#2387: Marine Brief – Pinkerton Clinton Crisis Actors – Serco’s 8(a) Spot-Fixed Killers – FBI Onion Router Breach
1. In 1994, Pinkerton began offering a crisis actors’ service to Hillary Clinton in support of emergency response exercises, allegedly used in the bombing of the Murrah Building in Oklahoma City of April 19, 1995 and in the continuity of government exercises on 9/11.
2. In 1994, Clinton outsourced the operation of the National Visa Center to Serco which was thereby able to place unlawful aliens in women-owned 8(a) companies to be trained in spot-fixing times for the precision attacks associated with online assassination betting.
3. Clinton – former patent lawyer with Rose Law – arranged for the U.S. Navy to outsource patented onion-router (Tor) operations to Serco’s Maureen Baginsky who established the FBI directorate for domestic intelligence and allegedly breached FBI personnel files so that first responders at crime scenes would ensure Miss Pinkerton’s cases stayed cold.
Readers are invited to browse Abel Danger‘s website where United States Marine Field McConnell has proof by contradiction – no rebuttal or action for libel – of a conspiracy between Pinkerton and Clinton agents with Serco 8(a) women-owned spot-fixing companies to develop scripts for online assassination betting and the global removal of obstacles to the Clinton presidential election campaign.
“Serco Executive Maureen Baginski Receives FBI Intelligence Analysts Association Award
RESTON, VIRGINIA – May 2, 2011 – Serco Inc., a provider of professional, technology, and management services to the federal government, is proud to announce that Maureen Baginski, Vice President of Serco’s Intelligence Services, received the FBI Intelligence Analysts Association (IAA) Award. The first annual event and ceremony was held on April 12 in Washington, DC.
Ms. Baginski was recognized for her work from 2003 to 2005, when she served as the FBI’s Executive Assistant Director for Intelligence. In that position, she was responsible for establishing and managing the FBI’s first-ever intelligence program. She adapted FBI intelligence capabilities with information technologies to create an intelligence-sharing operation that could identify threats before they became attacks.
During the awards ceremony, James Mackey, a former FBI supervisory intelligence analyst, had these words to say about Ms. Baginski, “Ladies and gentlemen, this person, Maureen Baginski immediately established credibility through hard work the old fashioned way. She became one of the Director’s tugboats, and again, through hard work…she established the FBI directorate for domestic intelligence and brought about fundamental change in the FBI, not only for you, but for the American people.”
Prior to her role with the FBI, Ms. Baginski served at the National Security Agency (NSA) for 23 years, where she held a variety of positions, including Signals Intelligence (SIGINT) Director, Senior Operations Officer in the National Security Operations Center; Executive Assistant to the Director of NSA/Central Security Service, Chief Officer of the Director; Assistant Deputy Director of Technology and Systems; and lead analyst for the Soviet Union. As SIGINT Director, Ms. Baginski successfully established and directed a unified program to exploit encrypted or denied information on global networks. Leading the NSA’s Signals Intelligence Directorate, the Nation’s high technology cryptology organization, she managed a complex and geographically dispersed distributed information production enterprise.
“We are truly proud of Maureen and this great honor she received. She has brought to Serco the same can-do attitude she exuded while working for the FBI and she continues to lead her team here at Serco with pride and respect,” said Ed Casey, Chairman and Chief Executive Officer at Serco.
Ms. Baginski is also the recipient of two Presidential Rank Awards, two Director of Central Intelligence National Achievement Medals, the Director of Military Intelligence’s Leadership Award, and NSA’s Exceptional Civilian Service Award. She holds BA and MA degrees in Slavic Languages and Linguistics from the University of Albany. In December 2005, she received an honorary Doctorate of Humane Letters from the University of Albany for her service to the nation.
About Serco Inc.: Serco Inc. is a leading provider of professional, technology, and management services focused on the federal government. We advise, design, integrate, and deliver solutions that transform how clients achieve their missions. Our customer-first approach, robust portfolio of services, and global experience enable us to respond with solutions that achieve outcomes with value. Headquartered in Reston, Virginia, Serco Inc. has approximately 11,000 employees, annual revenue of $1.5 billion, and is ranked in the Top 30 of the largest Federal Prime Contractors by Washington Technology. Serco Inc. is a wholly-owned subsidiary of Serco Group plc, a $6.6 billion international business that helps transform government and public services around the world. More information about Serco Inc. can be found at www.serco-na.com.”
“Crisis Management & Emergency Services
Whether you need assistance in crisis management planning, or you need boots on the ground overnight and overseas due to a disaster, you can rely on Pinkerton’s global network to respond whenever and wherever you need immediate crisis management.
HOW WILL YOU KEEP YOUR BUSINESS RUNNING?
According to a University of Texas study, when disaster strikes:
only 6% of companies suffering from a catastrophic loss will survive
43% never reopen their businesses
51% percent close within two years
It is crucial to team up with a crisis management firm that is experienced, reliable and responsive – three key characteristics you’ll find with Pinkerton.
Safeguarding Your Business Interests Around the World
Whether you’re dealing with an employee walkout in Springfield or an earthquake near your factory in Ecuador, we have the ability to get our emergency services response team to nearly any location on short notice. Your local Pinkerton office will become your emergency management agency, as we quickly engage our global network of specialists for your needs.
Offering Reliable, Scalable Solutions that Protect Your Interests Pinkerton can easily adjust the magnitude of our response, expanding or contracting as your situation warrants. Learn more about each of our Crisis Management and Emergency Services:
– See more at: http://www.pinkerton.com/crisis-management#sthash.u9DUJhFJ.dpuf”
“Over 160 years of innovation: From Protecting Mid-Western Railways to Providing Corporate Risk Management to Clients Across the Globe
without the client’s pre-knowledge
arrest the culprits
hired to prevent looting after the Great Fire in Chicago
Allan Pinkerton, the agency is taken over by his two sons, Robert and William
Pinkerton’s National Detective Agency had 2,000 active agents and 30,000 reserves causing the state of Ohio to outlaw the agency, due to the possibility of it being hired out as a “private army” or militia
inherited by Allan Pinkerton II, the grandson of the founder
armed agents are called upon to escort the priceless painting, Mona Lisa, painted by the Italian artist, Leonardo da Vinci, safely across the Atlantic
‘PINKERTON’S’ was registered March 3, 1970
acquired by Securitas AB, the largest security services provider in the world. (Simultaneously, Securitas also acquired the Burns Detective agency.)
its 150 years of service. In May, to commemorate the occasion, it donated a vast archive of material (over 100 boxes estimated valued at $1m) to the Library of Congress in Washington, D.C.
that the Library of Congress considers our archives to be of historical significance and are proud to share the details of our organization’s past with
313 agents to assist clients in the aftermath of hurricanes Katrina, Rita, Wilma and Sandy
an exclusive network of vast and reliable global resources
– See more at: http://www.pinkerton.com/history#sthash.3H0kVfqf.dpuf”
“Securitas Security Services USA Adds 6,829 Military Veterans To Its Employee Base In 2014 PARSIPPANY, N.J., Feb. 10, 2015 /PRNewswire/ — As a member of the 100,000 Jobs Mission, Securitas USA is proud to announce that it has added 6,829 veterans to its employee base in 2014. The 100,000 Jobs Mission began four years ago and its coalition members committed to hire 100,000 veterans; it has more than doubled that goal by helping more than 217,000 veterans find meaningful work in the private sector. The Mission has now set a new goal of hiring 300,000 U.S. military veterans. And SecuritasUSA is looking forward to helping to support that goal. “For Securitas USA, this initiative is important since we provide security services to all types of businesses and organizations throughout the U.S. and we value hiring veterans because of their leadership skills, teamwork, problem solving and performance orientation that they bring to their positions,” commented Rocco L. DeFelice, Executive Vice President.
Headquartered in Parsippany, NJ, Securitas Security Services USA, Inc. and its affiliates offer security solutions, including on-site security officers, mobile patrol, remote security monitoring and corporate risk management. For more information, visit: www.securitasinc.com SOURCE Securitas Security Services USA, Inc.”
“Hackers got FBI files as part of OPM breach
By Cory Bennett – 06/25/15 08:12 AM EDT
Suspected Chinese hackers breached FBI agents’ personnel files as part of the broader attack on the federal government that has laid bare millions of people’s data, Newsweek reported.
Putting FBI agents’ data at risk could have national security implications; many investigate domestic terrorist plots and foreign spies.
It’s still unclear exactly whose information has been pilfered following a massive digital siege on the Office of Personnel Management.
Initially, the OPM said a hack had exposed 4.2 million current and former executive branch employees.
A week later, the personnel agency revealed a second breach of a security clearance database that contained the background check files of millions of military and intelligence community. The FBI is part of the intelligence community.
A widely reported estimate that 18 million people were affected by the second intrusion was disputed by OPM Director Katherine Archuleta on Thursday, who said that number could rise even higher.
It’s not clear whether the reported FBI infiltration was part of the first or second breach. As an intelligence community agency, it would make sense it was part of the larger hack.
But an unnamed FBI source told Newsweek the OPM notified him in May that his personnel file had been compromised, which was before the agency had started sending notices about the second breach.
The FBI has more than 35,000 employees.
The ramifications of those employees’ info getting out could be “mind boggling,” the source told Newsweek, “because there are counterintelligence implications, national security implications.”
“Securitas [Pinkerton parent] Critical Infrastructure Services
As one of the largest providers of specialized security, fire and emergency response services in the U.S., Securitas Critical Infrastructure Services, Inc. (SCIS) meets federal government security requirements in the aerospace/defense, energy, and petrochemical industries.
With over 12,000 security and fire personnel, SCIS maintains corporate level national agreements with some of the largest aerospace/defense, energy, and petrochemical companies, and directly contracts with the Federal government. SCIS operates under a proxy agreement with the U.S. Government and has been approved by the Defense Security Service (DSS), Department of Energy (DOE), and all other government agencies to retain security clearances and operate contracts requiring security clearances.
Federal Government Services Division
Paragon Systems Inc. is the division dedicated to directly supporting the Federal government. With over 6,000 employees deployed at U.S. Government facilities from Maine to California and Guam, its staff of professional security officers are highly vetted, trained and supervised. These officers possess clearances from a suitability assessment to the highest levels of trust available in order to complete their security tasks for federal agencies such as DHS, DoD, DoJ, DoT, NASA, and USDA.
Aerospace/Defense Services Division
The Aerospace/Defense Services Division is uniquely positioned to provide world class uniformed security services for the aerospace/defense industry. SCIS is an industry leader in securing highly sensitive controlled facilities on a national, regional and local basis. Having been selected as the national security provider for many of the top Department of Defense, aerospace and intelligence contractors in the U.S., SCIS is qualified to provide “cleared protective services” to classified facilities.
SCIS leads the industry by providing specialized security solutions such as: lock and key services; canine bomb detection; security console operations; project management; facility assessments; government compliance; and, satellite launch support.
Energy Services Division
SCIS Energy Services Division provides specialized protective services for owners and operators of nuclear power, nuclear fuel storage and energy facilities. Since 1968, SCIS and its predecessor companies have successfully developed an experienced management team that is knowledgeable and adheres to the stringent federal regulatory environment to keep pace with its dynamic requirements. Using this expertise, we are able to provide both armed and unarmed permanent security and augmentation services personnel along with the necessary administrative, managerial, operational and logistical support to the energy industry anywhere in the U.S.
Petrochemical Services Division
The SCIS Petrochemical Services Division provides security services to the oil, natural gas (ONG) and chemical industries. With over 2,600 specially trained Security Officers and industry experts, SCIS works with our clients to provide the personnel and technological resources required to accomplish security’s evolving missions. As a global leader in security, SCIS has the resources to meet the needs of our clients during turnarounds, natural disasters and other business. Together with environmental, health and safety regulations, security is becoming a major regulatory area and, in the ONG and chemical sectors, regulatory compliance is critical.”
“EXCLUSIVE: CIA operators were denied request for help during Benghazi attack, sources say
By Jennifer Griffin
Published October 26, 2012
Fox News has learned from sources who were on the ground in Benghazi that an urgent request from the CIA annex for military back-up during the attack on the U.S. consulate and subsequent attack several hours later on the annex itself was denied by the CIA chain of command — who also told the CIA operators twice to “stand down” rather than help the ambassador’s team when shots were heard at approximately 9:40 p.m. in Benghazi on Sept. 11.
Former Navy SEAL Tyrone Woods was part of a small team who was at the CIA annex about a mile from the U.S. consulate where Ambassador Chris Stevens and his team came under attack. When he and others heard the shots fired, they informed their higher-ups at the annex to tell them what they were hearing and requested permission to go to the consulate and help out. They were told to “stand down,” according to sources familiar with the exchange. Soon after, they were again told to “stand down.”
Woods and at least two others ignored those orders and made their way to the consulate which at that point was on fire. Shots were exchanged. The rescue team from the CIA annex evacuated those who remained at the consulate and Sean Smith, who had been killed in the initial attack. They could not find the ambassador and returned to the CIA annex at about midnight.
At that point, they called again for military support and help because they were taking fire at the CIA safe house, or annex. The request was denied. There were no communications problems at the annex, according those present at the compound. The team was in constant radio contact with their headquarters. In fact, at least one member of the team was on the roof of the annex manning a heavy machine gun when mortars were fired at the CIA compound. The security officer had a laser on the target that was firing and repeatedly requested back-up support from a Spectre gunship, which is commonly used by U.S. Special Operations forces to provide support to Special Operations teams on the ground involved in intense firefights.
CIA spokeswoman Jennifer Youngblood, though, denied the claims that requests for support were turned down.
“We can say with confidence that the Agency reacted quickly to aid our colleagues during that terrible evening in Benghazi,” she said. “Moreover, no one at any level in the CIA told anybody not to help those in need; claims to the contrary are simply inaccurate. In fact, it is important to remember how many lives were saved by courageous Americans who put their own safety at risk that night-and that some of those selfless Americans gave their lives in the effort to rescue their comrades.”
“Hillary Clinton’s Personal Server Hacked by Chinese Hackers?
Saturday, March 7, 2015 22:43
(Before It’s News)
Hillary Clinton’s Personal Server Hacked by Chinese Hackers?
By Dr. Bob Uda, PhD, CM, CHSP, ILO
March 7, 2015
Red China has Hillary Clinton’s damning emails regarding the Benghazi terrorist attack; receiving donations from Arabic, Muslim, and Islamic nations; husband Bill’s dealings with pedophilia, among numerous others things. It is also suspected that other nations such as Russia, Iran, North Korea, Cuba, Syria, Libya, and Venezuela may have also hacked into the Clinton server located in the basement of her home.
Additionally, civilian hackers in the United States who have hacked into Hillary’s server already have some of the damning emails and will use them to blackmail Hillary during the presidential campaign and thereafter.
This situation has placed the United States in a very precarious position. Remember, the National Security Agency (NSA) has surreptitiously tapped into the cell phones, computers, and emails of many foreign leaders such as German Chancellor Angela Merkel. The NSA also has all of the damning emails from Hillary Clinton and will divulge them to the American people very soon. This is why it would be dangerous for the Democrats to nominate Hillary Clinton as their standard bearer for the 2016 election.
If you believe this article, I have a used server from Hillary Clinton to sell you. However, even though this is a hypothetical story, it is not far-fetched from probably being the truth. If it turns out to be the truth, then it is highly probable that Hillary, should she become president of the United States (POTUS), could be blackmailed in the future by terrorists or rogue nations such as Iran and North Korea. Do you wonder why the Obama administration is working hard to establish diplomatic relations and treaties with Iran, Cuba, and Egypt? Think about all of the possible scenarios.
Do not be surprised if the Clinton home in Chappaqua, New York, burns down to the ground in the near future. Remember, if “Tricky” Dick Nixon had destroyed the White House tapes, he may have served out his second term. All of these shenanigans would not have occurred because the course of history would have taken a better direction than it is heading today.
The chickens have finally come home to roost. Hillary has dodged bullets in the Whitewater scandal, the Vince Foster suicide, travel-gate, investing $1,000 in cattle futures and making $100,000 (insider trading), and FBI personal files on Republican enemies. This alleged federal offense will be a hard bullet to dodge especially since the bullet is armor piercing.”
“Behind the Sordid World of Online Assassination Betting
Filed to: BIBLIOTECH 6/01/15 11:35am
Give Me Liberty or Give Me Death
It was in this heady atmosphere that the radical libertarian Jim Bell first took the promise of online anonymity to a terrifying conclusion. In late 1992, a group of radical libertarians from California called the “cypherpunks” set up an email list to propose and discuss how cyberspace could be used to guarantee personal liberty, privacy, and anonymity. Bell, a contributor to the list, believed that if citizens could use the internet to send secret encrypted messages and trade using untraceable currencies, it would be possible to create a functioning market for almost anything. In 1995, he set out his ideas in an essay called “Assassination Politics,” which he posted to the email list. It made even the staunchly libertarian cypherpunks wince.
Bell proposed that an organization be set up that would ask citizens to make anonymous digital cash donations to the prize pool of a public figure. The organization would award the prize to whoever correctly predicted that person’s death. This, argued Bell, wasn’t illegal, it was just a type of gambling. But here’s the ruse: if enough people were sufficiently angry with a particular individual—each anonymously contributing just a few dollars—the prize pool would become so large that someone would be incentivized to make a prediction and then fulfill it themselves in order to take the pot.
This is where encrypted messages and untraceable payment systems come in. A crowd-sourced—and untraceable—murder would unfold as follows. First, the would-be assassin sends his prediction in an encrypted message that can be opened only by a digital code known to the person who sent it. He then makes the kill and sends the organization that code, which would unlock his (correct) prediction. Once verified by the organization, presumably by watching the news, the prize money—in the form of a digital currency donated to the pot—would be publicly posted online as an encrypted file.
Again, that file can be unlocked only by a “key” generated by whoever made the prediction. Without anyone knowing the identity of anyone else, the organization would be able to verify the prediction and award the prize to the person who made it.
The best bit, thought Bell, was that internet-enabled anonymity safeguarded all parties, except perhaps the killer (and his or her victim). Even if the police discovered who’d been contributing to the cash prizes of people on the list, the donors could truthfully respond that they had never directly asked for anyone to be killed. The organization that ran the market couldn’t help either, because they wouldn’t know who had donated, who had made predictions or who had unlocked the cash file.
But Bell’s idea was about more than getting away with murder. He believed that this system would exert a populist pressure on elected representatives to be good. The worse the offender—the more he or she outraged his or her citizens—the more likely they were to accumulate a large pool, and incentivize potential assassins. (Bell believed Stalin, Hitler, and Mussolini would all have been killed had such a market existed at the time.) Ideally, no one would need to be killed. Bell hoped the very existence of this market would mean no one would dare throw their hat into the ring at all.
“Perfect anonymity, perfect secrecy, and perfect security,” he wrote, “. . . combined with the ease and security with which these contributions could be collected, would make being an abusive government employee an extremely risky proposition. Chances are good that nobody above the level of county commissioner would even risk staying in office.”
In 1995, when Bell wrote “Assassination Politics,” this was all hypothetical. Although Bell believed his market would ultimately lead to the collapse of every government in the world, reality hadn’t caught up with his imagination. Nearly two decades later, with the creation of digital currencies like Bitcoin, anonymous browsers like Tor and trustworthy encryption systems, it had, and Bell’s vision was realized. “Killing is in most cases wrong, yes,” Sanjuro wrote when he launched the Assassination Market in the summer of 2013:
However, this is an inevitable direction in the technological evolution . . . When someone uses the law against you and/or infringes upon your rights to life, liberty, property, trade or the pursuit of happiness, you may now, in a safe manner from the comfort of your living room, lower their life-expectancy in return.
There are, today, at least half a dozen names on the Assassination Market. Although it is frightening, no one, as far as I can tell, has been assassinated. Its significance lies not in its effectiveness, but in its existence. It is typical of the sort of creativity and innovation that characterizes the dark net: a place without limits, a place to push boundaries, a place to express ideas without censorship, a place to sate our curiosities and desires, whatever they may be. All dangerous, magnificent, and uniquely human qualities.”
“The 8(a) Business Development Program assists in the development of
small businesses owned and operated by individuals who are socially and
economically disadvantaged, such as women and minorities. The following
ethnic groups are classified as eligible: Black Americans; Hispanic Americans;
Native Americans (American Indians, Eskimos, Aleuts, or Native Hawaiians);
Asian Pacific Americans (persons with origins from Burma, Thailand, Malaysia,
Indonesia, Singapore, Brunei, Japan, China (including Hong Kong), Taiwan, Laos,
Cambodia (Kampuchea), Vietnam, Korea, The Philippines, U.S. Trust Territory of
the Pacific Islands (Republic of Palau), Republic of the Marshall Islands,
Federated States of Micronesia, the Commonwealth of the Northern Mariana
Islands, Guam, Samoa, Macao, Fiji, Tonga, Kiribati, Tuvalu, or Nauru);
Subcontinent Asian Americans (persons with origins from India, Pakistan,
Bangladesh, Sri Lanka, Bhutan, the Maldives Islands or Nepal). In 2011, the
SBA, along with the FBI and the IRS, uncovered a massive scheme to defraud this program. Civilian
employees of the U.S.
Army Corps of Engineers, working
in concert with an employee of Alaska
Native Corporation Eyak
Technology LLC allegedly submitted fraudulent bills to the program,
totaling over 20 million dollars, and kept the money for their own use. It also alleged that the group planned to steer a further 780
million dollars towards their favored contractor.“
“Serco farewell to NPL
after 19 years of innovation 8 January 2015 .. During that period under Serco’s
management and leadership.. .. NPL’s caesium fountain atomic clock is
accurate to 1 second in 158 million years and NPL is playing a key role in
introducing rigour to high frequency [spread bet and spot-fixed
assassination] trading in the City through NPLTime.”
“The Ministry of Justice is still paying security firms G4S and Serco millions
of pounds every month for supplying electronic tagging equipment, more than a
year after both companies were barred from running the contract.
criminal investigations by the Serious Fraud Office over allegations of
overcharging that led to them repaying nearly £180m.
The continuing monthly
payments to the two companies were uncovered by an analysis of Ministry of
Justice (MoJ) data by the Centre for Crime and Justice Studies which shows
that G4S was
paid a total of £8.7m between March 2014 – when it lost the tagging contract –
and February 2015. Serco was paid £4.5m over the same period.
monitoring tags are used to enforce curfews on more than 100,000 offenders each
year. The outsourcing giant Capita took over the contract on an interim basis
in April last year.”
Instructor Serco – Camp Pendleton, CA Posted 377 days ago Uses
information derived from all military disciplines (e.g., aviation, ground
combat, command and control, combat service support, intelligence, and opposing
forces) to determine changes in enemy capabilities, vulnerabilities, and
probable courses of action. ..
• Knowledge on the operational employment and TTPs of the following C2 systems
and software applications in the COC .. •Travel may be required. • Have attended
DoD formal instructor courses, such as the Marine Corps’ Formal School’s
Instructor’s Course, or service equivalent • Four years of documented
experience instructing and employing their respective C2 system in support of
MAGTF operations • Background as an 0844 or 0848 MOS (USMC MOS, or equivalent
USA MOS appropriate), with formal training and experience utilizing AFATDS
(Advanced Field Artillery Target Data System), EMT (Effects Management Tool),
PSS-SOF (Precision Strike Suite – Special Ops Forces) • Active Secret Clearance
or the ability to obtain a Secret clearance is required. • Formal AFATDS
Training required, Strike-Link, PSS-SOF, JADOCS experience
“Rose O’Neal Greenhow (1813 or 1814–
October 1, 1864) was a renowned Confederate spy during
the American Civil War. A socialite in Washington, D.C. during the period before the war, she moved in important
political circles and cultivated friendships with presidents, generals,
senators, and high-ranking military officers. She used her connections to pass
along key military information to the Confederacy at the start of the war. In early
1861, she was given control of a pro-Southern spy network in Washington, DC by
her handler, Thomas
Jordan, then a captain in the
Confederate Army. She was credited by Jefferson Davis, the Confederate president, with ensuring the South’s victory at
Battle of Bull Run in late
July 1861. …
Knowing she was
suspected of spying for the Confederacy, Greenhow feared for her remaining
daughters’ safety. Leila was sent to Ohio to join her older sister Florence
Greenhow Moore, whose husband Seymour Treadwell Moore had become a captain in
the Union Army. (He was breveted a brigadier general in May 1865 for his
services and achieved a rank of lieutenant colonel after the war in his army
career.) Only Little Rose stayed with Greenhow in Washington.
Allan Pinkerton was made head of the recently
Service and one of his first
orders was to watch Greenhow, because of her wide circle of contacts on both
sides of the sectional split. Due to the activities of visitors, he arrested her and placed her
under house arrest at her 16th Street residence, along
with one of her couriers, Lily Mackall. His agents traced other leaked information to Greenhow’s home.
searching her house, Pinkerton and his men found extensive intelligence materials
left from evidence she tried to burn, including scraps of coded messages,
copies of what amounted to eight reports to Jordan over a month’s time, and
maps of Washington fortifications and notes on military movements.
The materials included
numerous love letters from the abolitionist Republican US Senator Henry Wilson from Massachusetts. She considered him her prize source, and said
he gave her data on the “number of heavy guns and other artillery in the
Washington defenses,” but he likely knew far more from his work on the
Military Affairs Committee. The seized Greenhow papers are now held by the National Archives
and Records Administration, with some available on line.
visitors to Greenhow’s house and moved other suspected Southern sympathizers
into it, giving rise to the nickname Fort Greenhow. He was pleased to oversee
the visitors and messages, as it gave him more control of the Southern flow of
information. While messages continued to be sent to Jordan, he discounted them
after Pinkerton mounted his control. When a letter from Greenhow to Seward was
publicized that complained of her treatment, there was Northern criticism for
what was perceived as too lenient treatment of a spy. Pinkerton transferred
Greenhow on January 18, 1862 to Old Capitol
Prison, shutting down Fort
Greenhow. So many political prisoners were detained that a two-man commission
was set up to review their cases at what were called espionage. hearings. Greenhow was never subjected to trial. Her youngest daughter, “Little Rose”, then eight years
old, was permitted to stay with her.
Greenhow continued to
pass along messages while imprisoned. Passers-by could see Rose’s window from the street. Historians
believe that the position of the blinds and number of candles burning in the
window had special meaning to the “little birdies” passing by.
Another account lists her prison room facing the prison yard “so that she
could not see or be seen” and “every effort was made to keep Mrs.
Greenhow away from the windows.”Greenhow also on one occasion flew the Confederate Flag from her prison window.“
isn’t certain if Kate Warne, America’s first female detective, had that career
path in mind when she walked into the Pinkerton Detective Agency. It’s
possible she was applying to be a secretary. But she so impressed Allan
Pinkerton that he hired her as an agent — a job she proved unusually
This was 1856. To say that Pinkerton, who founded
his Chicago-based agency in 1850, was breaking with convention by hiring a newly-widowed
23-year-old woman is an understatement. But his hunch proved prescient, and
Warne broke ground for other women who aspired to be private investigators. In
a ringing endorsement after her successes led him to hire on more women,
“In my service you
will serve your country better than on the field. I have several female
operatives. If you agree to come aboard you will go in training with the head
of my female detectives, Kate Warne. She has never let me down.”
The novelty of a
female detective in those days meant Warne was able to go
undercover with ease (including
pretending to be a fortune-teller as a means to gather intel), and gain the
trust of other women (like the wife of a man suspected
of embezzling $50,000 from
the Adams Express Company in Montgomery, Alabama).
Warne’s biggest case
came in 1861, when she proved a key operative in Pinkerton’s successful thwarting of
an assassination plot being hatched against then-president-elect Abraham
Lincoln. Though Warne was a New York native, her time spent working the Adams
Express Company case meant she was able to
convincingly impersonate a Southerner. Once he caught wind of the plot against Lincoln, Pinkerton knew
exactly how Warne could help crack the case:
Baltimore as a spy to infiltrate the southern sympathizers. Posing as a Mrs.
Barley, a visitor from Alabama, Warne’s job was to “cultivate the wives and
daughters of suspected plotters.” The attempt on the president-elect’s life
would be made while he was passing through the city.
went even further. Not only did she courier messages to Lincoln’s party, but
she also helped smuggle the president himself onto a train that would
ultimately pass through Baltimore with him undetected.
Lincoln donned an
overcoat and hat, abandoning his signature “stovepipe.” His role was that of
Kate Warne’s “invalid brother.” Warne purchased tickets for herself and her “brother,” and saw to it that the rear sections of a sleeping car were secure.
Kate charmed the conductor into keeping the back door of the sleeping car open,
so that her “sick brother” could enter in privacy.
For this accomplishment,
some call Warne a trailblazer for women
who’d later serve as presidential guards and in the Secret Service. Months after “the Baltimore Plot” case,
the Civil War broke out, and Warne was said to have worked as a Union spy on behalf of the Pinkertons.
Unfortunately, the Great Chicago Fire of 1871 destroyed most of Pinkerton’s unpublished
records, so more details of
Warne’s life beyond Pinkerton’s praise-filled remembrances are scarce. He named
her Supervisor of Women Agents so that she could pass on her skills
to new recruits, but her life was cut tragically short in 1868 when she
suddenly fell ill. She was estimated to be just 35 years old when she died.
It was rumored that
Warne and Pinkerton’s close working relationship was also intimate (problematic, since Pinkerton was married),
but whatever scandal that might suggest can’t eclipse the importance of her
work. Surprisingly, she hasn’t had much of a pop-culture presence despite her
incredible story. In 2011, the USA Network announced it was developing a drama about Warne (that never materialized);
a more homespun homage came via author and graphic designer Lauren R.
Silberman’s delightful web comic Kate Warne, Pinkerton Detective, which ran
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation