that “the United Kingdom provides us a more stable and predictable business and financial environment.” It also said that the UK was a friendlier place for a company in the online gaming business, and that the move would accelerate expansion into Europe and Asia.
Aymong said the transition took a long time because it was “a complex, arduous deal.” It cost the company about $800,000 in legal, banking and other fees, he said.
Late in August, World Gaming followed up by announcing that its corporate headquarters had relocated to London. Since August 1999, Starnet/World Gaming has move its home base twice: from Vancouver, British Columbia, to St. John’s, Antigua, and now, to London.
The second milestone was settlement of shareholder suits that had arisen in the aftermath of the disastrous Aug. 20, 1999, raid on Starnet’s headquarters, which at the time was in Vancouver. Royal Canadian Mounted Police and local police agencies hauled away thousands of documents and 75 or 80 computers, saying they were looking into possible violations of laws against pornography and gambling.
The raid began on a Friday morning, and as the news spread, the company’s stock price tanked. In one day, it lost 69 percent of its value, closing at $4.06. For much of 1999, Starnet had been a high-flyer among tech stocks. Its shares traded at an all-time high of $29 on July 6 of that year.
A rash of shareholder lawsuits followed the raid, with allegations that Starnet had issued misleading statements about its business and concealed potential liabilities. Some shareholders also alleged that insiders at Starnet had unfairly profited by selling stock when the price was high and when they had access to adverse information.”
“Sex, Bets And Bikers
BY MARK HOSENBALL 10/17/99 AT 8:00 PM
FILED UNDER: News
The raid was swift, and thorough. As dawn broke over one of Vancouver’s seedier business districts last Aug. 20, a heavily armed team of law-enforcement agents smashed into the offices of Starnet Communications International, a four-year-old company that runs gambling and pornography sites on the Internet. Over the next three days authorities sifted through the company’s files, hauling away boxes of papers and cartloads of computer equipment. The raid was the culmination of an 18-month probe of Starnet’s operation, which authorities have described as “substantially and fundamentally an illegal enterprise.” According to documents filed in Canadian courts in connection with the search warrant, Vancouver law-enforcement agencies claimed that the company routinely engaged in illegal gambling, distribution of hardcore pornography and money laundering, all using the Internet.
The raid on Starnet was big news in Vancouver, where the company had been heralded as an Internet success story. The company’s stock, which is publicly traded on the U.S. over-the-counter market, was a hot buy, soaring from 37.5 cents last November to $29 last July. At its peak, Starnet’s paper value neared $900 million. Now, with some of the company’s bank accounts frozen, the stock has plunged to the single digits. Starnet vigorously denies the allegations of any illegal activity. “Bogus,” says the company’s lawyer. The company notes that police have not brought any formal charges against Starnet or anyone connected with the company. But law-enforcement agents clearly hope to make an example of Starnet, one of the first targets in a new battle against online crime.
Ken Lelek didn’t start out to be an Internet pioneer. Back in the early ’90s Lelek and a friend, Lloyd Robinson, ran an agency booking strippers for nightclubs. Lelek and some other friends, including Paul Giles, realized there was money to be made selling sex on the Internet. Pooling their money with other investors, they launched Starnet. (Lelek, through his lawyer, now insists his role in the company was always limited and he no longer has anything to do with it–a claim the police dispute.) The company’s Web sites, which now include Sizzle.com, Chisel.com and Redlight.com, featured live strip shows and all manner of hardcore pornography. The company boasts it has porn customers in more than 60 countries. By 1997 the company had branched out to another lucrative online enterprise: gambling. Online customers could enter the cybercasino and play blackjack or craps, or put down wagers on college and professional sports. The company enlisted sports celebrities, including former heavyweight-boxing champion Larry Holmes, to endorse its gambling sites. Profits soared. Starnet’s revenues for fiscal 1999 totaled $9.7 million. The company’s stock was selling so well that Starnet applied for permission to trade on the prestigious Nasdaq market. In 1998 a “Nightline” broadcast about online businesses hailed Starnet as a “reputable pioneer of Internet gambling.””
“Robert Pickton supports Harper… conclusion: Harper kills prostitutes”
Posted by: some guy | Thursday, January 25, 2007 at 02:26 PM
This is a typical Liberal foot soldier. Let’s look at who Robert Pickton probably did support. “The brothers also ran a supposed charity, the Piggy Palace Good Times Society, registered with the Canadian government in 1996 as a non-profit society intended to “organize, co-ordinate, manage and operate special events, functions, dances, shows and exhibitions on behalf of service organizations, sports organizations and other worthy groups.” According to Hiscox, the “special events” convened at Piggy Palace–a converted building at the hog farm–were drunken raves that featured “entertainment” by an ever-changing cast of Downtown Eastside prostitutes.” From>
http://www.crimelibrary.com/serial_killers/predators/robert_pickton/6.html I would not be shocked to learn that Robert Pickton acquired charity status for the Piggy Palace Good Times Society through contributions to Jean Chretien’s government. I rather believe he was a Liberal supporter.””
“Digital Fires Instructor Serco – Camp Pendleton, CA Posted 377 days ago Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action. ..
• Knowledge on the operational employment and TTPs of the following C2 systems and software applications in the COC ..
•Travel may be required.
• Have attended DoD formal instructor courses, such as the Marine Corps’ Formal School’s Instructor’s Course, or service equivalent
• Four years of documented experience instructing and employing their respective C2 system in support of MAGTF operations
• Background as an 0844 or 0848 MOS (USMC MOS, or equivalent USA MOS appropriate), with formal training and experience utilizing AFATDS (Advanced Field Artillery Target Data System), EMT (Effects Management Tool), PSS-SOF (Precision Strike Suite – Special Ops Forces)
• Active Secret Clearance or the ability to obtain a Secret clearance is required.
• Formal AFATDS Training required, Strike-Link, PSS-SOF, JADOCS experience desirable”
Serco farewell to NPL after 19 years of innovation 8 January 2015 ..
During that period under Serco’s management and leadership.. .. NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency [spread bet and spot fixed] trading in the City through NPLTime.”
“[Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994.This file was obtained from the [Clinton] Secretary of State and has a file number of 1795583].. Conducts IT Security and Risk Assessment in Federal government as well as security testing, implementing security for multiple platforms and operating systems [onion router] around the world … Develops, implements and supports Information Security Counter measures such as honey-pots and evidence [snuff film] logging and incident documentation processes and solutions.”
“The 8(a) Business Development Program assists in the development of small businesses owned and operated by individuals who are socially and economically disadvantaged, such as women and minorities. The following ethnic groups are classified as eligible: Black Americans; Hispanic Americans; Native Americans (American Indians, Eskimos, Aleuts, or Native Hawaiians); Asian Pacific Americans (persons with origins from Burma, Thailand, Malaysia, Indonesia, Singapore, Brunei, Japan, China (including Hong Kong), Taiwan, Laos, Cambodia (Kampuchea), Vietnam, Korea, The Philippines, U.S. Trust Territory of the Pacific Islands (Republic of Palau), Republic of the Marshall Islands, Federated States of Micronesia, the Commonwealth of the Northern Mariana Islands, Guam, Samoa, Macao, Fiji, Tonga, Kiribati, Tuvalu, or Nauru); Subcontinent Asian Americans (persons with origins from India, Pakistan, Bangladesh, Sri Lanka, Bhutan, the Maldives Islands or Nepal). In 2011, the SBA, along with the FBI and the IRS, uncovered a massive scheme to defraud this program. Civilian employees of the U.S. Army Corps of Engineers, working in concert with an employee of Alaska Native Corporation Eyak Technology LLC allegedly submitted fraudulent bills to the program, totaling over 20 million dollars, and kept the money for their own use. It also alleged that the group planned to steer a further 780 million dollars towards their favored contractor.”
“The following positions have the status of [Obama] Cabinet-rank: .. Small Business Administration Administrator [of 8(a) Tor stand down, spot fix and Serco digital fires network] Maria Contreras-Sweet sba.gov“
“Serco’s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco [and its drug hub banker HSBC] mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals.”
“Onion routing network for securely moving data through communication networks US 6266704 B1
The onion routing network is used to protect Internet initiators and responders against both eavesdropping and traffic analysis from other users of the Internet. In the onion routing of the invention, instead of making connections directly to a responding machine, users make connections through onion routers. The onion routing network allows the connection between the initiator and responder to remain anonymous. Anonymous connections hide who is connected to whom and for what purpose from outside eavesdroppers.”
“Base One Technologies .. Clients Banking, Finance and Insurance Oversee the integration of two separate networks, as well as business office operations Key participant in network architecture design for a network handling real time stock/bond trading world-wide. Provide interactive access to equity markets in the Americas, Europe, Asia, Middle East & Africa Engineer/implement architecture for client inter-entity links; Develop overall technical solutions including network components, physical and logical topologies, routing policies and disaster recovery schemes; Design ISDN solution for client network and provide contingency planning and disaster recovery design strategies …. Authored the IGRP to EIGRP plan for Data Highway which consist of over 1000 routers. .. Designed, deployed network architecture and disaster recovery solutions [on the onion router] that withstood 9/11/01 disaster without a single transaction failure despite carrier failure ..Design, implement,provision, procure new network solutions and fault tolerant architecture, architect contingency plan, site relocation cost analysis, Network Impact analysis, WAN bandwidth cost analysis, strategic business analysis, global project planning,enterprise router architecture; Consolidate and merge various technologies and equipment – routers,switches, Gigabit Ethernet,token ring,layer2 & 3 switching, IGRP, OSPF, BGP, (HRSP),DECnet Phase III & IV routing,DECnet, LAT bridging, SNA, DLSW+, SRB,SDLC Tunneling, Frame Relay, X.25, ISDN, ATM, VLAN, Point to Point Transport, SNMP, VAX, HP UNIX, EMS, VTAM”
“Corporate Diversity We are a Government Certified Women-Owned Business We practice Diversity Recruitment and Staffing for IT positions Base One was founded in 1994 by a women engineer who had made a career in technology research for many years. Base One has been very successful in focusing on diversity recruiting and staffing for IT projects. It has been our experience that the greater the diversity mix, the more creative the solution. As in any field the more diverse the viewpoint the more thorough your analysis. Our engineers can think out of the box. Because of our affiliations we have access to pools of resources among more diverse groups & individuals. We work with a large pool of minority professionals who specialize in IT skills. We are able to have access to these resources through our status as a D/MWBD firm and our affiliations. These affiliations assist us in working with resources among more diverse groups & individuals. We are also partnered with firms that are 8A certified as Minority firms, Disabled Veteran firms [such as Metris the coordinator of Jade Helm, see below], Native American firms, Vietnam veteran firms, women owned firms.”
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation