#2397: 9/11 Marque and Marine Reprisal – Serco’s Spot-Fixed Clock for Captain Chic – 8(a) Sheraton Digital Fires
1. United States Marine Field McConnell will seek authority from Congress under Letters of Marque and Reprisal to confiscate alien-operated network-time-protocol devices used in the 9/11 attacks and transfer custody of said devices to the Marine Corps Intelligence Activity (MCIA) pending resolution of the facts of 9/11.
2. The letters of marque must specify alien NTP assets in the custody of Serco shareholders including the clock used to spot fix the perceived date and time of death of Charles Frank “Chic” Burlingame III – pilot of AA Flight 77 on 9/11 – as Sept.12, 2001 17:37:19.
3. Where possible, the letters of marque must name aliens with Serco and its 8(a) protégé company, Base One Technologies, who are suspected of provided NTP timing signals to Sheraton Hotel/State Department honeypots for the Serco’s digital fires attacks of 9/11 and the wrongful death of Captain Burlingame.
Field McConnell is standing by to brief Gen Joseph F. Dunford, Jr., USMC, Commandant of the Marine Corps, and his colleagues in the Marine Corps Intelligence Activity (MCIA), before making a formal request to Congress for the authority he will need to exact reprisal for the death of his USNA classmate Captain Chic Burlingame and the almost 3,000 other victims of 9/11 in what has been described as “the first live-broadcast mass snuff film in human history“.
“Article I, Section 8, Clause 11 of the Constitution authorizes Congress to “grant Letters of Marque and Reprisal.”
This is a power that is rarely discussed and almost never exercised. Before applying this constitutional grant of power to the waging of the “War on Terror,” I’ll start with a bit of history of this unfamiliar provision of the Constitution. In the 13th century, King Henry III of England began issuing what were then known as privateering commissions. According to Dutch jurist and natural rights philosopher Hugo Grotius, letters of marque and reprisal were similar to a declaration of a “private war.” By issuing such a letter, the sovereign of one nation commissioned a private individual or individuals to enter territory governed by a foreign prince and exact retribution against person or persons believed to have committed a great wrong against the subjects of the authorizing monarch.”
“An assassination market or market for assassinations is a prediction market where any party can place a bet (using anonymous electronic money and pseudonymous remailers) on the date of death of a given individual, and collect a payoff if they “guess” the date accurately. This would incentivise assassination of individuals because the assassin, knowing when the action would take place, could profit by making an accurate bet on the time of the subject’s death. Because the payoff is for knowing the date rather than performing the action of the assassin, it is substantially more difficult to assign criminal liability for the assassination.”
“Serco farewell to NPL after 19 years of innovation 8 January 2015 .. During that period under Serco’s management and leadership.. .. NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency [GPS assassination betting] trading in the City through NPLTime.”
“The Importance of Time Synchronization for Your Network In modern computer networks time synchronization is critical because every aspect of managing, securing, planning, and debugging a network involves determining when events happen. Time also provides the only frame of reference between all devices on the network. Without synchronized time, accurately correlating log files between these devices is difficult, even impossible. Following are just a few specific reasons:
Tracking security breaches, network usage, or problems affecting a large number of components can be nearly impossible if timestamps in logs are inaccurate. Time is often the critical factor that allows an event on one network node to be mapped to a corresponding event on another.
To reduce confusion in shared filesystems, it is important for the modification times to be consistent, regardless of what machine the filesystems are on.
Billing services and similar applications must know the time accurately.
Some financial services require highly accurate timekeeping by law.
Sarbanes-Oxley and HIPAA Security Rules both require accurate timestamping.
One Way to Synchronize Time on Your Network
The Network Time Protocol (NTP) has long been the king of time-setting software. Some companies solve the problem of synchronizing their networks by using NTP to go out on the Internet to get time from a public Internet Time Server.”
“The Flight 77 Murder Mystery: Who Really Killed Charles Burlingame?
According to the official account of 9/11, American Airlines Flight 77–which supposedly crashed into the Pentagon–was hijacked shortly after 8:51 a.m. on September 11, 2001. This claim is so central to the U.S. government’s story that we would reasonably expect it to have been proven. Yet a closer analysis of the evidence shows that, in fact, it appears preposterous.
THE TOUGH PILOT
The first thing to recognize when evaluating the official Flight 77 story is that the plane’s pilot was a former military man, and a genuinely tough guy. Captain Charles “Chic” Burlingame had graduated from the United States Naval Academy in 1971. He served eight years on active duty as a fighter pilot, and served several tours at the Navy’s elite Top Gun school. He then spent 17 years in the Naval Reserve before retiring from the military in 1996.  During his military career, he had tours in Vietnam and the 1991 Gulf War.  His sister Debra Burlingame described him as “a guy that’s been through SERE [Survival Evasion Resistance Escape] school in the Navy and had very tough psychological and physical preparation.” She said, “If there was any chance of saving [Flight 77], this was the kind of guy who would have been able to do that.”  Admiral Timothy Keating was a good friend of Burlingame’s, having been a classmate of his in the Navy and attended flight school with him. He told CNN: “I was in a plebe summer boxing match with Chic, and he pounded me. … Chic was really tough.”  Even up to his death Burlingame enjoyed boating, in-line skating, and weightlifting, and was “in great shape,” according to his friend Steve Brooks. 
Surely it would take a particularly formidable team of terrorists to wrestle control of a plane from a man like this? Yet here is where the official story falls apart at the first hurdle. The supposed hijackers in fact appear to have been a group of weaklings.
THE FEEBLE HIJACKERS
The five men who allegedly hijacked Flight 77 comprised of a pilot, Hani Hanjour, and four “muscle” hijackers who’d been tasked with storming the cockpit and controlling the passengers: Majed Moqed, Khalid al Mihdhar, Nawaf al Hazmi, and his brother Salem al Hazmi. However, as the 9/11 Commission pointed out, “The so-called muscle hijackers actually were not physically imposing,” with the majority of them being between 5’5″ and 5’7″ in height, “and slender in build.”  As their ID cards have revealed, Salem al Hazmi was just 5’4″ tall and Khalid al Mihdhar’s was 5’6″. 
Between September 2 and September 6, 2001, about a week before the attacks, the five alleged hijackers attended Gold’s Gym in Greenbelt, Maryland, where, reportedly, they were “awkwardly lifting weights and using resistance machines.”  Gold’s Gym regional manager Spero Courtis has described, “They seemed not to really know what they were doing.”  According to Gene LaMott, the CEO of Gold’s Gym International Inc.: “They weren’t on the masculine side. They looked like students from the university.” 
Heading this group of supposed mass murderers was Hani Hanjour, the alleged suicide pilot said to have crashed Flight 77 into the Pentagon. This 29-year-old from Saudi Arabia was “barely over 5 feet tall, skinny and boyish,” according to the Washington Post.  Not only was he physically unimposing, he was also quite a nice man, according to several people who met him. In spring 1996, he’d stayed for a month in Miramar, Florida, in the home of Adnan Khalil, a Saudi professor at a local college, and his wife Susan. The Khalils have recalled Hanjour being “mousey and gentle, with a weak personality.” Susan Khalil has commented, “I didn’t get the feeling that he hated me or hated Americans.”  He also liked children. Susan Khalil recalled, “He was very kind and gentle to my son, who was 3 years old.”  Early in 2001, Hanjour attended the JetTech flight school in Phoenix, Arizona.  According to Marilyn Ladner, a vice president at the Pan Am International Flight Academy, which operated the school: “The staff thought he was a very nice guy. … There was no suspicion as far as evildoing.”  After 9/11, Abulrahman Hanjour, Hani’s older brother, described the family’s feelings: “We thought that he liked the USA. … I would think he would give his life to save lives, not to do this.” 
THE IMPOSSIBLE HIJACKING
Yet this apparently sweet and gentle little man, along with his four physically unimposing colleagues, are meant to have become a gang of killers on 9/11. Here, in the words of the 9/11 Commission, is what they are alleged to have done: “Between 8:51 a.m. and 8:54 a.m., the hijackers began their takeover of the aircraft. They initiated and sustained their command of the aircraft using knives and box cutters (reported by one passenger) and moved all of the passengers (and possibly crew) to the rear of the aircraft (reported by one flight attendant and one passenger).” However, “Neither of the firsthand accounts to come from Flight 77, from a flight attendant and from a passenger, mentioned any actual use of violence (e.g., stabbings) or the threat or use of either a bomb or Mace.”  I guess we are supposed to believe the passengers and crew were so terrified by these puny little men that they just submitted to them without a fight.
Charles Burlingame and his co-pilot David Charlebois appear to have lost control of Flight 77 within the space of just a few minutes. At 8:54, three minutes after its last routine radio communication, the plane veered off its assigned course. Two minutes later, its transponder–a small radio transmitter that sends information about a plane to controllers–was switched off.  In other words, five short, weak men were supposedly able to seize control from Burlingame–a highly trained former military man who enjoyed weightlifting and was described as “really tough”–in about three minutes.
Although neither of the two alleged callers from Flight 77 mentioned any violence having occurred, Burlingame’s younger brother Mark has commented: “I don’t know what happened in that cockpit, but I’m sure that [the hijackers] would have had to incapacitate [Charles Burlingame] or kill him because he would have done anything to prevent the kind of tragedy that befell that airplane.”  Burlingame’s friend Timothy Keating remarked that “the terrorists had to perform some inhumane act to get him out of that cockpit, I guarantee you.”  And indeed, according to Virginia Senator John Warner, “the examination of his remains … indicated Captain Burlingame was in a struggle and died before the crash, doing his best to save lives on the aircraft and on the ground.”  Former Senator George Allen said the FBI had determined that Burlingame was bludgeoned to death. 
This story is ridiculous. There is no way five weaklings could have seized control of Flight 77, in the process beating Charles Burlingame to death, all within a few minutes. The most crucial questions therefore remain uninvestigated and unanswered: Who really killed Charles Burlingame? And what actually happened that day?”
“Serco’s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals.” http://www.dtic.mil/whs/directives/corres/pdf/100515p.pdf
“Base One Technologies – Corporate Strategy – We are a Government Certified Women-Owned Business
We practice Diversity Recruitment and Staffing for IT positions
Base One was founded in 1994 by a women engineer who had made a career in technology research for many years. Base One has been very successful in focusing on diversity recruiting and staffing for IT projects. It has been our experience that the greater the diversity mix, the more creative the solution. As in any field the more diverse the viewpoint the more thorough your analysis. Our engineers can think out of the box.
Because of our affiliations we have access to pools of resources among more diverse groups & individuals. We work with a large pool of minority professionals who specialize in IT skills. We are able to have access to these resources through our status as a D/MWBD firm and our affiliations. These affiliations assist us in working with resources among more diverse groups & individuals.
We are also partnered with firms that are 8A certified as Minority firms, Disabled Veteran firms, Native American firms, Vietnam veteran firms, women owned firms.
Our hub zone location keeps us close to the professional organizations of great diversity. We are active in recruiting from and networking with these community organizations of local IT professionals. This has given us access to a large pool of diversity talent.
Base One’s staff of engineers are a diverse group of professionals. This diverse network of engineers helps us to branch out to other engineers and creates an even larger network of resources for us to work with.
The greater the diversity the more complete & thorough the analysis. The broader the spectrum of points of view the broader the scope of the analysis. We feel that a diverse team gives us a greater advantage in creating cutting edge solutions. To that end we will continue to nurture these relationships to further extend our talent pool.
The greater the diversity mix, the more creative the solution.
The more diverse the viewpoint, the more thorough the analysis.
The more diverse our team, the more our engineers can think out of the box.
This is why Base One Technologies concentrates on diversity recruitment in the belief that a diverse team gives us a greater advantage in creating cutting edge solutions.”
Information Security Planning is the process whereby an organization seeks to protect its operations and assets from data theft or computer hackers that seek to obtain unauthorized information or sabotage business operations.
Key Clients Benefiting From Our Information Security Expertise: Pentagon Renovation Program, FAA, Citigroup, MCI.
Base One technologies
Expertly researches, designs, and develops information security policies that protect your data and manage your firm’s information technology risk at levels acceptable to your business.
Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report.
Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions.”
“Serco Wins $208 Million Sea Enterprise Engineering and Installation Contract with SPAWAR
April 16, 2007
(April 17, 2007) – Serco Inc., a major provider of government and military support services, announced today that it was selected by the Space and Naval Warfare Systems Center (SPAWARSYSCEN) to provide engineering and installation services for C4ISR systems at ship, shore and submarine locations on the West Coast. The single award, indefinite-delivery/indefinite-quantity performance-based contract, referred to as Sea Enterprise West, is valued at $208 million if all options are exercised over its five-year term. Serco has operated under a similar contract with SPAWAR since 1997.”
“The 8(a) Business Development Program assists in the development of small businesses owned and operated by individuals who are socially and economically disadvantaged, such as women and minorities. The following ethnic groups are classified as eligible: Black Americans; Hispanic Americans; Native Americans (American Indians, Eskimos, Aleuts, or Native Hawaiians); Asian Pacific Americans (persons with origins from Burma, Thailand, Malaysia, Indonesia, Singapore, Brunei, Japan, China (including Hong Kong), Taiwan, Laos, Cambodia (Kampuchea), Vietnam, Korea, The Philippines, U.S. Trust Territory of the Pacific Islands (Republic of Palau), Republic of the Marshall Islands, Federated States of Micronesia, the Commonwealth of the Northern Mariana Islands, Guam, Samoa, Macao, Fiji, Tonga, Kiribati, Tuvalu, or Nauru); Subcontinent Asian Americans (persons with origins from India, Pakistan, Bangladesh, Sri Lanka, Bhutan, the Maldives Islands or Nepal). In 2011, the SBA, along with the FBI and the IRS, uncovered a massive scheme to defraud this program. Civilian employees of the U.S. Army Corps of Engineers, working in concert with an employee of Alaska Native Corporation Eyak Technology LLC allegedly submitted fraudulent bills to the program, totaling over 20 million dollars, and kept the money for their own use. It also alleged that the group planned to steer a further 780 million dollars towards their favored contractor.”
“IWO JIMA ASSOCIATION OF AMERICA
70th Anniversary REUNION & SYMPOSIUM
FEBRUARY 18 – 22, 2015
ARLINGTON, Washington, DC & QUANTICO, VA
Guest of Honor
Gen Joseph F. Dunford, Jr., USMC
Commandant of the Marine Corps
Schedule of Events:
Wednesday, 18 February
2:00pm — 6:00pm Reunion Registration Open
6:00pm — 8:00pm Welcome Reception
Thursday, 19 February
7:30am — 8:00am Reunion Registration Open
8:15am Board Bus for Marine Barracks 8th & I
9:00am — 9:30am 70th Commemoration Memorial Service
10:00am — 11:30am National Museum of the U.S. Navy
11:45 am — 12:45pm Lunch Marine Barracks 8th &
1pm — 1:45pm Wreath Laying Ceremony at the WWII Monument
2pm — 2:45pm Wreath Laying Ceremony at the Marine Corps War Memorial
3:30pm Return to Hotel Sheraton Pentagon City
5:00pm — 6:00pm Reunion Registration Open
6:00pm — 8:00pm Hospitality Room Open
Friday, 20 February
8:30am — 3:00pm National Museum of the Marine Corps (NMMC)
5:00pm — 6:00pm Reunion Registration Open
6:00pm — 8:00pm No Host Cocktail Reception and “Show & Tell”
Saturday, 21 February
8:30am — 3:30pm Symposium and Panel Discussion
12:00pm — 1:00pm Lunch briefing by a Senior Marine Representative
5:00pm — 6:00pm Cash Bar Reception
6:00pm — 11:00pm Official Banquet invited GOH 36th Commandant of the Marine Corps
Sunday, 22 February
Farewells and Departures”
Starwood Capital buys its first hotels, and by 1994 owns interests in more than 30 properties.
In September, Starwood Lodging announces an agreement to purchase Westin Hotels & Resorts for $1.8 billion. The following month Starwood Lodging announces an agreement to purchase ITT Sheraton Corporation for $14.3 billion, acting as a white knight against a hostile bid from Hilton. Starwood is set to become a global enterprise. Starwood stock ends the year up by 57.48%.
In January, Starwood Lodging completes the acquisition of Westin Hotels & Resorts. With the completion of the purchase, Starwood is renamed Starwood Hotels & Resorts. In February, Starwood completes the acquisition of ITT Sheraton Corporation. Starwood’s portfolio now includes more than 650 hotels and resorts in more than 70 countries worldwide.
The first W Hotel opens in December in New York City. Designed to offer the personality and individuality of an independent, one-of-a-kind hotel – while guaranteeing the reliability and superior level of amenities and services travelers desire – the W brand adds style and personality to the industry.”
“Where Obama plans to sleep during G8
By Shia Kapos
February 20, 2012
The Sheraton Chicago Hotels & Towers will serve as headquarters for President Barack Obama during the NATO/G8 summits in May.
The hotel, which has three presidential suites, each with a separate parlor and conference table for 12, has plenty of experience handling high-profile guests in town for heady events.
The Sheraton served as headquarters to former President Bill Clinton during the 1996 Democratic Convention and during the Trans-Atlantic Business Dialogue in 2002, and it’s been the hotel of choice for the former president for events related to his Clinton Global Initiative.
In September, the Sheraton was the site of a high-profile fundraiser for Mr. Obama’s re-election bid.
Now that the president has settled on a home base for the mid-May summits, hotels are hoping the rest of the G8 delegations — the delegations hoteliers care about most — will fall in accordingly.
There’s been some jockeying as to who would be willing to stay in the same hotel as whom — does anyone want to stay with the Russians?
Dignitaries have made verbal commitments, but they haven’t yet signed on the dotted line.
“They’re taking their time about it,” one hotel source says.”
“Government still paying G4S and Serco millions for tagging despite ban Alan Travis Home affairs editor
Thursday 25 June 2015 00.01 BST
The Ministry of Justice is still paying security firms G4S and Serco millions of pounds every month for supplying electronic tagging equipment, more than a year after both companies were barred from running the contract.
Both companies faced criminal investigations by the Serious Fraud Office over allegations of overcharging that led to them repaying nearly £180m.
The continuing monthly payments to the two companies were uncovered by an analysis of Ministry of Justice (MoJ) data by the Centre for Crime and Justice Studies which shows that G4S was paid a total of £8.7m between March 2014 – when it lost the tagging contract – and February 2015. Serco was paid £4.5m over the same period.
The electronic monitoring tags are used to enforce curfews on more than 100,000 offenders each year. The outsourcing giant Capita took over the contract on an interim basis in April last year.
In July 2014, Capita and three other companies were named as the winners of a £265m six-year contract to supply the next generation of satellite tracking tags, which would allow dangerous and repeat offenders to be monitored around the clock.”
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation