United States Marine Field McConnell Plum City Online – (AbelDanger.net) August 14, 2016
1. Abel Danger (AD) claims that Serco has been mentoring long-range snuff-film production crews through its 8(a) protégé companies since Feb 15, 1994 when former U.S. Secretary of State Warren Christopher formed Base One Technologies Ltd in New York (File # 1795583).
2. AD claims that then Secretary Clinton ordered the Office of Personnel Management and USIS to dump up to a million security-clearance files into the Base One server network so she and her aides could deploy crisis actors to Serco’s 8(a)snuff-film locations such as Benghzai on 9/11-12/12.
3. AD claims that the former senior advisor in International Affairs at the Association for Payment Clearing Services, Theresa May, and her UK Cabinet Office aides are using Serco’s HSBC bankers at Canada Square to bet on 8(a) snuff-film deaths in Zulu time (cf. Pentagon bomb 17:37:19).
4. United States Marine Field McConnell offers to show Donald Trump how to neutralize the long-range risks from the USIS file dumps and bring Clinton, May and Serco’s Canada Square bankers to justice for their role in the wrongful deaths associated with the Benghazi digital fires.
Obama and Hillary Blame Youtube Video for Benghazi Terrorist Attack as Coffins Arrive
BLUE MOUNTAIN GROUP VIDEO
WOW! Hillary laughingly testifies that Chris Stevens was JOKING when asking for MORE SECURITY!!
Comey: Clinton Made United States Secrets Vulnerable To Hostile Actors
War is War; Westhusing in Iraq
Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders!
[Note HSBC, British and Saudi Governments, HSBC, Teachers’ and Goldman Sachs]
Hillary Clinton – What difference does it make?
Defense Ammunition Center [Outsourced to Serco]
Top HSBC [Serco’s dirty banker] Executive Arrested In US For Front-Running Trades
White’s Club death-bet bookmaker service dates back to 1743 only the technology to spot fix the Zulu time of victim death has changed.
Serco… Would you like to know more?
“Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”
BLUE MOUNTAIN GROUP June 20, 2016 My recent article on the G4S Security firm and its connection to the Orlando Shooter and the Department of Homeland Security has generated a tremendous response. Many people have asked if the G4S Company was involved with providing security for our consulate in Benghazi when it was attacked on September 11, 2012 and four brave Americans were murdered. The firm in charge of security at Benghazi was the Blue Mountain Group, and I have not uncovered any relationship between it and G4S other than the fact that the G4S headquarters is in England and Blue Mountain is in Wales. However, what occurred with Blue Mountain makes its employment by Hillary Clinton and the State Department just as much of a scandal as that involving G4S. Much of this information was reported by the Reuters News service in October of 2012, but it accepted the State Department’s explanation as to the reason for hiring the Blue Mountain Group. The department claimed that federal law required it to accept the lowest bidder for all contracts, however, I don’t buy this explanation and based on my research have reached a different and far more insidious explanation. According to the Reuters article Blue Mountain employed local Libyans as security guards that went through no real background checks and were poorly trained. They were not allowed to carry firearms, and were told that they had to patrol the compound with flashlights and batons. They were also instructed that if they detected an impending threat to the consulate they were to radio that in and then runaway and hide. In fact, I have found no records that prove that Blue Mountain Group was hired for Benghazi security because it was the low bidder. There were many other security firms that had very good reputations, provided armed guards, and were providing adequate security to U.S. Embassies and other facilities around the world. Yet, it appears that none of them were offered the Benghazi contract. I believe that based on my research Blue Mountain Group was hired because it was the only company to agree to Hillary Clinton’s demand that the firm provide guards who were not carrying firearms in what was clearly a dangerous area of the world. This makes no sense. Was it some form of insane political correctness that caused the Secretary of State to prohibit consular security from having armed guards that may have been able to save the lives of Americans who were working for our country and Hillary Clinton? Unfortunately, there is more to this story. It is clear that the Benghazi attack was well planned and organized, and that the attackers knew when Ambassador Chris Stevens was going to be in Benghazi, where he would be in the compound, and what type of security would be protecting him. I can only identify two possible sources that could have provided this information. First is that one or more of the security employees hired by BlueMountain gave the information to the terrorists that launched the attack. There had already been one previous incident involving the local security guards. Two of them were suspected of actually throwing a firebomb into the compound. One was fired, but the other stayed on the payroll. The other possible source of the breach of security is the private server illegally maintained by Clinton. Several emails have been uncovered that detailed the itinerary and movements of Ambassador Chris Stevens prior to the day of the attack. Whether it was the betrayal of a Libyan security guard, or a hacking of the email server, it occurred under Hillary Clinton’s watch. At best she is guilty of gross negligence, and violation of federal laws regarding private email servers, so who else has been put at risk? Now she wants to be our President!”
“Benghazi attacks may have involved two different groups, say US commanders
Mortar strike on CIA complex seen as opportunistic, militarised operation triggered by earlier burning of diplomatic mission
Associated Press in Washington
Thursday 10 July 2014 03.24 BSTLast modified on Wednesday 11 May 201622.45 BST
Newly revealed testimony from US military commanders involved in the response to the Benghazi attacks in 2012 suggests that the perpetrators of a second, dawn attack on a CIA complex probably were different from those who penetrated the US diplomatic mission the evening before and set it ablaze, killing the ambassador, Chris Stevens, and another American.
The second attack, which killed two security contractors, showed clear military training, retired General Carter Ham told Congress in closed-door testimony released late on Wednesday. The assault probably was the work of a new team of militants, seizing on reports of violence at the diplomatic mission in Libya the night before and hitting the Americans while they were most vulnerable.
The testimony was seen by the Associated Press prior to its release and adds further detail about the events of 11 September 2012, which have stirred bitter recriminations in the US, including Republican-led congressional investigations and campaign-season denunciations of the Obama administration because it made inaccurate statements about the attacks. The testimony underscores a key detail that sometimes has been lost in the debate: that the attacks were two distinct events over two days on two different buildings, perhaps by unrelated groups.
The US government still has not fully characterised the first attack in which, according to Ham and eight other military officers, men who seemed familiar with the lightly protected diplomatic compound breached it and set it on fire, killing Stevens and communications specialist Sean Smith. A mob of looters then overran the facility.
In testimony to two House of Representatives panels earlier this year, the officers said that commanders did not have the information they needed to understand the nature of the attack, that they had been unaware of the extent of the US presence in Benghazi at the time, and were convinced erroneously for a time that they were facing a hostage crisis without the ability to move military assets into place that would be of any use.
The testimony reveals how little information the military had on which to base an urgent response.
Four Americans died in Benghazi, including Stevens. To this day, despite the investigations, it is not clear if the violence resulted from a well-planned, multi-phase militarised assault or from a loosely connected, escalating chain of events.
In their testimony military officials expressed some uncertainty about the first attack, describing protests and looting in an assault that lasted about 45 minutes. The military attache to the US embassy in Tripoli told Congress the first attack showed some advance planning. The Libyan police officer guarding the diplomatic compound fled as it began.
The defence attache, whose name was not released, suggested the attackers “had something on the shelf” an outline of a plan based on previously obtained information about the compound and its security measures, so were ready to strike when the opportunity arose.
Ham testified that the second attack, which killed security officers Tyrone Woods and Glen Doherty at the annexe at the diplomatic compound where the assault began the night before, showed clear military training. It was probably the work of a new team of militants seizing the moment after reports of violence at the first site and American vulnerability.
“Given the precision of the attack it was a well-trained mortar crew, and in my estimation they probably had a well-trained observer,” said Ham, who headed the US command in Africa. The second attack showed “a degree of sophistication and military training that is relatively unusual and certainly, I think, indicates that this was not a pickup team. This was not a couple of guys who just found a mortar someplace”.
The attacks came as President Barack Obama was in a close re-election battle, campaigning in part on the contention that al-Qaida no longer posed a significant threat to the United States. A terror attack on American assets could have damaged that argument.
Five days after the attack UN ambassador Susan Rice linked the Benghazi attacks to protests in Tunisia and Cairo over an anti-Islam video. Weeks later US officials retracted that account but never fully articulated a new one.
Republicans seized on the inaccuracies, contending that the Obama administration was covering up a terror attack for political gain. Several congressional and independent investigations have faulted the State Department for inadequate security but have not provided a full reading of who was involved in the violence, what the motives were and how they could pull off such a seemingly complicated, multi-pronged assault.
The congressional testimony that distinguishes the attacks came from military officials in Tripoli or, like Ham, co-ordinating the response in Washington. Most have never given a public account. But they agreed that confusion reigned from the outset.
“We’re under attack,” was the first report the military received from Benghazi. That message came from Stevens’s entourage to Tripoli in the late afternoon of 11 September. Word was relayed to the defence attache, who reported up the chain of command.
Once the first attack ended around 10pm the military moved to evacuate Americans from Benghazi, while preparing for what it erroneously believed might have been an emerging hostage situation involving Stevens. In fact Stevens died of smoke inhalation after the diplomatic post was set on fire in the first attack.
Seven and a half hours later, at dawn, mortars crashed on a CIA compound that had been unknown to top military commanders.
The Obama administration last month apprehended its first suspect, Ahmed Abu Khattala, and brought him to the US to stand trial on terrorism charges.
The US Justice Department maintains in court documents that Abu Khattala was involved in both attacks and describes the first breach on the diplomatic post as equally sophisticated. The government said a group of about 20 men, armed with AK-47 rifles, handguns and rocket-propelled grenade launchers, stormed the diplomatic facility in the first attack.
Abu Khattala supervised the looting after Americans fled, the government says, and then returned to the camp of the Islamist militant group Ansar al-Sharia, where the Justice Department says a large force began assembling for the second attack. The Justice Department provided no supporting documentation for those conclusions.
Abu Khattala’s lawyer says the government has failed to show that he was connected to either attack.”
The federal government has reached a settlement worth at least $30 million with Altegrity Inc., the parent of an employment screening business that had been accused of fraud in a whistleblower lawsuit.
The U.S. Justice Department said Wednesday that Altegrity and its subsidiary U.S. Investigations Services Inc., or USIS, have agreed to a deal resolving claims that USIS raked in tens of millions of taxpayer dollars while failing to conduct quality reviews of completed background checks. The government claimed USIS committed fraud through a practice USIS employees referred to internally as “dumping” or “flushing” unfinished investigations. The practice involved USIS employees releasing to the U.S. Office of Personnel Management cases that hadn’t undergone a contractually required quality review.
“Shortcuts taken by any company that we have entrusted to conduct background investigations of future and current federal employees are unacceptable,” said Benjamin C. Mizer, head of the Justice Department’s civil division. “The Justice Department will ensure that those who do business with the government provide all of the services for which we bargained.” Whistleblower Blake Percival, a former USIS employee, first exposed the alleged dumping in a lawsuit filed in 2011, which was later joined by the Justice Department. According to the suit, USIS’s bonuses depended on speedy completion of security investigations, and the system was allegedly geared to ensure the bonus money came in even if the goals weren’t met.
As part of the settlement, USIS and Altegrity have agreed to forgo the more than $30 million they said the government still owed them under their contract. An Altegrity spokesman declined to comment.
USIS was created in 1996 from the privatization of a unit of the OPM, and for years it held a lucrative contract to conduct security-clearance background investigations for federal agencies. It vetted Edward Snowden for work at the National Security Agency, and it vetted Aaron Alexis, a federal contractor who shot and killed 12 people at the Washington Navy Yard in 2013. Last year, USIS was hit with a cyberattack that exposed the files of tens of thousands of Department of Homeland Security employees.
The whistleblower suit was unrelated to the background screenings conducted on Messrs. Snowden and Alexis and USIS has previously denied any shortcomings connected to those investigations. USIS said an independent investigation concluded it wasn’t at fault in the hacking incident.
Buyout firm Providence Equity Partners LLC bought USIS in 2007 and later folded it into its private-company security and employment-screening businesses, Kroll and HireRight, to create Altegrity. But the government didn’t renew USIS’s contracts after the cyberattack, helping push the company into chapter 11 bankruptcy reorganization.
Altegrity filed for protection from creditors in February after losing its government contracts and hopes to emerge from chapter 11 reorganization later this month with Kroll and HireRight intact. Under the company’s chapter 11 plan, approved by a bankruptcy judge last week, creditors are taking control of the new Altegrity, and USIS will be left behind in chapter 11 to be liquidated.
The settlement of USIS’s liability under the False Claims Act is part of a broader deal that also resolves other matters between the U.S. and Altegrity in the bankruptcy case. The government said Mr. Percival’s share of the settlement hasn’t yet been determined.
“STAYED, TYPE-E U.S. District Court District of Columbia (Washington, DC) CIVIL DOCKET FOR CASE #: 1:14-cv-00726-RMC PERCIVAL v. U.S. INVESTIGATION SERVICES, LLC Assigned to: Judge Rosemary M. Collyer Case in other court: USDC for the Middle District of Alabama, 2:11cv00527-WKW Cause: 31:3729 False Claims Act Date Filed: 04/25/2014 Jury Demand: Plaintiff Nature of Suit: 890 Other Statutory Actions Jurisdiction: Federal Question … MINUTE ORDER. On consideration of Defendant’s 31 Notification of Bankruptcy pursuant to Title 11 of the United States Code, 11 U.S.C. § 101 et. seq. and in accordance with 11 U.S.C. § 362, the automatic stay provision, it is hereby ORDERED that this case is stayed. Signed by Judge Rosemary M. Collyer on February 13, 2015. (lcrmc1) (Entered: 02/13/2015)“
“First, the United States is a plaintiff in a pending False Claims Act, 31 U.S.C. §§ 3729-33 (“FCA”), lawsuit against debtor U.S. Investigations Services, Inc. (“USIS”). The lawsuit is based on false statements and claims related to background investigations that USIS knowingly presented to, or caused to be presented to, the United States that were not reviewed in accordance with the applicable contractual obligations (“FCA Lawsuit”). (See US FCA Complaint, attached hereto as Exhibit 1.) Specifically, the FCA Lawsuit alleges that USIS devised and executed a scheme — internally characterized as “dumping” or “flushing” — to deliberately circumvent contractually required quality reviews of completed background investigations in order to increase the company’s revenues and profits. (US FCA Complaint at ¶ 42.) In addition to USIS, Altegrity and certain non-debtor officers and directors of USIS (“Non-USIS Parties”) may have liability arising from the actions alleged in the FCA Lawsuit based on those parties’ involvement. The Plan impermissibly: (1) seeks a release of the Non-USIS Parties’ FCA liabilities; and (2) extinguishes the United States’ rights relating to setoff and recoupment; and (3) potentially precludes the United States from seeking a determination of non- 1 The United States reserves its rights to supplement or amend this Objection at any time. Case 15-10226-LSS Doc 654 Filed 06/19/15 Page 3 of 23 2 dischargeability of the Debtors’ fraud liability. … Third, USIS provided background investigation services to numerous federal agencies. As such, multiple statutory, regulatory and contractual obligations require USIS to safeguard the government data in its possession. The Plan should be amended to clarify that it does not affect the Debtors’ duty to comply with their data security obligations”
“FBI: ‘Hostile Actors’ Likely Hacked Clinton Email Secrets
Comey recommends not prosecuting presumed Democratic nominee
An extensive FBI investigation found evidence that foreign government hackers accessed private emails sent by former secretary of state Hillary Clinton but no direct evidence spies hacked into the several unsecure servers she used.
FBI Director James Comey revealed Tuesday the 11-month probe into Clinton’s private email servers uncovered negligent handling of very sensitive classified information that was placed on several unsecure servers between 2009 and 2013, when Clinton served as secretary of state.
In an unusual public announcement, Comey outlined findings that included discovery of highly classified information sent and received on Clinton’s private email servers, and signs that “hostile actors” gained access to email accounts of people who were sharing emails with Clinton.”
Jan 31, 2001
SBA modernizes to help feed its growing programs [Field McConnell’s sister Kristine Marcy introduced the 8(a) electronic accelerated loan guarantee program at SBA to ensure funding for the Serco protégés’ participating in the 9/11 carbon cap] BY PATRICIA DAUKANTAS | GCN STAFF
Under a five-year plan for overhauling its information technology systems, the Small Business Administration recently acquired new software for financial and other administrative tasks.
By the time SBA celebrates its 50th anniversary in 2003, agency officials want all their programs up and running around the clock, chief financial officer Joseph Loddo said.
In the first phase of the modernization, the agency has upgraded systems for managing its extensive portfolio of guaranteed loans, chief operating officer Kristine Marcy said.
SBA processed its first electronic loan last November through its Sacramento, Calif., office and plans to add more private lenders during fiscal 2001.
The agency’s staffing level has dropped 22 percent over the past eight years, which is another reason to improve IT, Marcy said. Over the past decade, SBA’s portfolio of loans to small and disadvantaged businesses has more than doubled to $50 billion.
‘We’re a small agency with a huge portfolio,’ Marcy said. SBA supplies more than half of the U.S. venture capital available each year.
Seventy percent to 80 percent of the loans are booked through a preferred lender program [structured by Serco], which involves nearly 7,000 banks, Marcy said. SBA guarantees the loans, just as the government backs student and housing loans.
‘The financial and IT businesses were changing so rapidly, we had to make some changes to stay current with the private sector,’ Marcy said. Banks had been asking SBA to make faster decisions on loan guarantees. The agency decided to aim for a turnaround time of one hour.”
“Serco do a bunch more that didn’t even make our story: As well as thanking God for his success, CEO Chris Hyman is a Pentecostal Christian who has released a gospel album in America and fasts every Tuesday. Amazingly, he was also in the World Trade Centre on 9/11, on the 47th floor addressing [Serco] shareholders. Serco run navy patrol boats for the ADF, as well as search and salvage operations through their partnership with P&O which form Defence Maritime Services. Serco run two Australian jails already, Acacia in WA and Borallon in Queensland. They’re one of the biggest companies In the UK for running electronic tagging of offenders under house arrest or parole.”
“UK Cabinet Office – Emergency Planning College – Serco …..Types of Exercise Workshop Exercises These are structured discussion events where participants can explore issues in a less pressurised environment. They are an ideal way of developing solutions, procedures and plans rather than the focus being on decision making. Table Top Exercises These involve a realistic scenario and will follow a time line, either in real-time or with time jumps to concentrate on the more important areas. The participants would be expected to be familiar with the plans and procedures that are being used although the exercise tempo and complexity can be adjusted to suit the current state of training and readiness. Simulation and media play can be used to support the exercise. Table-top exercises help develop teamwork and allow participants to gain a better understanding of their roles and that of other agencies and organisations. Command/Control Post Exercises These are designed primarily to exercise the senior leadership and support staff in collective planning and decision making within a strategic grouping.Ideally such exercises would be run from the real command and control locations and using their communications and information systems [Feeling lucky, Punk?]. This could include a mix of locations and varying levels of technical simulation support. The Gold Standard system is flexible to allow the tempo and intensity to be adjusted to ensure maximum training benefit, or to fully test and evaluate the most important aspects of a plan. Such exercises also test information flow, communications, equipment, procedures, decision making and coordination. Live Exercises These can range from testing individual components of a system or organisation through to a full-scale rehearsal. They are particularly useful where there are regulatory requirements or with high-risk situations. They are more complex and costly to organise and deliver but can be integrated with Command Post Exercises as part of a wider exercising package.”
“Serco farewell to NPL after 19 years of innovation 8 January 2015 Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco’s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade…. NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading [for Serco’s front running banks] in the City through NPL [Zulu] Time.”
“Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994. This file was obtained from the Secretary of State and has a file number of 1795583.
This business was created 7,695 days ago in the New York SOS Office and the registered agent is C T Corporation System that does business at 111 Eighth Avenue , New York in New York.
After conducting a search for principals and owners of Base One Technologies, Ltd., we were able to find 2 owners and/or executives. Their information is listed below.
This file was last updated on May 14, 2013.
Liza R Zaneri
Chief Executive Officer
15 Irving Place
New Rochelle, NY 10801″
“Serco’s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals.” http://www.dtic.mil/whs/directives/corres/pdf/100515p.pdf
Upon graduation, he was offered a position at General Electric Company (GEC) by the managing director Arnold Weinstock. He remained at GEC for 15 years, working in the company’s avionics and computing divisions, and became managing director of Avery Berkel, running the company’s UK, India, Asia and Africa operations.
After leaving GEC in 1997, Soames joined the software company Misys as chief executive of its Midas-Kapiti division. He was promoted to chief executive of the Banking and Securities Division in June 2000.
Soames left Misys after a disagreement with Misys founder Kevin Lomax on the company’s direction, and was appointed chief executive of power hire group Aggreko in June 2003, replacing Philip Harrower who died when his car collided with a train in the United States.”.”
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation