#2400: Hôtel Clinton Cyber Assassination Betting – Marine General 8(a) Onion Router – Serco’s End Time Princess Di

Brief From United States Marine Field McConnell 
Plum City Online – (AbelDanger.net)
July 13, 2015

1. Hillary Clinton allegedly re-purposed the French American Foundation to sponsor cyber assassination betting out of les grandes chaînes d’hôtel where online guests bet on a predicted time of death and remote winners, closest to the proven time, scoop the pot.

2. Former Marine General James Jones, Jr., has allegedly equipped francophone-mentored 8(a) companies with the Navy onion router (Tor) to track targets through Hôtel Clinton cyber systems and camouflage what are – in reality – GPS spot-fixed contract hits.

3. Serco’s 8(a) protégés allegedly used Hôtel Clinton cyber system devices installed on Princess Diana’s Mercedes while it was in the custody of Ritz Paris staff to stamp an end time on the money shot images of her perceived death when her car was steered into the 13th column of the Pont D’Alma tunnel in Paris at 12.23am on Sunday, August 31, 1997.

Field McConnell is standing by to brief Gen Joseph F. Dunford, Jr., USMC, Commandant of the Marine Corps before requesting from Congress the authority he needs by way of Letters of Marque and Reprisal to confiscate Serco’s cyber assets in the Hôtel Clinton assassination betting pools.

Statue in the grounds of The Grove Hotel, part of the Hotel Clinton cyber matrix for Bilderberg 2013.

Interior of a VH-3D Sea King Marine One transporting President Obama and Gen Jones

Bilderberg 2013

INSIDE JOB [by French American Foundation adviser to 
Clinton] Official Trailer in HD! 

Senator Hillary Clinton supporters celebrate her re-election. A 360 view of the Democratic election night party at the Sheraton, NYC

Sheraton Pentagon City Hotel Clinton 9/11 

Prequel 1: #2399: Marine Corps Civil War General – Sheraton Arkancidal Betting – Serco 8(a) Digital Fires

“An assassination market or market for assassinations is a prediction market where any party can place a bet (using anonymous electronic money and pseudonymous remailers) on the date of death of a given individual, and collect a payoff if they “guess” the date accurately. This would incentivise assassination of individuals because the assassin, knowing when the action would take place, could profit by making an accurate [spot fixed] bet on the time of the subject’s death. Because the payoff is for knowing the date rather than performing the action of the assassin, it is substantially more difficult to assign criminal liability for the assassination.[1]”

“The Hôtel Ritz is a grand palatial hotel in the heart of Paris, in the 1st arrondissement. It overlooks the octagonal border of the Place Vendôme at number 15. The hotel is ranked highly among the most prestigious and luxurious hotels in the world and is a member of “The Leading Hotels of the World”. As of 2014 the Ritz is closed for a major multi-million dollar renovation.

The hotel, which today has 159 rooms, was founded by the Swiss hotelier, César Ritz, in collaboration with the chef Auguste Escoffier in 1898. The new hotel was constructed behind the façade of an 18th-century town house, overlooking one of Paris’s central squares. It was reportedly the first hotel in Europe to provide a bathroom en suite, a telephone and electricity for each room. It quickly established a reputation for luxury, with clients including royalty, politicians, writers, film stars and singers. Several of its suites are named in honour of famous guests of the hotel, including Coco Chanel and Ernest Hemingway who lived at the hotel for years. One of the bars of the hotel, Bar Hemingway, is devoted to Hemingway and the L’Espadon is a world-renowned restaurant, attracting aspiring chefs from all over the world who come to learn at the adjacent Ritz-Escoffier School. The grandest suite of the hotel, called the Imperial, has been listed by the French government as a national monument in its own right.

During the Second World War, the hotel was taken over by the occupying Germans as the local headquarters of the Luftwaffe. After the death of Ritz’s son Charles, in 1976, the last members of the Ritz family to own the hotel sold it in 1979 to the Egyptian businessman Mohamed Al-Fayed. In August 1997, Diana, Princess of Wales and Al-Fayed’s son, Dodi, dined in the hotel’s Imperial Suite before their fatal car crash.”

“Diana: The unseen evidence which has been mysteriously ignored until now
Last updated at 09:30 25 September 2007
Over English tea served in fine china cups at a sumptuous Paris apartment last November, an astonishing meeting took place to discuss the death of 36-year-old Diana, Princess of Wales.

The conversation was cordial. A butler carrying a teapot and tray of delicate sandwiches moved smoothly between the guests in the richly decorated drawing room of a building owned by the British Government, near the famous Champs Elysees.

In one Victorian armchair sat Lord Stevens, the respected former head of Scotland Yard. He had just finished a three-year investigation called Operation Paget into whether there was a conspiracy to murder the most famous woman in the world ten years ago and a cover-up to hide the truth.

The Princess was travelling with her Muslim lover Dodi Fayed in a Mercedes car when it smashed into the 13th column of the Pont D’Alma road tunnel in Paris at 12.23am on Sunday, August 31, 1997. ..

Significantly, the judge has ordered that hundreds of explosive background documents, witness statements and tape recordings garnered during his investigation must now be made available to the jury. Some were not even alluded to in the Operation Paget report.

The background files cover the most contentious allegations surrounding the Princess’s death.

For instance, a tape recording of one unnamed informant claims that the Queen’s Private Secretary, Robert Fellowes, who was also Diana’s brother-in-law, was in the French capital an hour before the crash and was seen in the telecommunications room of the British Embassy. (For his part, he insists he was at home in Norfolk all night.)”

“10 faits qui vous surprendront sans doute sur Hillary Clinton
…2 Elle a des ancêtres québécois
Selon la presse canadienne, on trouve dans son arbre généalogique des Campeau, Beaudry, Lefebvre, Picard, Duguay, Boucher, Gagnon, Hebert et Couillard.

7 Elle admire l’éducation à la française
La triste vérité, c’est que les Américains, à la différence des Français, n’ont jamais accordé suffisamment de prix au métier qui consiste à s’occuper des enfants.”
La phrase est tirée de son livre “It takes a village” (“Il faut tout un village pour élever un enfant”, Denoël 1996).

On apprend dans “Hillary Clinton de A à Z”, de François Clémenceau (éd du Rocher, 2015) qu’Hillary Clinton a passé dix jours en mars 1989 en France pour un voyage d’étude organisé par la French American Foundation, afin de découvrir comment marchaient les allocations familiales, les congés maternité, les maternelles…”

“Guess Who Was Not On The Guest List But Seen Entering The Grove Hotel For Bilderberg 2013?
Posted on June 8, 2013 by Dean Garrison
For the first time in the history of these secret meetings the guest list has been published. But yet again the world is left asking why the secrecy of Bilderberg? And why the lack of media coverage? It would appear a few key names were left off the guest list and have allegedly entered the Grove Hotel for the weekend conference.

Globalresearch.ca is reporting that two very well known American Political figures were seen entering the hotel:

Although the ‘official’ guest list for Bilderberg has been made public through the major media for the first time this year, the real interest will be in who is NOT on the list…

Today’s Bilderberg coverage which was streamed live on the Guerilla Media Network, saw the UK’s Liberty Tactics team reveal from reports on the ground in Watford that both Hillary Clinton and her husband, former US President Bill Clinton, were spotted entering Bilderberg’s Grove Hotel today, along with luminaries David Rockefeller and Henry Kissinger.

Both the jet-setting Clintons were also present at Kissinger’s 90th birthday party this past Monday night in New York City.

James Britpod from Liberty Tactics explains about Bilderberg’s non-guestlisters who have been spotted, “We do have Hillary, Bill, as well as quite a lot of others”.

Anyone who has done any research at all into the theory of the New World Order will not be surprised to see a Rockefeller and a Kissinger in attendance. Kissinger was actually on the guest list.

But, as if we didn’t already know, this has to be another likely sign that Hillary Clinton will be running for President in 2016. Dr. Eowyn wrote about this subject and Bill Clinton’s secret deal with Obama earlier this week.”

“Charles Henry Ferguson (born March 24, 1955)[1] is
the founder and president of Representational Pictures, Inc., and director and producer of No End In Sight: The American Occupation of Iraq(2007) and Inside Job (2010),[2] which won the Academy Award for Best Documentary.[3] 
Ferguson is also a software entrepreneur, writer and authority in technology policy.


A native of San Francisco, Ferguson was originally educated as a political scientist. A graduate of Lowell High School in 1972,[4] he earned a BA in mathematics from the University of California, Berkeley in 1978,[5] and obtained a Ph.D. in political science fromM.I.T. in 1989. Ferguson then conducted postdoctoral research at MIT while also consulting to the White House, the Office of the U.S. Trade Representative, the Department of Defense, and several U.S. and European high technology firms. From 1992–1994 Ferguson was an
independent consultant, providing strategic consulting to the top managements of U.S. high technology firms including Apple Inc.XeroxMotorola, and Texas Instruments.

In 1994, Ferguson founded Vermeer Technologies, one of the earliest
Internet software companies, with Randy Forgaard. Vermeer created the first visual website development tool, FrontPage.
In early 1996, Ferguson sold Vermeer for $133 million to Microsoft,[6] which
integrated FrontPage into Microsoft Office.

After selling Vermeer, Ferguson returned to research and writing. He was a visiting scholar and lecturer for several years at MIT and Berkeley, and for three years was a
Senior Fellow at the Brookings Institution in Washington DC. Ferguson is the author of four books and many articles dealing with various aspects of information technology and its relationships to economic, political, and social issues. Ferguson is a life member of the Council on Foreign Relations, a director of the French-American Foundation, and
supports several nonprofit organizations.”

Since the program’s establishment in 1996, the French-American Foundation has hosted 12 Defense Symposia to consider the ways in which the roles of the French and American military are changing and adapting, how these changes affect cooperation between the two militaries and how both militaries can learn from each other and work together more efficiently. Each symposium builds on the work of previous meetings, while addressing timely topics in the defense and security field. The venue for the symposium alternates between the United States and France.

Past meetings have
addressed the following topics:

Key U.S. participants:
General Keith
Alexander, Commander, U.S. Cyber Command & Director, National Security
Vice Admiral Michael
Rogers, Commander, U.S. Fleet Cyber Command & U.S. Tenth Fleet
Teri Takai, Chief
Information Officer, U.S. Department of Defense
Key French
Lieutenant General
Gratien Maire, Deputy Chief of Staff for International Relationships,
Etat-Major des Armées
General Jean-Paul
Paloméros, Supreme Allied Commander Transformation, NATO
Rear Admiral Arnaud
Coustillière, Cyber Defense General Officer, Ministry of Defense
Paillard, Deputy Director of the Directorate for Strategic Affairs, Ministry of
Key U.S. participants:
Vice Admiral Timothy
Giardina, Deputy Commander, U.S. Strategic Command
Lieutenant General
Rhett Hernandez, Commander, U.S. Army Cyber Command
Rear Admiral Samuel
Cox, Director of Intelligence, U.S. Cyber Command
Howard Schmidt, Cyber
Security Coordinator, National Security Council
Eric Rosenbach, Deputy
Assistant Secretary of Defense for Cyber Policy
Key French
General Patrick de Rousiers,
General Inspector of the French Armed Forces 
General Stéphane
Abrial, Supreme Allied Commander Transformation, NATO
Rear Admiral Arnaud
Coustillière, Cyber Defense General Officer, Ministry of Defense
Zacharie Gross, Deputy
Director, Delegation for Strategic Affairs
The Military Role in Countering
Terrorism at Home and Abroad: U.S. and French Approaches November 20-22, 2003
Key U.S. participants:
Nicholas Burns, U.S.
Ambassador to NATO
General James L. Jones, Supreme Allied Commander Europe
Key French
General Henri
Bentégeat, Chief of Defense Staff
Vice Admiral Alain Coldefy,
Vice Chief of Defense Staff
Promoting Jointness: What
Next After September 11th?

Key U.S. participants:
Dr. Jacques Gansler,
former Under Secretary of Defense for Acquisition, Technology and Logistics
General James L. Jones, Commandant of the U.S. Marine Corps
Key French
General Christian
Delanghe, Général de Corps d’Armée 2ème section, Director of Research,
Général de Corps
Aérien Richard Wolsztynski, Chief of Staff of the Air Force”
“The USNO Master Clock is the underlying product for all of our precise
time and time interval products.  
The timing reference produced by
this timing ensemble is called UTC(USNO).  This timing reference is
mandated to be the precise time reference for all of the DoD.”

Digital Fires Instructor Serco –
Camp Pendleton, CA 
Posted 377 days ago Uses information derived from
all military disciplines (e.g., aviation, ground combat, command and control,
combat service support, intelligence, and opposing forces) to determine changes
in enemy capabilities, vulnerabilities, and probable courses of action.

 •Works directly with customers and team members to determine project
scope and specifications.
•Provides research and analysis to support military organizations.
•May support development and analysis of products, including training modules,
evaluation tools, etc.
•Presents analysis or products to customers.
•May support policy and procedure development for agency, interagency, or
community-wide support.
•May interact with outside customers and functional peer groups.
• Participates in the development, testing, maintenance and delivery of
training and educational programs and related materials in support of complex
products and/or procedures.
• Knowledge on the operational employment and TTPs of the following C2 systems
and software applications in the COC operating environment is required:,
AFATDS, FBCB2-BFT, JADOCS, and supporting C2 systems/software applications
found available for use the regimental/battalion Combat Operations Center
• Conducts training sessions and assists in evaluating the effectiveness of
training activities.
• May assist with updating course documentation on a continuous basis to ensure
timeliness and relevance.
• May work with engineering, technical support and manufacturing to ensure that
course material reflects current product features. Desired Skills and
•Requires a bachelor’s degree in a related field; graduate degree preferred,
plus 3 years’ experience as a Military Analyst and/or formal military training.
Appropriate clearance level required.
•Work is usually performed at a government site, some of which may be remote.
•Working conditions may vary.
•Travel may be required.
• Have attended DoD formal instructor courses, such as the Marine Corps’ Formal
School’s Instructor’s Course, or service equivalent
• Four years of documented experience instructing and employing their
respective C2 system in support of MAGTF operations
• Background as an 0844 or 0848 MOS (USMC MOS, or equivalent USA MOS appropriate),
with formal training and experience utilizing AFATDS (Advanced Field Artillery
Target Data System), EMT (Effects Management Tool), PSS-SOF (Precision Strike
Suite – Special Ops Forces)
• Active Secret Clearance or the ability to obtain a Secret clearance is
• Formal AFATDS Training required, Strike-Link, PSS-SOF, JADOCS experience

“James Logan Jones, Jr. (born December 19, 1943) is a retired United States Marine Corps general and the former United States National Security

During his military
career, he served as Commander, 
States European Command
Allied Commander Europe
from 2003 to 2006 and as the 32nd 
of the Marine Corps
July 1999 to January 2003. Jones retired from the 
 on February 1, 2007,
after 40 years of service.
In office
July 1, 1999 – January 12, 2003
Preceded by
Succeeded by

Serco farewell to NPL
after 19 years of innovation 8 January 2015
 .. During that period under Serco’s
management and leadership.. ..  NPL’s caesium fountain atomic clock is
accurate to 1 second in 158 million years and NPL is playing a key role in
rigour to high frequency
[GPS remote assassination betting]
trading in the City through NPLTime

“Serco’s Office of Partner Relations (OPR)
helps facilitate our aggressive small business utilization and growth
 Through the OPR, Serco mentors four local small
businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base
One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth
sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were
awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring

Base One Technologies – Corporate
Strategy – We are a Government Certified Women-Owned Business
We practice Diversity
Recruitment and Staffing for IT positions

Base One was founded in 1994 by a women engineer who had made a career in
technology research for many years. Base One has been very successful in
focusing on diversity recruiting and staffing for IT projects. It has been our
experience that the greater the diversity mix, the more creative the solution.
As in any field the more diverse the viewpoint the more thorough your analysis.
Our engineers can think out of the box. 

Because of our affiliations we have access to pools of resources among more
diverse groups & individuals. We work with a large pool of minority
professionals who specialize in IT skills. We are able to have access to these
resources through our status as a D/MWBD firm and our affiliations. These
affiliations assist us in working with resources among more diverse groups
& individuals.

We are also partnered with firms that are 8A certified as Minority firms,
Disabled Veteran firms, Native American firms, Vietnam veteran firms, women
owned firms.

Our hub zone location keeps us close to the professional organizations of great
diversity. We are active in recruiting from and networking with these community
organizations of local IT professionals. This has given us access to a large
pool of diversity talent.

Base One’s staff of engineers are a diverse group of professionals. This
diverse network of engineers helps us to branch out to other engineers and
creates an even larger network of resources for us to work with.

The greater the diversity the more complete & thorough the analysis. The
broader the spectrum of points of view the broader the scope of the analysis.
We feel that a diverse team gives us a greater advantage in creating cutting
edge solutions. To that end we will continue to nurture these relationships to
further extend our talent pool. 

The greater the diversity mix, the more creative the solution.

The more diverse the viewpoint, the more thorough the analysis.

The more diverse our team, the more our engineers can think out of the box.

This is why Base One Technologies concentrates on diversity recruitment in the
belief that a diverse team gives us a greater advantage in creating cutting
edge solutions.”

Information Security Planning is the process whereby an organization seeks to
protect its operations and assets from data theft or computer hackers that seek
to obtain unauthorized information or sabotage business operations. 
Key Clients Benefiting
From Our Information Security Expertise: Pentagon Renovation Program,
 Citigroup, MCI.

Base One technologies

Expertly researches, designs, and develops information security policies that
protect your data and manage your firm’s information technology risk at levels
acceptable to your business. 

Performs architectural assessments and conducts both internal and external
penetration testing. The results of these efforts culminate in an extensive
risk analysis and vulnerabilities report. 

Develops, implements and supports Information Security Counter measures
such as honey-pots and
evidence logging and incident documentation processes and solutions.”

The 8(a) Business Development Program
assists in the development of small businesses owned and operated by
individuals who are socially and economically disadvantaged, such as women and
The following ethnic groups are classified as eligible:
Black Americans; Hispanic Americans; Native Americans (American Indians,
Eskimos, Aleuts, or Native Hawaiians); Asian Pacific Americans (persons with
origins from Burma, Thailand, Malaysia, Indonesia, Singapore, Brunei, Japan,
China (including Hong Kong), Taiwan, Laos, Cambodia (Kampuchea), Vietnam,
Korea, The Philippines, U.S. Trust Territory of the Pacific Islands (Republic
of Palau), Republic of the Marshall Islands, Federated States of Micronesia,
the Commonwealth of the Northern Mariana Islands, Guam, Samoa, Macao, Fiji,
Tonga, Kiribati, Tuvalu, or Nauru); Subcontinent Asian Americans (persons with
origins from India, Pakistan, Bangladesh, Sri Lanka, Bhutan, the Maldives
Islands or Nepal). In 2011, the SBA, along with the 
FBI and the IRS, uncovered a massive scheme to defraud this program. Civilian
employees of the 
U.S. Army Corps of Engineers, working in concert with an employee
Alaska Native Corporation Eyak Technology LLC allegedly
submitted fraudulent bills to the program, totaling over 20 million dollars,
and kept the money for their own use.[26] It also alleged that the group
planned to steer a further 780 million dollars towards their favored

Starwood Capital buys its first hotels, and by 1994 owns interests in
more than 30 properties.
In September, Starwood
Lodging announces an agreement to purchase Westin Hotels & Resorts for $1.8
billion. The following month Starwood Lodging announces an agreement to
purchase ITT Sheraton Corporation for $14.3 billion, acting as a white knight
against a hostile bid from Hilton. Starwood is set to become a global
enterprise. Starwood stock ends the year up by 57.48%.

In January, Starwood
Lodging completes the acquisition of Westin Hotels & Resorts. With the
completion of the purchase, Starwood is renamed Starwood Hotels & Resorts.
In February, Starwood completes the acquisition of ITT Sheraton Corporation.
Starwood’s portfolio now includes more than 650 hotels and resorts in more than
70 countries worldwide.”

Where Obama plans to sleep during G8
Shia Kapos February 20, 2012
The Sheraton Chicago
Hotels & Towers will serve as headquarters for President Barack
Obama during the NATO/G8 summits in May.

The hotel, which has
three presidential suites, each with a separate parlor and conference table for
12, has plenty of experience handling high-profile guests in town for heady

The Sheraton served as headquarters to former
President Bill Clinton during the 1996
Convention and during the Trans-Atlantic Business Dialogue in 2002, and it’s
been the hotel of choice for the former president for events related to his
Clinton Global Initiative.

In September, the
Sheraton was the site of a high-profile fundraiser for Mr. Obama’s re-election

Now that the president
has settled on a home base for the mid-May summits, hotels are hoping the rest
of the G8 delegations — the delegations hoteliers care about most — will fall
in accordingly.
There’s been some
jockeying as to who would be willing to stay in the same hotel as whom — does
anyone want to stay with the Russians?

Dignitaries have made
verbal commitments, but they haven’t yet signed on the dotted line.
“They’re taking
their time about it,” one hotel source says.”

“Government still paying G4S and Serco millions for tagging despite ban Alan Travis Home
affairs editor
Thursday 25 June
2015 00.01 BST
 The Ministry of Justice is still paying
security firms G4S and 
Serco millions of pounds
every month for supplying electronic tagging equipment, more than a year after
both companies were barred from running the contract.

Both companies faced
criminal investigations by the Serious Fraud Office over allegations of
overcharging that led to them repaying nearly £180m.

The continuing monthly
payments to the two companies were uncovered by an analysis of Ministry of
Justice (MoJ) data by the Centre for Crime and Justice Studies which shows
G4S was paid a total of £8.7m between March 2014 – when it lost the
tagging contract – and February 2015. Serco was paid £4.5m over the same

The electronic
monitoring tags are used to enforce curfews on more than 100,000 offenders each
year. The outsourcing giant Capita took over the contract on an interim basis
in April last year.

In July 2014, Capita
and three other companies were named as the winners of a £265m six-year
contract to supply the next generation of satellite tracking tags, which would
allow dangerous and repeat offenders to be monitored around the clock.”

Serco… Would you like to know more?


SWISSLEAKS – “HSBC developed dangerous clients: 
arms merchants, drug dealers, terrorism financiers”


Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! (Mobile Playback Version) [HSBC is Serco’s drug-hub Silk Road banker and a major shareholder with the 9/11 8(a) lenders including Her Majesty’s Government and JPMorgan]


Yours sincerely,

Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222

David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation

472 Total Views 1 Views Today
Please follow and like us:

Related Post