#2404: White House Stupidity – Marine Corps Naiveté – 8(a) Stand Down With Tor for Serco Digital Fires

Brief From United States Marine Field McConnell 
Plum City Online – (AbelDanger.net) 
July 18, 2015

1. In 1993, White House insiders – Vladimir Lenin would have described them as “useful idiots” – began a stupid attempt to “reinvent government” with man-in-the-middle attacks on the U.S. National Command Authority’s Defense Red Switch Network.

2. Between 1999 and 2003, WH idiots had James Logan Jones, Jr. serving as U.S. Marine Corps general, assuming correctly he would be too naïve to recognize that civilians in the Marine Corps Intelligence Activity (MCIA) had staged “al-Qaeda” attacks on the U.S. East African Embassies, the USS Cole and the Pentagon U.S. Navy Command Center.

3. In 1998, Field McConnell sister Kristine Marcy equipped 8(a) companies in the MCIA with the Navy’s onion router (Tor) , subsequently allowing WH idiots to stand down the Defense Red Switch Network and stage mass murders of victims in Serco digital fires.

Field McConnell is standing by to brief Marine Corps General Joseph Dunford before requesting from Congress an authority by way of Letters of Marque and Reprisal to confiscate onion router assets allegedly used by Serco to synchronize the 8(a) stand downs with murder in digital fires.

Prequel 1: #2403: General Dunford’s 8(a) Serco Blind Spot – Sinaloa Onion Router Ammo – Marine Deaths By Digital Fires

“New Benghazi book: Hillary Clinton ordered an ‘across-the-board stand-down…of key rescue units’ 
Jul. 7, 2014 12:47pm 
Benjamin Weingarten
Ken Timmerman’s new book, “Dark Forces: The Truth About What Happened in Benghazi,” contains a number of compelling revelations, primary among them his assertion that the murder of Ambassador Chris Stevens and three others in Benghazi “was a state-sponsored terrorist attack, carried out on orders from the leadership of the Islamic Republic of Iran.”

Timmerman argues in the book that there were a number of fatal errors made in Libya, largely based on a wrong-headed view that regardless of the realities on the ground, the nation had to be treated as if it was a stable democracy no longer on war footing, and that terrorists were “on the run” both in Libya and throughout the Islamic world — all as part of a narrative crafted for political gain.

With respect to Ms. Clinton’s view on Libya and an American security presence there, Timmerman writes:

“She didn’t want to upset the sensitivities of the Libyans by making it look like the U.S. military was invading their country. There would be no Marines landing “on the shores of Tripoli” on her watch. Just as she had insisted earlier with Lieutenant Colonel [Andy] Wood’s Site Security Team of Special Operators [which had previously led security at the Benghazi compound], no military uniforms, insignia, or even boots would be tolerated in her State Department facilities in Libya. “People high up at State resented like hell us being there and doing what we did,” Wood said.”

In political jargon, useful idiot is a term for people perceived as propagandists for a cause whose goals they are not fully aware of, and who are used cynically by the leaders of the cause. Despite often being misattributed to Vladimir Lenin,[1][2][3] in 1987, Grant Harris, senior reference librarian at the Library of Congress, declared that “We have not been able to identify this phrase among [Lenin’s] published works.”[4][5]

In the Russian language, the equivalent term “useful fools” (полезные дураки, tr. polezniye duraki) was already in use in 1941. It was mockingly used against Russian (anti-communist) ‘nihilists’ who, for Polish agents, were said to be no more than “useful fools and silly enthusiasts”.[6]

The term has been pejoratively used in the West for fellow travellers and other revolutionary communist sympathizers during the Cold War. The underlying accusation was that, despite the people in question thinking of themselves as standing for a benign socialist ideological cause, and as valued allies of the Soviet Union; they were actually held in contempt and were being cynically used by the Soviets for political purposes. The use of the term in political discourse has since been extended to other alleged propagandists, especially those who are seen to unwittingly support a supposedly malignant cause which they believe to be a just one.[7]
A New York Times article from 1948, on contemporary Italian politics, documented usage of the term in an article from the social-democratic Italian paper L’Umanita.[8] The French equivalent, “idiots utiles”, was used in a newspaper article title in 1946.[9]

A similar term, useful innocents, appears in Austrian-American economist Ludwig von Mises’s “Planned Chaos” (1947). Von Mises claims the term was used by communists for liberals that von Mises describes as “confused and misguided sympathizers”.[10] The term useful innocents also appears in a Readers Digest article (1946) titled “Yugoslavia’s Tragic Lesson to the World”, an excerpt from a, at the time, forthcoming book (no title printed) authored by Bogdan Raditsa (Bogdan Radica), a “high ranking official of the Yugoslav Government”. Raditsa says: “In the Serbo-Croat language the communists have a phrase for true democrats who consent to collaborate with them for ‘democracy.’ It is Korisne Budale, or Useful Innocents.”[11]

A 2010 BBC radio documentary titled Useful Idiots listed among “useful idiots” of Joseph Stalin several prominent British writers including H. G. Wells and Doris Lessing, the Irish writer George Bernard Shaw, the American journalist Walter Duranty, and the singer Paul Robeson.[12]

In 2013 the term was applied several times to the former National Security Administration contractor Edward Snowden. Soon after his leaks of classified materials became public, American critics maintained he was unwittingly helping the governments of China and Russia score a propaganda victory by fleeing from the United States to Hong Kong and, subsequently, Moscow.[13] The accusation followed Snowden to Russia, and gained further adherence after an appearance on Russian State TV during a question/answer program with Russian President Vladimir Putin in April 2014. One eminent American expert on Russian affairs said that “liberals who support Edward Snowden have given succour to the Kremlin as it seeks to crush Ukrainian protesters”.[14][15]”

MARINE CORPS INTELLIGENCE ACTIVITY QUANTICO, VA Kabar Cohort 4, Team 4 Capstone Project Marine Corps Intelligence Activity Military and Civilian Interaction By: Captain John P. Brown, USMC Mrs. Christina Clark Mr. Jorge Miranda Mr. Neri G.Terry, Jr. Capstone Advisors: Dr. Susmita Murphy, PhD Ms. Katy Stucky June 2011 Table of Contents Introduction Methodology Discussion -The Origins of Civilians at MCIA -Breakdown of Survey Respondents and Results -Key Differences: Culture and Commonality CI/Humint / PAC Comparison Recommendations Conclusions Appendix A: Ka-Bar Civilian Military Environmental Survey Introduction For some years, the perception of intra-workforce tension, particularly between military and civilian personnel, has pervaded MCIA. Recently, during the fourth iteration of the Kabar Leadership Training Program, Marine Corps Intelligence Seniors requested that a group of four mid-level managers examine the professional interaction between its military and civilian personnel – this request is itself a tacit acknowledgement of that perception. This paper is the result of that group’s efforts. Its purpose is to examine and confirm if friction exists between the Marine Corps Intelligence Activity’s (MCIA) military and civilian workforces. Furthermore, this paper will provide evidence (or lack there of) of friction , research its cause, and provide recommendations to reduce or eliminate it. Although MCIA has existed for over 20 years, it is imperative at this juncture in its history to take a hard look at workforce interaction. The implementation of the Marine Corps Intelligence, Surveillance, and Reconnaissance Enterprise (MCISR-E) combined with shrinking budgets across the federal government necessitates that the command fully understand the differences in workforce attitudes, dynamics, and how these differences impact the command’s ability to efficiently and effectively achieve mission accomplishment.”

“James Logan Jones, Jr. (born December 19, 1943) is a retired United States Marine Corps general and the former United States National Security Advisor.

During his military career, he served as Commander, United States European Command (COMUSEUCOM) and Supreme Allied Commander Europe (SACEUR) from 2003 to 2006 and as the 32nd Commandant of the Marine Corps from July 1999 to January 2003. Jones retired from the Marine Corps on February 1, 2007, after 40 years of service.

After retiring from the Marine Corps, Jones remained involved in national security and foreign policy issues. In 2007, Jones served as chairman of the Congressional Independent Commission on the Security Forces of Iraq,[1] which investigated the capabilities of the Iraqi police and armed forces. In November 2007, he was appointed by the U.S. Secretary of State as special envoy for Middle East security. He served as chairman of the Atlantic Council from June 2007 to January 2009, when he assumed the post of National Security Advisor which he held until November 2010.

Commandant of the Marine Corps 
In office: July 1, 1999 – January 12, 2003

President: Bill Clinton; George W. Bush

Preceded by: Charles Krulak

Succeeded by: Michael Hagee”

“Digital Fires Instructor Serco – Camp Pendleton, CA 
Posted 377 days ago Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.

•Works directly with customers and team members to determine project scope and specifications.
•Provides research and analysis to support military organizations.
•May support development and analysis of products, including training modules, evaluation tools, etc.

•Presents analysis or products to customers.
•May support policy and procedure development for agency, interagency, or community-wide support.
•May interact with outside customers and functional peer groups.
• Participates in the development, testing, maintenance and delivery of training and educational programs and related materials in support of complex products and/or procedures.
• Knowledge on the operational employment and TTPs of the following C2 systems and software applications in the COC operating environment is required:, AFATDS, FBCB2-BFT, JADOCS, and supporting C2 systems/software applications found available for use the regimental/battalion Combat Operations Center (COC).
• Conducts training sessions and assists in evaluating the effectiveness of training activities.
• May assist with updating course documentation on a continuous basis to ensure timeliness and relevance.
• May work with engineering, technical support and manufacturing to ensure that course material reflects current product features. Desired Skills and Experience
•Requires a bachelor’s degree in a related field; graduate degree preferred, plus 3 years’ experience as a Military Analyst and/or formal military training. Appropriate clearance level required.
•Work is usually performed at a government site, some of which may be remote.

•Working conditions may vary.
•Travel may be required.
• Have attended DoD formal instructor courses, such as the Marine Corps’ Formal School’s Instructor’s Course, or service equivalent
• Four years of documented experience instructing and employing their respective C2 system in support of MAGTF operations
• Background as an 0844 or 0848 MOS (USMC MOS, or equivalent USA MOS appropriate), with formal training and experience utilizing AFATDS (Advanced Field Artillery Target Data System), EMT (Effects Management Tool), PSS-SOF (Precision Strike Suite – Special Ops Forces)
• Active Secret Clearance or the ability to obtain a Secret clearance is required.
• Formal AFATDS Training required, Strike-Link, PSS-SOF, JADOCS experience desirable”

“Krauthammer on Obama’s ‘Lone Gunman’ Comment: ‘He Won’t Say Radical Islam’ 
On “Special Report” tonight, Charles Krauthammer discussed the tragic shootings in Chattanooga, Tennessee.

Four Marines were killed today when a gunman opened fire at two separate military centers.

A police officer was also wounded and suffered non-life threatening injuries. The suspected shooter has been ID’d as 24-year-old Muhammad Youssef Abdulazeez.

The names of the Marines who were reportedly shot were not immediately released pending notification of their families.

Krauthammer said that today’s shooting is “in all probability an example of radical Islam at work” in America.
“The general issue is radical Islam,” he stated.
He said that when Obama called the shooter a “lone gunman” earlier at his press conference, he “disconnected the dots.”

“I think it’s sort of the whole six and a half years of Obama always wanting to err on the side of downplaying the threat. The threat is radical Islam, which he won’t say,” Krauthammer said. “The war is going to be generational.”

Watch the video above from “Special Report.”


Welcome to the CloudLMS This system is provided by the Defense Ammunition Center only as an alternative training resource for those having difficulties accessing DAC training. If you have any problems or questions about this system or the Ammo courses, please contact the CloudLMS Administrator.”

Behind the Sordid World of Online Assassination Betting
Jamie Bartlett

I have heard rumors about this website, but I still cannot quite believe that it exists. I am looking at what I think is a hit list.

There are photographs of people I recognize—prominent politicians, mostly—and, next to each, an amount of money. The site’s creator, who uses the pseudonym Kuwabatake Sanjuro, thinks that if you could pay to have someone murdered with no chance—I mean absolutely zero chance—of being caught, you would.
That’s one of the reasons why he has created the Assassination Market.

There are four simple instructions listed on its front page:

Add a name to the list 
Add money to the pot in the person’s name 
Predict when that person will die 
Correct predictions get the pot

The Assassination Market can’t be found with a Google search. It sits on a hidden, encrypted part of the internet that, until recently, could only be accessed with a browser called The Onion Router, or Tor. Tor began life as a U.S. Naval Research Laboratory project, but today exists as a not-for-profit organization, partly funded by the U.S. government and various civil liberties groups, allowing millions of people around the world to browse the internet anonymously and securely.

My journey took me to new places online and offline. I became the moderator of an infamous trolling group and spent weeks in forums dedicated to cutting, starving, or killing yourself. I explored the labyrinthine world of Tor Hidden Services in search of drugs, and to study child pornography networks. I witnessed online wars between neo-Nazis and antifascists on popular social media sites, and signed up to the latest porn channels to examine current trends in homemade erotica. I visited a Barcelona squat with anarchist Bitcoin programmers, run-down working men’s clubs to speak to extreme nationalists, and a messy bedroom to observe three girls make a small fortune performing sexually explicit acts on camera to thousands of viewers. By exploring and comparing these worlds, I also hoped to answer a difficult question: do the features of anonymity and connectivity free the darker sides of our nature? And if so, how?”


“June 7, 2011

Serco Executive Maureen Baginski Receives FBI Intelligence Analysts Association Award 
RESTON, VIRGINIA – May 2, 2011 – Serco Inc., a provider of professional, technology, and management services to the federal government, is proud to announce that Maureen Baginski, Vice President of Serco’s Intelligence Services, received the FBI Intelligence Analysts Association (IAA) Award. The first annual event and ceremony was held on April 12 in Washington, DC.

Ms. Baginski was recognized for her work from 2003 to 2005, when she served as the FBI’s Executive Assistant Director for Intelligence. In that position, she was responsible for establishing and managing the FBI’s first-ever intelligence program. She adapted FBI intelligence capabilities with information technologies to create an intelligence-sharing operation that could identify threats before they became attacks.”

Serco Company Advisers 


Deloitte LLP

New Street Square 

T: +44 (0)20 7936 3000 
F: +44 (0)20 7583 1198 
(Please note: this link will open the page in a new browser window.) 

Principal bankers

8 Canada Square 
E14 5HQ

T: +44 (0)20 7991 8888 
(Please note: this link will open the page in a new browser window.) 

Investment bankers

N M Rothschild & Sons 
New Court 

 St Swithin’s Lane 

Tel: +44 20 7280 5000 
Fax: +44 20 7929 1643 
www.rothschild.com (Please note: this link will open the page in a new browser window.)


JP Morgan 
20 Bank Street, 

Canary Wharf, 
E14 5JP2R 6DA

T: +44 (0)20 7155 5000 
F: +44 (0)20 7155 9800

(Please note: this link will open the page in a new browser window.) 

Bank of America 
Merrill Lynch, 
Financial Centre
2 King 

Edward Street 

T: +44 (0)20 7996 1000 
F: +44 (0)20 7996 2919 
(Please note: this link will open the page in a new browser window.) 


Clifford Chance LLP 
10 Upper Bank Street 
EC14 5JJ

T: +44 (0)20 7006 1000 
F: +44 (0)20 7006 5555 
(Please note: this link will open the page in a new browser window.) 


Aspect House
Spencer Road 

West Sussex 

BN99 6DA

T: +44 (0)871 384 2932 
T: +44 (0)121 415 7047 
F: +44 (0)121 433 8150 
(Please note: this link will open the page in a new browser window.)”

Serco Awarded $13 Million Marine Training Systems Support Contract 
Date : 28 February 2014 
Serco Inc., a provider of professional, technology, and management services, announced the award of a new contract to provide training support to the US Marine Corps (USMC). The Marine Air Ground Task Force (MAGTF) Training Systems Support contract has a one-year base period and one six-month option period valued at nearly $18 million, if the option is exercised.

Under this contract, Serco will support Combat Instructor School training, systems integrations and operations in a classroom and operations center environment in support of MAGTF Staff Training Program Division-sponsored and supported events. Serco will deliver collaborative tools and web development for garrison and tactical event environments. Training support will include warfighting skills and seminars, mission rehearsal exercises, C2 systems, and combat simulation. Serco expects to hire over 100 new employees to support this contract at 6 sites around the world.

“The Marines mission is critical to our national security and we are proud to support them on this effort,” said Dan Allen, Serco Inc.’s Chairman and Chief Executive officer. “Serco is known around the world for the quality of our training programs. We look forward to putting our experience to work for the Marines and to support their vital training requirements.”

Personnel and Readiness is a key capability within Serco’s market offering. The company provides training and simulation to over 1,000 students a month at the US Army Maneuver Center of Excellence in Fort Benning, GA. At Fort Benning, Serco conducts and supports integrated and immersive tactical training exercises up to Brigade level using Live, Virtual, and Constructive Gaming (LVC-G) systems. Serco utilizes integrated exercise systems like Command Post of the Future (CPoF), Future Battle Command Brigade and Below (FBCB2), Army Battle Command Systems (ABCS) and Virtual Battlespace II (VBS2).

“Loan Improvement Jan 31, 2001 SBA modernizes to help feed its growing programs 
Under a five-year plan for overhauling its information technology systems, the Small Business Administration recently acquired new software for financial and other administrative tasks. .. In the first phase of the modernization, the agency has upgraded systems for managing its extensive portfolio of guaranteed loans, chief operating officer Kristine Marcy [Field McConnell’s sister] said. SBA processed its first electronic loan last November through its Sacramento, Calif., office and plans to add more private lenders during fiscal 2001. .. Marcy said. Banks had been asking SBA to make faster decisions on loan guarantees. The agency decided to aim for a [onion router] turnaround time of one hour. In the second phase of modernization, SBA is revamping its financial, human resources, procurement and travel systems with Web-enabled Oracle Corp. applications. .. The second-phase integrator, SRA International Inc. of Arlington, Va., has subcontracted with a number of small firms for things such as training and data conversion [Note Serco protégé Base One opened a document conversion center in the Bronx in 2006, presumably to deal with Obama’s passport problems]. .. In the final phase of the modernization, SBA will upgrade the computers in its 8(a) Business Development Program, which assists small businesses in competing for government contracts, Marcy said. The agency wants to be able to improve its tracking of clients’ successes and failures [through to liquidation by the SBA’s preferred lenders and sureties such as HSBC and Travelers Casualty and Surety Company of America – note merged with Citigroup and John Deutch’s CIA friends!].”

For more information, please contact: 
Alan Hill, VP Corporate Communications 
Tel: +1 703 939 6500 and Email: alan.hill@serco-na.com
Download PDF [PDF, 98 KB] (Please note: this link will open the page in a new browser window)

Maria Contreras-Sweet (born 1955) is the 24th and current Administrator of the Small Business Administration. She was formerly the executive chairwoman and founder of ProAmérica Bank, a commercial bank focusing on small to mid-sized businesses with a specialty in the Latino community. Born in Guadalajara, Mexico, Contreras-Sweet immigrated to Los Angeles, California and has since been involved in both the private sector founding a private equity firm and in public service as the California Secretary of Business, Transportation, and Housing under Governor Gray Davis.

On January 15, 2014, she was nominated by President Barack Obama to join his Cabinet as head of the Small Business Administration.[1] She was confirmed as the Administrator of the Small Business Administration by voice vote on March 27, 2014.[2]She assumed role of her position as Administrator of the Small Business Administration on April 7, 2014.[3]”

“The USNO Master Clock is the underlying product for all of our precise time and time interval products. 
The timing reference produced by this timing ensemble is called UTC(USNO). This timing reference is mandated to be the precise time reference for all of the DoD.”

“Serco farewell to NPL after 19 years of innovation 8 January 2015 .. During that period under Serco’s management and leadership.. .. NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency [GPS remote assassination betting] trading in the City through NPLTime.

“Serco’s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals.” http://www.dtic.mil/whs/directives/corres/pdf/100515p.pdf

“Base One Technologies – Corporate Strategy – We are a Government Certified Women-Owned Business 
We practice Diversity Recruitment and Staffing for IT positions

Base One was founded in 1994 by a women engineer who had made a career in technology research for many years. Base One has been very successful in focusing on diversity recruiting and staffing for IT projects. It has been our experience that the greater the diversity mix, the more creative the solution. As in any field the more diverse the viewpoint the more thorough your analysis. Our engineers can think out of the box.

Because of our affiliations we have access to pools of resources among more diverse groups & individuals. We work with a large pool of minority professionals who specialize in IT skills. We are able to have access to these resources through our status as a D/MWBD firm and our affiliations. These affiliations assist us in working with resources among more diverse groups & individuals.

We are also partnered with firms that are 8A certified as Minority firms, Disabled Veteran firms, Native American firms, Vietnam veteran firms, women owned firms.

Our hub zone location keeps us close to the professional organizations of great diversity. We are active in recruiting from and networking with these community organizations of local IT professionals. This has given us access to a large pool of diversity talent.

Base One’s staff of engineers are a diverse group of professionals. This diverse network of engineers helps us to branch out to other engineers and creates an even larger network of resources for us to work with.

The greater the diversity the more complete & thorough the analysis. The broader the spectrum of points of view the broader the scope of the analysis. We feel that a diverse team gives us a greater advantage in creating cutting edge solutions. To that end we will continue to nurture these relationships to further extend our talent pool.

The greater the diversity mix, the more creative the solution.

The more diverse the viewpoint, the more thorough the analysis.

The more diverse our team, the more our engineers can think out of the box.

This is why Base One Technologies concentrates on diversity recruitment in the belief that a diverse team gives us a greater advantage in creating cutting edge solutions.”

Information Security Planning is the process whereby an organization seeks to protect its operations and assets from data theft or computer hackers that seek to obtain unauthorized information or sabotage business operations.
Key Clients Benefiting From Our Information Security Expertise: Pentagon Renovation Program, FAA, Citigroup, MCI.

Base One technologies

Expertly researches, designs, and develops information security policies that protect your data and manage your firm’s information technology risk at levels acceptable to your business.

Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report.

Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions.”

“The 8(a) Business Development Program assists in the development of small businesses owned and operated by individuals who are socially and economically disadvantaged, such as women and minorities. The following ethnic groups are classified as eligible: Black Americans; Hispanic Americans; Native Americans (American Indians, Eskimos, Aleuts, or Native Hawaiians); Asian Pacific Americans (persons with origins from Burma, Thailand, Malaysia, Indonesia, Singapore, Brunei, Japan, China (including Hong Kong), Taiwan, Laos, Cambodia (Kampuchea), Vietnam, Korea, The Philippines, U.S. Trust Territory of the Pacific Islands (Republic of Palau), Republic of the Marshall Islands, Federated States of Micronesia, the Commonwealth of the Northern Mariana Islands, Guam, Samoa, Macao, Fiji, Tonga, Kiribati, Tuvalu, or Nauru); Subcontinent Asian Americans (persons with origins from India, Pakistan, Bangladesh, Sri Lanka, Bhutan, the Maldives Islands or Nepal). In 2011, the SBA, along with the FBI and the IRS, uncovered a massive scheme to defraud this program. Civilian employees of the U.S. Army Corps of Engineers, working in concert with an employee of Alaska Native Corporation Eyak Technology LLC allegedly submitted fraudulent bills to the program, totaling over 20 million dollars, and kept the money for their own use.[26] It also alleged that the group planned to steer a further 780 million dollars towards their favored contractor.[27]”

“Government still paying G4S and Serco millions for tagging despite ban Alan Travis Home affairs editor 
Thursday 25 June 2015 00.01 BST 
The Ministry of Justice is still paying security firms G4S and Serco millions of pounds every month for supplying electronic tagging equipment, more than a year after both companies were barred from running the contract.

Both companies faced criminal investigations by the Serious Fraud Office over allegations of overcharging that led to them repaying nearly £180m.

The continuing monthly payments to the two companies were uncovered by an analysis of Ministry of Justice (MoJ) data by the Centre for Crime and Justice Studies which shows that G4S was paid a total of £8.7m between March 2014 – when it lost the tagging contract – and February 2015. Serco was paid £4.5m over the same period.

The electronic monitoring tags are used to enforce curfews on more than 100,000 offenders each year. The outsourcing giant Capita took over the contract on an interim basis in April last year.

In July 2014, Capita and three other companies were named as the winners of a £265m six-year contract to supply the next generation of satellite tracking tags, which would allow dangerous and repeat offenders to be monitored around the clock.”

Serco… Would you like to know more? 
SWISSLEAKS – “HSBC developed dangerous clients: arms merchants, drug dealers, terrorism financers” 
Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! (Mobile Playback Version) [HSBC is Serco’s drug-hub Silk Road banker and a major shareholder with the 9/11 8(a) lenders including Her Majesty’s Government and JPMorgan]

Yours sincerely,

Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222

David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation

746 Total Views 1 Views Today
Please follow and like us:

Related Post


  • LISTEN TO THE VIDEO ANOTHER HAOX FOR SURE . NOTICE THE ACCENT CHANGE FROM THE BEGINING . Washington State Airplane Crash with Lone Female Survivor is a Supercilious Hoax http://nodisinfo.com/washington-state-airplane-crash-with-lone-female-survivor-is-a-supercilious-hoax/

  • When you think about how they operate perhaps this is a way to destroy the credibility of all small businesses . Rockefller =any competition is a sin . They are sneaky and anything they run is only for their gain .

  • I am stumped! What is their agenda with a hoax plan crash survivor….it appears so obviously over-acted. What do they hope to accomplish with these fake "news stories"?

  • NOW THIS IS INTERESTING . United Airlines awards hackers millions of miles for revealing risks https://www.yahoo.com/tech/s/united-airlines-awards-hackers-millions-miles-revealing-risks-050346031–finance.html

  • Boeing regularly, perhaps annually sponsers "white hat" hacking contest then hires IT workers from the group picking the best of he hackers. I took a few classes for White Hat hacking and it is growing with more and more hackers hacking a way all of the time. One thing I learned is that no one seems to really know just who the hackers are and often even if they have been hacked quite often may take a while with info pouring out for days on end or longer, some back doors exist that have not been used but could be that are found in machines unknown by the owners or users of the machines. Big companies with millions or a significant amount of dollars of easy to hack machines cannot afford to replace or upgrade and many hacks are not reported to keep people from becoming scared. Once in a system or getting through the "perimeter" or security a hacker has access and can have a back door you will not see that gives them control. Ever try to look though every file on your machine? Type I think DIR/All or something like that on the command line and files will run on and on an on. It is legal to sell hacking software but not legal to use it . Cyber war is here. You begin to wonder how many hacks are false flag possibly and could in fact be CIA or intelligence posing as others for various reasons.

  • Admin:

    This clown "Natasha Bella" is a spamming shill.
    She (it) is spamming the same gigantic block of textual crap on every article.

    Please get rid of her(it) because people who want to most relevant info won't put up with being drowned out by shit posts.