#2747: USIS Kill Switch On Clinton Servers – Serco 8(a) Fast & Zulu Furious – Obama Eagles of Bataclan Death
United States Marine Field McConnell
Plum City Online – (AbelDanger.net)
August 10, 2016
1. Abel Danger (AD) claims that USIS equipped Clinton Foundation servers with a kill-list switch so hired assassins could target America’s friends OR its enemies depending on whose deaths best suited Hillary Clinton as a prospective Commander in Chief (CIC).
2. AD claims that Serco 8(a) companies used USIS security-clearance dumps to embed assassins in the Fast & Furious gun-walking program and hire the script kiddies capable of synchronizing Zulu-time news injects with the media plays needed to put some CIC lipstick on the Clinton pig.
3. AD claims that Obama and Clinton used USIS identities to equip Serco assassins – allegedly embedded in the Eagles of Death punk-rock group – with Fast & Furious guns for the assassinations in November 2015 in the Bataclan concert hall in Paris falsely attributed to ISIS.
4. United States Marine Field McConnell to show Donald Trump how to dismantle the USIS kill-list network and bring Clinton, Obama and their alleged co-conspirators to justice for the murder of 89 people at the Bataclan on November 13 2015.
“Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”
“Report: Obama’s Fast & Furious Gun Used By ISIS In Paris Massacre
June 30, 2016
by Jack Knox 0 Comments Terrorists loyal to ISIS murdered 130 people in Paris on November 13, 2015 in a series of coordinated attacks. These included the attack on the Bataclan Theater where the Eagles of Death Metal were playing a concert to a packed house. 89 people were killed at the Bataclan alone. Now Judicial Watch is reporting that one of the guns used in the Paris attack has been traced to an illegal sale in Phoenix, Arizona – ground zero in Obama’s bungled Fast and Furious program that sold thousands of weapons to criminals. Fast and Furious weapons have turned up at a number of crime scenes including a .50 caliber rifle that was found in Mexican cartel kingpin, El Chapo’s hideout during a raid in January.
One of the guns used in the November 13, 2015 Paris terrorist attacks came from Phoenix, Arizona where the Obama administration allowed criminals to buy thousands of weapons illegally in a deadly and futile “gun-walking” operation known as “Fast and Furious.”
A Report of Investigation (ROI) filed by a case agent in the Bureau of Alcohol, Tobacco Firearms and Explosives (ATF) tracked the gun used in the Paris attacks to a Phoenix gun owner who sold it illegally, “off book,” Judicial Watch’s law enforcement sources confirm. Federal agents tracing the firearm also found the Phoenix gun owner to be in possession of an unregistered fully automatic weapon, according to law enforcement officials with firsthand knowledge of the investigation.
The investigative follow up of the Paris weapon consisted of tracking a paper trail using a 4473 form, which documents a gun’s ownership history by, among other things, using serial numbers. The Phoenix gun owner that the weapon was traced back to was found to have at least two federal firearms violations—for selling one weapon illegally and possessing an unregistered automatic—but no enforcement or prosecutorial action was taken against the individual. Instead, ATF leaders went out of their way to keep the information under the radar and ensure that the gun owner’s identity was “kept quiet,” according to law enforcement sources involved with the case. “Agents were told, in the process of taking the fully auto, not to anger the seller to prevent him from going public,” a veteran law enforcement official told Judicial Watch.”
“Outsourcing of US Security Clearances, how USIS happened
Posted on October 10, 2014
by Daniel Jackson
In the past, the U.S. government has often looked to private corporations to address urgent matters of national security or help overcome strategic shortfalls in times of need. From the establishment of the Pinkerton National Detective Agency in 1850, to the use of General Motors factories for weapons systems manufacturing during World War II, and finally to the massive increase in federal contracting in the years since September 11th, 2001 the United States has had a long and tumultuous relationship with federal contractors.
The advantage of these business relationships is that they have enabled the US Government to contract out for services or goods that could not be as adequately acquired through federal acquisition practices. In short, critical needs were met. The fact that fraud also increased was not lost on either the government or contractors, but it was not until contingency operations slowed that accountability was catalogued through the Gansler , SIGIR , and SIGAR  reports. Indeed, the US government has struggled with the speed, efficiency, and bureaucracy of its acquisition practices for some time. Evidence of this is seen in the expanding and contracting of government regulations, especially with respect to the current preferences to utilize commercial practices whenever possible . Some of this is obvious as the government cannot fire and hire as quickly as a private company due to personnel regulations and unions, and therefore cannot increase employee numbers as part of a response to an emergency or shortfall like a private company. In some ways the private model is uniquely adaptable to contingencies in that temporary employment agreements, a tool not usually available to the government and only recently in the form of term appointments, allows vendors to increase and decrease manning commensurate with the contingency.
However, there are some significant disadvantages to outsourcing. The fact that contractors work for the government, often in government offices, but are employees of contractors has muddied the waters. This legal tension has resulted in much controversy over the use of contractor employees to perform functions that are considered inherently governmental . These prohibited activities are listed in sub-part 7.503 of the Federal Acquisition Regulation , but even developing this list has been fraught with confusion and interpretation issues. Additional issues arise when the line between contract employees and government employees is blurred . With USIS, the full range of issues involved with contracting out critical services is on display.
USIS was created in 1996 when the Office of Personnel Management privatized its’ investigate branch as part of a larger government downsizing initiative and grew significantly through rounds of capital investment (notably from the Carlyle Group) and public sale to Altegrity . In FY 2012 USIS received $253 Million of its revenue from OPM, which accounted for 67% of total revenue . The September 11, 2001 terrorist attacks on the United States not only changed the country, but also changed the fate of USIS. After these events the government greatly increased its scope, spending and action around the world ; which eventually resulted in the named contingency operations Operation Iraqi Freedom and Operation Enduring Freedom. Due to the all of this activity the US government found that its infrastructure to hire, vet and place employees was insufficient .
With regard to security clearances the DOD office responsible for clearances and the OPM were found to be falling significantly short of targets, with stories of initial clearance investigations and clearance renewals taking up to a year . This was found to be endangering multiple missions and congress passed the Intelligence Reform and Terrorism Prevention Act of 2004, which mandated new more aggressive timelines for investigation and adjudication of clearances . It was not until the events of the last year and a half that it became clear that this push for faster investigation and adjudication has caused some issues.
While the federal government focus has been on decreasing clearance wait times , two other seminal events have shifted that focus to accuracy in investigations and clearance determinations. The first was the tragic Navy Yard Shooting of September 16, 2013 and the second were the revelations of widespread surveillance by the National Security Agency revealed by Edward Snowden. USIS was subsequently found to have had a part in both investigations.
While these issues highlighted the out-sourcing of security clearance investigations, USIS was already under “criminal investigation” as early as June 2013 . The DOJ brought charges against USIS in January, 2014 for circumventing quality reviews, which led to the charges of false claims for the invoiced work that was not actually completed . This was compounded by a cyber-attack in the summer of 2014 .
For USIS this turned out to be the last straw. Their existing unilateral option contracts with the Office of Personnel Management were not renewed when they expired in September of 2014 ; these contracts were cumulatively valued at $2,456,500,000 (maximum) for three contractors: OPM15-11-C-0015 USIS; OPM15-11-C-0016 KeyPoint Government Solutions; and OPM15-11-C-0017 CACI Premiere . While other agencies have current contracts with USIS, it will be difficult for future government agency contracts considering the responsibility requirements of FAR 9.405 .
The damage done to the United States security clearance process is not fully known, but it is clear that the government is no longer able to meet its security clearance needs. Whether other contracts will be awarded to address the shortfall remains to be seen, but in any case, the future likely holds longer delays for security clearances as the government searches for the balance between bureaucracy and accuracy.”
“The List of Adrian Messenger is a 1963 mystery film about a retired British intelligence officer (George C. Scott) investigating a series of apparently unrelated deaths. It was directed by John Huston from a screenplay by Anthony Veiller, based on the 1959 novel of the same title by Philip MacDonald. .. A writer named Adrian Messenger (John Merivale) believes a series of apparently unrelated “accidental” deaths are actually linked murders. He asks his friend Anthony Gethryn (George C. Scott), recently retired from MI5, to help clear up the mystery. However, Messenger’s plane is bombed while he is en route to collect evidence to confirm his suspicions and, with his dying breath, he tries to tell a fellow passenger the key to the mystery.
The passenger survives and turns out to be Raoul Le Borg (Jacques Roux), Gethryn’s old World War II counterpart in the French Resistance. They join forces to investigate Messenger’s list of names, and decode Messenger’s final cryptic words. They establish that all on the list were together in a prisoner of war camp in Burma, where a Canadian sergeant, George Brougham, betrayed his fellow prisoners, foiling their escape attempt. Each has a reason to kill Brougham. It evolves that Brougham is their killer, but why? They deduce that he is about to come into prominence and cannot risk being recognised. Gethryn and Le Borg establish that he stands in line to an inheritance of the Bruttenholm family, landed gentry who are friends of Gethryn and the late Messenger, and who avidly engage in fox hunting.
Having disposed of all possible witnesses to his wartime treachery, Brougham (Kirk Douglas) appears at a Bruttenholm estate fox hunt and introduces himself as a member of the family (he has previously been seen only in disguise). It then becomes clear to the visiting Gethryn and Le Borg that Brougham’s next victim is to be the young heir, Derek. In an attempt to divert Brougham, Gethryn makes known his investigation of Messenger’s list, calculating to set himself up as the next victim.
That night, Brougham sabotages the next morning’s hunt by laying a drag with a fox in a sack over the fields. He especially marks a blind spot behind a high wall, and moves a large hay tedder behind, intending for Gethryn (who has been given the honour of leading the hunt) to be impaled upon its lethal tines. Unbeknownst to Brougham, his plan goes awry when a farmer repositions the tedder early the next morning. The hunt commences but comes to a halt at the specified spot. Gethryn reveals to the gathered crowd that he discovered and removed the hay-tedder booby trap earlier that morning and, with the help of the lead fox hound, will detect the scent of the culprit amongst a group of hunt saboteurs. Brougham, once again disguised, is identified and runs off, mounting Derek’s horse. When Derek shouts a command to the horse, the animal stops short, throwing Brougham and impaling him on the very same machine he intended for Gethryn.”
“The Kill List: ICWatch Uses LinkedIn Account Info to Out Officials Who Aided Assassination Program
MAY 28, 2015
WikiLeaks has begun hosting a new database called ICWatch, built by Transparency Toolkit. The site includes a searchable database of 27,000 LinkedIn profiles of people in the intelligence community. Organizers say the aim of the site is to “watch the watchers.” WikiLeaks founder Julian Assange talks about how the database could be used to help identify individuals connected to the U.S. kill list, formally known as the Joint Prioritized Effects List, or JPEL.”
“The Secret Internet Protocol Router Network (SIPRNet) is “a system of interconnected computer networks used by the U.S. Department of Defense and the U.S. Department of State to transmit classified information (up to and including information classified SECRET) by packet switching over the ‘completely secure’ environment”. It also provides services such as hypertext document access and electronic mail. As such, SIPRNet is the DoD’s classified version of the civilian Internet. SIPRNet is the SECRET component of the Defense Information Systems Network. Other components handle communications with other security needs, such as NIPRNet which is used for nonsecure communications, and JWICS which is used for Top Secret communications.”
“FBI: ‘Hostile Actors’ Likely Hacked Clinton Email Secrets
Comey recommends not prosecuting presumed Democratic nominee
BY: Bill Gertz
July 6, 2016 5:00 am
An extensive FBI investigation found evidence that foreign government hackers accessed private emails sent by former secretary of state Hillary Clinton but no direct evidence spies hacked into the several unsecure servers she used.
FBI Director James Comey revealed Tuesday the 11-month probe into Clinton’s private email servers uncovered negligent handling of very sensitive classified information that was placed on several unsecure servers between 2009 and 2013, when Clinton served as secretary of state.
In an unusual public announcement, Comey outlined findings that included discovery of highly classified information sent and received on Clinton’s private email servers, and signs that “hostile actors” gained access to email accounts of people who were sharing emails with Clinton.”
Jan 31, 2001
SBA modernizes to help feed its growing programs [Field McConnell’s sister Kristine Marcy introduced the 8(a) electronic accelerated loan guarantee program at SBA to ensure funding for the Serco protégés’ participating in the 9/11 carbon cap]
BY PATRICIA DAUKANTAS | GCN STAFF
Under a five-year plan for overhauling its information technology systems, the Small Business Administration recently acquired new software for financial and other administrative tasks.
By the time SBA celebrates its 50th anniversary in 2003, agency officials want all their programs up and running around the clock, chief financial officer Joseph Loddo said.
In the first phase of the modernization, the agency has upgraded systems for managing its extensive portfolio of guaranteed loans, chief operating officer Kristine Marcy said.
SBA processed its first electronic loan last November through its Sacramento, Calif., office and plans to add more private lenders during fiscal 2001.
The agency’s staffing level has dropped 22 percent over the past eight years, which is another reason to improve IT, Marcy said. Over the past decade, SBA’s portfolio of loans to small and disadvantaged businesses has more than doubled to $50 billion.
‘We’re a small agency with a huge portfolio,’ Marcy said. SBA supplies more than half of the U.S. venture capital available each year.
Seventy percent to 80 percent of the loans are booked through a preferred lender program [structured by Serco], which involves nearly 7,000 banks, Marcy said. SBA guarantees the loans, just as the government backs student and housing loans.
‘The financial and IT businesses were changing so rapidly, we had to make some changes to stay current with the private sector,’ Marcy said. Banks had been asking SBA to make faster decisions on loan guarantees. The agency decided to aim for a turnaround time of one hour.”
“Serco do a bunch more that didn’t even make our story: As well as thanking God for his success, CEO Chris Hyman is a Pentecostal Christian who has released a gospel album in America and fasts every Tuesday. Amazingly, he was also in the World Trade Centre on 9/11, on the 47th floor addressing [Serco] shareholders. Serco run navy patrol boats for the ADF, as well as search and salvage operations through their partnership with P&O which form Defence Maritime Services. Serco run two Australian jails already, Acacia in WA and Borallon in Queensland. They’re one of the biggest companies In the UK for running electronic tagging of offenders under house arrest or parole.”
“UK Cabinet Office – Emergency Planning College – Serco …..Types of Exercise
Workshop Exercises These are structured discussion events where participants can explore issues in a less pressurised environment. They are an ideal way of developing solutions, procedures and plans rather than the focus being on decision making. Table Top Exercises These involve a realistic scenario and will follow a time line, either in real-time or with time jumps to concentrate on the more important areas. The participants would be expected to be familiar with the plans and procedures that are being used although the exercise tempo and complexity can be adjusted to suit the current state of training and readiness. Simulation and media play can be used to support the exercise. Table-top exercises help develop teamwork and allow participants to gain a better understanding of their roles and that of other agencies and organisations. Command/Control Post Exercises These are designed primarily to exercise the senior leadership and support staff in collective planning and decision making within a strategic grouping. Ideally such exercises would be run from the real command and control locations and using their communications and information systems [Feeling lucky, Punk?]. This could include a mix of locations and varying levels of technical simulation support. The Gold Standard system is flexible to allow the tempo and intensity to be adjusted to ensure maximum training benefit, or to fully test and evaluate the most important aspects of a plan. Such exercises also test information flow, communications, equipment, procedures, decision making and coordination. Live Exercises These can range from testing individual components of a system or organisation through to a full-scale rehearsal. They are particularly useful where there are regulatory requirements or with high-risk situations. They are more complex and costly to organise and deliver but can be integrated with Command Post Exercises as part of a wider exercising package.”
“Serco farewell to NPL after 19 years of innovation 8 January 2015 Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco’s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade…. NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading [for Serco’s front running banks] in the City through NPL [Zulu] Time.”
“Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994.This file was obtained from the Secretary of State and has a file number of 1795583.
This business was created 7,695 days ago in the New York SOS Office and the registered agent is C T Corporation System that does business at 111 Eighth Avenue , New York in New York.
After conducting a search for principals and owners of Base One Technologies, Ltd., we were able to find 2 owners and/or executives. Their information is listed below.
This file was last updated on May 14, 2013.
Liza R Zaneri
Chief Executive Officer
15 Irving Place New
Rochelle, NY 10801″
“Serco’s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals.”http://www.dtic.mil/whs/directives/corres/pdf/100515p.pdf
“[White’s Club member] Rupert Christopher Soames OBE (born 18 May 1959) is a British businessman, CEO of the outsourcing [and long range death-betting bookmaker] company Serco. Soames was born in Croydon, Surrey, to Lord and Lady Soames. He is a grandson of Sir Winston Churchill, a nephew of the former Defence Secretary Duncan Sandys and Diana Churchill; the journalist Randolph Churchill and the actress and dancer Sarah Churchill and a great-nephew of the founders of the Scout movement, Robert Baden-Powell and Olave Baden-Powell. His brother is the Conservative MP Sir Nicholas Soames.
Soames was educated at St. Aubyns Preparatory School in Rottingdean, East Sussex and Eton College, and then Worcester College at the University of Oxford, during which time he worked as a DJ at the London nightclub Annabel’s, as well as being elected to the Presidency of the Oxford Union. Career
Upon graduation, he was offered a position at General Electric Company (GEC) by the managing director Arnold Weinstock. He remained at GEC for 15 years, working in the company’s avionics and computing divisions, and became managing director of Avery Berkel, running the company’s UK, India, Asia and Africa operations.
After leaving GEC in 1997, Soames joined the software company Misys as chief executive of its Midas-Kapiti division. He was promoted to chief executive of the Banking and Securities Division in June 2000.
Soames left Misys after a disagreement with Misys founder Kevin Lomax on the company’s direction, and was appointed chief executive of power hire group Aggreko in June 2003, replacing Philip Harrower who died when his car collided with a train in the United States.
Soames was appointed Officer of the Order of the British Empire (OBE) in the 2010 New Year Honours. In November 2010 Rupert Soames gave a speech to Holyrood in which he warned, “In the UK, we are already close to the rocks, because, over the next 8 years a third of our coal-fired capacity, two-thirds of our oil-fired capacity, and nearly three-quarters of our nuclear capacity will be closed down either through age or the impact of the European Large Combustion Plant Directive. Absent a massive and immediate programme of building new power stations, with concrete being poured in the next two years, we will be in serious danger of the lights going out.”
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation