1. Abel Danger (AD) claims that the United States Secret Service (USSS) has now briefed Donald Trump on risks associated with the USIS dump of security-clearance files which allegedly allowed ISIS to infiltrate the pay-to-play networks of the Clinton Foundation.
2. AD claims that Serco is using the USIS file dumps and visa frauds to embed assassins in Hillary Clinton’s network of 8(a) protégé companies and offer a kill-list service to the wannabe leaders of a supranational government of world bankers and feminist elites.
3. AD claims that Obama’s feminist friends sent an Eagles of Death punk rock band to the Bataclan Concert Hall in Paris in November 2015 and equipped Serco assassins with Fast & Furious guns for the production of a kill-list snuff film falsely attributed to ISIS.
4. United States Marine Field McConnell offers to show Donald Trump how to neutralize the risks from the USIS/ISIS file dumps and kill lists and bring the Clinton and Obama feminists to justice for their role in the Bataclan massacre. (http://www.abeldanger.net/2010/01/field-mcconnell-bio.html).
USA: “Obama, he is the founder of ISIS” – Trump
Bataclan Theatre (Paris) – Mass Shootings during a Concert of Eagles of Death Metal.
War is War; Westhusing in Iraq
Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders!
[NoteHSBC, British and Saudi Governments,HSBC, Teachers’ andGoldman Sachs]
Hillary Clinton – What difference does it make?
Spice Girls – Wannabe Spice Girls – Wannabe
Comey: Clinton Made United States Secrets Vulnerable To Hostile Actors
Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders!
[Note HSBC, British and Saudi Governments and Goldman Sachs]
White’s Club death-bet bookmaker service dates back to 1743 only the technology to spot fix the Zulu time of victim death has changed.
Serco… Would you like to know more?
“Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”
“BREAKING: ISIS Terrorists Used Obama’s ‘Fast and Furious’ Gun During Paris Attack!
On the evening of 13 November 2015, ISIS linked terrorists slaughtered 130 people in a series of coordinated attacks in Paris.
One of the guns used in the November 13, 2015 Paris terrorist attacks was from Phoenix where Obama allowed criminals and cartel members to buy thousands of guns in his Fast and Furious gun-walking program.
One of the guns used in the November 13, 2015 Paris terrorist attacks came from Phoenix, Arizona where the Obama administration allowed criminals to buy thousands of weapons illegally in a deadly and futile “gun-walking” operation known as “Fast and Furious.”
A Report of Investigation (ROI) filed by a case agent in the Bureau of Alcohol, Tobacco Firearms and Explosives (ATF) tracked the gun used in the Paris attacks to a Phoenix gun owner who sold it illegally, “off book,” Judicial Watch’s law enforcement sources confirm. Federal agents tracing the firearm also found the Phoenix gun owner to be in possession of an unregistered fully automatic weapon, according to law enforcement officials with firsthand knowledge of the investigation.
The investigative follow up of the Paris weapon consisted of tracking a paper trail using a 4473 form, which documents a gun’s ownership history by, among other things, using serial numbers. The Phoenix gun owner that the weapon was traced back to was found to have at least two federal firearms violations—for selling one weapon illegally and possessing an unregistered automatic—but no enforcement or prosecutorial action was taken against the individual. Instead, ATF leaders went out of their way to keep the information under the radar and ensure that the gun owner’s identity was “kept quiet,” according to law enforcement sources involved with the case. “Agents were told, in the process of taking the fully auto, not to anger the seller to prevent him from going public,” a veteran law enforcement official told Judicial Watch.
It’s not clear if the agency, which is responsible for cracking down on the illegal use and trafficking of firearms, did this because the individual was involved in the Fast and Furious gun-running scheme. An ATF spokesman, Corey Ray, at the agency’s Washington D.C. headquarters told Judicial Watch that “no firearms used in the Paris attacks have been traced” by the agency. When asked about the ROI report linking the weapon used in Paris to Phoenix, Ray said “I’m not familiar with the report you’re referencing.” Judicial Watch also tried contacting the Phoenix ATF office, but multiple calls were not returned.”
“Obama Warns Trump to Keep Intelligence Briefings Secret: ‘Start Acting Like President’
At a press conference at the Pentagon Thursday, President Obama took questions following remarks on the United States’ progress against ISIS, and it didn’t take long for the subject to turn to Republican presidential nominee Donald Trump. Reuters’ Jeff Mason asked Obama if, given the President’s comments about Trump’s fitness for office, “are you concerned he will be receiving security briefings about ISIS and other sensitive national secure issues?”
The President responded with more restraint, but a warning tone, that candidates must “start acting like a president” and keep those briefings secret:
As for Mr. Trump, we’re going to go by the law which is that — tradition and the law, that if someone is the Republican nominee for president, they need to get security briefing, so if they were to win, they are not starting from scratch in terms of being prepared for this office. And I’m not going to go into the details of the nature of the security briefings that both candidates receive. What I will say is that they have been told these are classified briefings. If they want to be president, they have to start acting like president, and that means being able to receive these briefings and not spread them around.
Protection, which entails ensuring the safety of current and former national leaders and their families, such as the President, past Presidents, Vice Presidents, presidential candidates, visiting heads of state, and foreign embassies.
The federal government has reached a settlement worth at least $30 million with Altegrity Inc., the parent of an employment screening business that had been accused of fraud in a whistleblower lawsuit.
The U.S. Justice Department said Wednesday that Altegrity and its subsidiary U.S. Investigations Services Inc., or USIS, have agreed to a deal resolving claims that USIS raked in tens of millions of taxpayer dollars while failing to conduct quality reviews of completed background checks. The government claimed USIS committed fraud through a practice USIS employees referred to internally as “dumping” or “flushing” unfinished investigations. The practice involved USIS employees releasing to the U.S. Office of Personnel Management cases that hadn’t undergone a contractually required quality review.
“Shortcuts taken by any company that we have entrusted to conduct background investigations of future and current federal employees are unacceptable,” said Benjamin C. Mizer, head of the Justice Department’s civil division. “The Justice Department will ensure that those who do business with the government provide all of the services for which we bargained.”Whistleblower Blake Percival, a former USIS employee, first exposed the alleged dumping in a lawsuit filed in 2011, which was later joined by the Justice Department. According to the suit, USIS’s bonuses depended on speedy completion of security investigations, and the system was allegedly geared to ensure the bonus money came in even if the goals weren’t met.
As part of the settlement, USIS and Altegrity have agreed to forgo the more than $30 million they said the government still owed them under their contract. An Altegrity spokesman declined to comment.
USIS was created in 1996 from the privatization of a unit of the OPM, and for years it held a lucrative contract to conduct security-clearance background investigations for federal agencies. It vetted Edward Snowden for work at the National Security Agency, and it vetted Aaron Alexis, a federal contractor who shot and killed 12 people at the Washington Navy Yard in 2013. Last year, USIS was hit with a cyberattack that exposed the files of tens of thousands of Department of Homeland Security employees.
The whistleblower suit was unrelated to the background screenings conducted on Messrs. Snowden and Alexis and USIS has previously denied any shortcomings connected to those investigations. USIS said an independent investigation concluded it wasn’t at fault in the hacking incident.
Buyout firm Providence Equity Partners LLC bought USIS in 2007 and later folded it into its private-company security and employment-screening businesses, Kroll and HireRight, to create Altegrity. But the government didn’t renew USIS’s contracts after the cyberattack, helping push the company into chapter 11 bankruptcy reorganization.
Altegrity filed for protection from creditors in February after losing its government contracts and hopes to emerge from chapter 11 reorganization later this month with Kroll and HireRight intact. Under the company’s chapter 11 plan, approved by a bankruptcy judge last week, creditors are taking control of the new Altegrity, and USIS will be left behind in chapter 11 to be liquidated.
The settlement of USIS’s liability under the False Claims Act is part of a broader deal that also resolves other matters between the U.S. and Altegrity in the bankruptcy case. The government said Mr. Percival’s share of the settlement hasn’t yet been determined.
Petraeus and Broadwell engaged in a secret extramarital affair—exactly when is not clear—after years of close contact as biographer (Broadwell) and subject (Petraeus).
By the time Petraeus became Director of the Central Intelligence Agency in 2011, Broadwell had been working closely with him for years. She used nicknames for him such as “Dangerous Dave” and “Peaches”.
In May 2012, Jill Kelley filed a complaint with the FBI after receiving disturbing emails from a user identifying as “kelleypatrol”. Kelley, her husband Scott, and her sister Natalie Khawam also happened to be friends of Petraeus and his wife Holly from the time they were stationed at CENTCOM in Tampa, Florida.
Petraeus and Broadwell used fake names to create free webmail accounts exchanging messages without encryption tools. They would share an email account, with one saving a message in the drafts folder and the other deleting it after reading it.
The FBI, using electronic metadata that pinpointed the times, places and IP addresses, identified Paula Broadwell as the source of “kelleypatrol”.
FBI and intelligence agencies noted information about high-ranking US military personnel and Petraeus and that some of the exchanges were “sexually charged”.
Agents had confronted Broadwell on November 2, 2012. The report did not reach headquarters until November 5. Mueller and Holder reviewed it on November 6 (election day), and decided that it was time to inform Clapper.
Forensic techniques that discovered Broadwell’s identity and the affair with Petraeus also uncovered almost 30,000 pages of messages between Kelley and General John R. Allen, the US commander in Afghanistan. Allen denied an affair, but officials hinted that the emails raised “questions of impropriety”. Allen’s nomination as NATO’s Supreme Allied Commander was put on hold.
On November 7, 2012, Petraeus tendered his resignation as CIA chief to President Obama, per directive from James Clapper.
On November 9, 2012, Petraeus resigned as Director of the CIA after admitting having a sexual relationship with his biographer.
On April 23, 2015, Petraeus pleaded guilty to a misdemeanor charge of mishandling classified materials. He was given a two-year probationary period and a fine of $100,000.”
“STAYED, TYPE-E U.S. District Court District of Columbia (Washington, DC) CIVIL DOCKET FOR CASE #: 1:14-cv-00726-RMC PERCIVAL v. U.S. INVESTIGATION SERVICES, LLC Assigned to: Judge Rosemary M. Collyer Case in other court: USDC for the Middle District of Alabama, 2:11cv00527-WKW Cause: 31:3729 False Claims Act Date Filed: 04/25/2014 Jury Demand: Plaintiff Nature of Suit: 890 Other Statutory Actions Jurisdiction: Federal Question … MINUTE ORDER. On consideration of Defendant’s 31 Notification of Bankruptcy pursuant to Title 11 of the United States Code, 11 U.S.C. § 101 et. seq. and in accordance with 11 U.S.C. § 362, the automatic stay provision, it is hereby ORDERED that this case is stayed. Signed by Judge Rosemary M. Collyer on February 13, 2015. (lcrmc1) (Entered: 02/13/2015)”
“First, the United States is a plaintiff in a pending False Claims Act, 31 U.S.C. §§ 3729-33 (“FCA”), lawsuit against debtor U.S. Investigations Services, Inc. (“USIS”). The lawsuit is based on false statements and claims related to background investigations that USIS knowingly presented to, or caused to be presented to, the United States that were not reviewed in accordance with the applicable contractual obligations (“FCA Lawsuit”). (See US FCA Complaint, attached hereto as Exhibit 1.) Specifically, the FCA Lawsuit alleges that USIS devised and executed a scheme — internally characterized as “dumping” or “flushing” — to deliberately circumvent contractually required quality reviews of completed background investigations in order to increase the company’s revenues and profits. (US FCA Complaint at ¶ 42.) In addition to USIS, Altegrity and certain non-debtor officers and directors of USIS (“Non-USIS Parties”) may have liability arising from the actions alleged in the FCA Lawsuit based on those parties’ involvement. The Plan impermissibly: (1) seeks a release of the Non-USIS Parties’ FCA liabilities; and (2) extinguishes the United States’ rights relating to setoff and recoupment; and (3) potentially precludes the United States from seeking a determination of non- 1 The United States reserves its rights to supplement or amend this Objection at any time. Case 15-10226-LSS Doc 654 Filed 06/19/15 Page 3 of 23 2 dischargeability of the Debtors’ fraud liability. … Third, USIS provided background investigation services to numerous federal agencies. As such, multiple statutory, regulatory and contractual obligations require USIS to safeguard the government data in its possession. The Plan should be amended to clarify that it does not affect the Debtors’ duty to comply with their data security obligations”
“The List of Adrian Messenger is a 1963 mystery film about a retired British intelligence officer (George C. Scott) investigating a series of apparently unrelated deaths. It was directed by John Huston from a screenplay by Anthony Veiller, based on the 1959 novel of the same title by Philip MacDonald. .. A writer named Adrian Messenger (John Merivale) believes a series of apparently unrelated “accidental” deaths are actually linked murders. He asks his friend Anthony Gethryn (George C. Scott), recently retired from MI5, to help clear up the mystery. However, Messenger’s plane is bombed while he is en route to collect evidence to confirm his suspicions and, with his dying breath, he tries to tell a fellow passenger the key to the mystery.
The passenger survives and turns out to be Raoul Le Borg (Jacques Roux), Gethryn’s old World War II counterpart in the French Resistance. They join forces to investigate Messenger’s list of names, and decode Messenger’s final cryptic words. They establish that all on the list were together in a prisoner of war camp in Burma, where a Canadian sergeant, George Brougham, betrayed his fellow prisoners, foiling their escape attempt. Each has a reason to kill Brougham. It evolves that Brougham is their killer, but why? They deduce that he is about to come into prominence and cannot risk being recognised. Gethryn and Le Borg establish that he stands in line to an inheritance of the Bruttenholm family, landed gentry who are friends of Gethryn and the late Messenger, and who avidly engage in fox hunting.
Having disposed of all possible witnesses to his wartime treachery, Brougham (Kirk Douglas) appears at a Bruttenholm estate fox hunt and introduces himself as a member of the family (he has previously been seen only in disguise). It then becomes clear to the visiting Gethryn and Le Borg that Brougham’s next victim is to be the young heir, Derek. In an attempt to divert Brougham, Gethryn makes known his investigation of Messenger’s list, calculating to set himself up as the next victim.
That night, Brougham sabotages the next morning’s hunt by laying a drag with a fox in a sack over the fields. He especially marks a blind spot behind a high wall, and moves a large hay tedder behind, intending for Gethryn (who has been given the honour of leading the hunt) to be impaled upon its lethal tines. Unbeknownst to Brougham, his plan goes awry when a farmer repositions the tedder early the next morning. The hunt commences but comes to a halt at the specified spot. Gethryn reveals to the gathered crowd that he discovered and removed the hay-tedder booby trap earlier that morning and, with the help of the lead fox hound, will detect the scent of the culprit amongst a group of hunt saboteurs. Brougham, once again disguised, is identified and runs off, mounting Derek’s horse. When Derek shouts a command to the horse, the animal stops short, throwing Brougham and impaling him on the very same machine he intended for Gethryn.”
“FBI: ‘Hostile Actors’ Likely Hacked Clinton Email Secrets
Comey recommends not prosecuting presumed Democratic nominee
An extensive FBI investigation found evidence that foreign government hackers accessed private emails sent by former secretary of state Hillary Clinton but no direct evidence spies hacked into the several unsecure servers she used.
FBI Director James Comey revealed Tuesday the 11-month probe into Clinton’s private email servers uncovered negligent handling of very sensitive classified information that was placed on several unsecure servers between 2009 and 2013, when Clinton served as secretary of state.
In an unusual public announcement, Comey outlined findings that included discovery of highly classified information sent and received on Clinton’s private email servers, and signs that “hostile actors” gained access to email accounts of people who were sharing emails with Clinton.”
Jan 31, 2001
SBA modernizes to help feed its growing programs [Field McConnell’s sister Kristine Marcy introduced the 8(a) electronic accelerated loan guarantee program at SBA to ensure funding for the Serco protégés’ participating in the 9/11 carbon cap] BY PATRICIA DAUKANTAS | GCN STAFF Under a five-year plan for overhauling its information technology systems, the Small Business Administration recently acquired new software for financial and other administrative tasks.By the time SBA celebrates its 50th anniversary in 2003, agency officials want all their programs up and running around the clock, chief financial officer Joseph Loddo said.
In the first phase of the modernization, the agency has upgraded systems for managing its extensive portfolio of guaranteed loans, chief operating officer Kristine Marcy said.
SBA processed its first electronic loan last November through its Sacramento, Calif., office and plans to add more private lenders during fiscal 2001.
The agency’s staffing level has dropped 22 percent over the past eight years, which is another reason to improve IT, Marcy said. Over the past decade, SBA’s portfolio of loans to small and disadvantaged businesses has more than doubled to $50 billion.
‘We’re a small agency with a huge portfolio,’ Marcy said. SBA supplies more than half of the U.S. venture capital available each year.
Seventy percent to 80 percent of the loans are booked through a preferred lender program [structured by Serco], which involves nearly 7,000 banks, Marcy said. SBA guarantees the loans, just as the government backs student and housing loans.
‘The financial and IT businesses were changing so rapidly, we had to make some changes to stay current with the private sector,’ Marcy said. Banks had been asking SBA to make faster decisions on loan guarantees. The agency decided to aim for a turnaround time of one hour.”
“Serco do a bunch more that didn’t even make our story: As well as thanking God for his success, CEO Chris Hyman is a Pentecostal Christian who has released a gospel album in America and fasts every Tuesday. Amazingly, he was also in the World Trade Centre on 9/11, on the 47th floor addressing [Serco] shareholders. Serco run navy patrol boats for the ADF, as well as search and salvage operations through their partnership with P&O which form Defence Maritime Services. Serco run two Australian jails already, Acacia in WA and Borallon in Queensland. They’re one of the biggest companies In the UK for running electronic tagging of offenders under house arrest or parole.”
“UK Cabinet Office – Emergency Planning College – Serco …..Types of Exercise Workshop Exercises These are structured discussion events where participants can explore issues in a less pressurised environment. They are an ideal way of developing solutions, procedures and plans rather than the focus being on decision making. Table Top Exercises These involve a realistic scenario and will follow a time line, either in real-time or with time jumps to concentrate on the more important areas. The participants would be expected to be familiar with the plans and procedures that are being used although the exercise tempo and complexity can be adjusted to suit the current state of training and readiness. Simulation and media play can be used to support the exercise. Table-top exercises help develop teamwork and allow participants to gain a better understanding of their roles and that of other agencies and organisations. Command/Control Post Exercises These are designed primarily to exercise the senior leadership and support staff in collective planning and decision making within a strategic grouping.Ideally such exercises would be run from the real command and control locations and using their communications and information systems [Feeling lucky, Punk?]. This could include a mix of locations and varying levels of technical simulation support. The Gold Standard system is flexible to allow the tempo and intensity to be adjusted to ensure maximum training benefit, or to fully test and evaluate the most important aspects of a plan. Such exercises also test information flow, communications, equipment, procedures, decision making and coordination. Live Exercises These can range from testing individual components of a system or organisation through to a full-scale rehearsal. They are particularly useful where there are regulatory requirements or with high-risk situations. They are more complex and costly to organise and deliver but can be integrated with Command Post Exercises as part of a wider exercising package.”
“Serco farewell to NPL after 19 years of innovation 8 January 2015 Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco’s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade…. NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading [for Serco’s front running banks] in the City through NPL [Zulu] Time.”
“Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994. This file was obtained from the Secretary of State and has a file number of 1795583.
This business was created 7,695 days ago in the New York SOS Office and the registered agent is C T Corporation System that does business at 111 Eighth Avenue , New York in New York.
After conducting a search for principals and owners of Base One Technologies, Ltd., we were able to find 2 owners and/or executives. Their information is listed below.
This file was last updated on May 14, 2013.
Liza R Zaneri
Chief Executive Officer
15 Irving Place
New Rochelle, NY 10801”
“Serco’s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals.” http://www.dtic.mil/whs/directives/corres/pdf/100515p.pdf
Upon graduation, he was offered a position at General Electric Company (GEC) by the managing director Arnold Weinstock. He remained at GEC for 15 years, working in the company’s avionics and computing divisions, and became managing director of Avery Berkel, running the company’s UK, India, Asia and Africa operations.
After leaving GEC in 1997, Soames joined the software company Misys as chief executive of its Midas-Kapiti division. He was promoted to chief executive of the Banking and Securities Division in June 2000.
Soames left Misys after a disagreement with Misys founder Kevin Lomax on the company’s direction, and was appointed chief executive of power hire group Aggreko in June 2003, replacing Philip Harrower who died when his car collided with a train in the United States.”.”
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation