#2807: Clinton 8(a) North Tower Servers – Serco Zulu Way Points – Obama’s Flicker Jack Bridge
United States Marine Field McConnell
Plum City Online – (AbelDanger.net)
October 15, 2016
1. Abel Danger (AD) claims that Clinton Foundation donors used a network of 8(a) company servers on the 47th floor offices of Adjusters International in WTC#1 (North Tower) to synchronize the decoy, drone and demolition attacks fraudulently attributed to the Bin Laden Group on 9/11.
2. AD claims that Clinton donors including agents of HSBC and the Saudi and UK government hired Serco to impute ad hoc waypoints into Boeing decoy aircraft while Serco’s tagged offenders, apparently disguised as elevator mechanics, demolished the Twin Towers with incendiary bombs in Zulu time.
3. AD claims that Hillary Clinton recruited blackmailers from Obama’s pedophile friends in the Down Low Club of Chicago to extort Boeing into downloading patented flicker-vertigo recording devices on the Federal Bridge Certification Authority and put hijacked pilots into a trance before each attack.
4. United States Marine Field McConnell has briefed Donald Trump on how Hillary Clinton used Adjusters International’s 8(a) server networks to synchronize Boeing decoy and drone maneuvers on 9/11 with the controlled demolitions of the Twin Towers and the Pentagon’s US Navy Command Center in Zulu time.
Donald Trump explosives in the World Trade Center
Clinton Snared In Pedophile Ring, Hillary helped provide cover
Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! [Note British and Saudi Governments, AXA, HSBC, Teachers’ andGoldman Sachs]
“Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”
“Digital display device US 4788539 A ABSTRACT A digital device for visually displaying the value of a generally continuously varying function, such as car speed. The device displays subranges of a full scale, putting them individually in a viewing area. The displayed subranges in the viewing area will be replaced as required to permit representation of the input function over the full scale. The device allows selection of a new subrange with the property that the input function value initially will be at an interior position in the new subrange, thereby preventing repeated rapid switching between subranges. The subrange display can be defined using scale markers in just a few fixed positions in the viewing area. … The flickering can be a distracting visual flashing. For example, five of seven segments are changing in a transition between a “1” and a “2” digit, and several digits may be changing simultaneously. This can be dangerous, as in the case of driving an automobile. An appropriate rate of flashing may even induce “flicker vertigo” in some people, and this can produce a trance-like state.
Publication number: US4788539 A
Publication type: Grant
Application number US 06/907,234
Publication date: Nov 29, 1988
Filing date: Sep 15, 1986
Priority date: Sep 15, 1986
Fee status Lapsed
Inventors: Roger G. Frey
Original Assignee: Frey Roger G
Export Citation: BiBTeX, EndNote, RefMan
Patent Citations: (10), Referenced by (13), Classifications (5), Legal Events (5)
External Links: USPTO, USPTO Assignment, Espacenet”
“FLICKER VERTIGO WEAPON announced 3 March 2007 and used initially on THE BAKER’S DOZEN attacks of Adam Air 574 through MH370.
The latest move to combat airline terrorists follows
The Mail on Sunday’s disclosure three weeks ago that scientists in Britain and Germany are developing a passenger-monitoring device. This will use tiny cameras linked to specialist computers to record every twitch, blink, facial expression or suspicious movement made on board flights in order to identify potential terrorists. http://www.standard.co.uk/news/new-autopilot-will-make-another-911-impossible-7239651.html Boeing’s comment of 3 Mar 07: Boeing insiders say the new anti-hijack kit could be fitted to airliners all over the world, including those in the UK, within the next three years.”
“New autopilot will make another 9/11 impossible
Saturday 3 March 2007
A hijack-proof piloting system for airliners is being developed to prevent terrorists repeating the 9/11 outrages.
The mechanism is designed to make it impossible to crash the aircraft into air or land targets – and enable the plane to be flown by remote control from the ground in the event of an emergency. Read more…
• Iraq war ‘helped terrorists recruit in Britain’
• Terrorists are seeking to carry out more targeted attacks
Scientists at aircraft giant Boeing are testing the tamper-proof autopilot system which uses state-of-the-art computer and satellite technology.
It will be activated by the pilot flicking a simple switch or by pressure sensors fitted to the cockpit door that will respond to any excessive force as terrorists try to break into the flight deck.
Once triggered, no one on board will be able to deactivate the system. Currently, all autopilots are manually switched on and off at the discretion of pilots.
The so-called ‘uninterruptible autopilot system’ – patented secretly by Boeing in the US last week – will connect ground controllers and security services with the aircraft using radio waves and global satellite positioning systems.
After it has been activated, the aircraft will be capable of remote digital control from the ground, enabling operators to fly it like a sophisticated model plane, manoeuvring it vertically and laterally.
A threatened airliner could be flown to a secure military base or a commercial airport, where it would touch down using existing landing aids known as ‘autoland function’.
After it had landed, the aircraft’s built-in autobrake would bring the plane safely to a halt on the runway. Boeing insiders say the new anti-hijack kit could be fitted to airliners all over the world, including those in the UK, within the next three years.
The latest move to combat airline terrorists follows The Mail on Sunday’s disclosure three weeks ago that scientists in Britain and Germany are developing a passenger-monitoring device.
This will use tiny cameras linked to specialist computers to record every twitch, blink, facial expression or suspicious movement made on board flights in order to identify potential terrorists.
A Boeing spokesman said : “We are constantly studying ways we can enhance the safety, security and efficiency of the world’s airline fleet.
“There is a need in the industry for a technique that conclusively prevents unauthorised persons gaining access to the controls and threatening the safety of passengers.
“Once this system is initiated, no one on board is capable of controlling the flight, making it useless for anyone to threaten violence in order to gain control.”
“Christopher Rajendran Hyman CBE (born 5 July 1963 in Durban, South Africa) was Chief Executive of Serco Group plc from 2002 to October 2013. … On graduation, he worked for Arthur Andersen. In 1989, he won an 18-month exchange with Ernst & Young in London, who employed him after four months. Head hunted in 1994 by Serco, Hyman became European finance director, and in 1999 was made group finance director. In 2002, Hyman became chief executive. .. Hyman resigned from his role of Chief Executive of Serco on 25 October 2013 following allegations that Serco had overcharged government customers. .. He was [making a presentation to Serco shareholder, including British and Saudi governments] on the 47th floor of the World Trade Center [North Tower] at the time of the September 11 attacks in 2001.”
“WTC#1 North Tower 47th Floor Pacific American Corporation (CS), American TCC International Group (?UB), G.Z. Stephens, National Futures Association, Quint Amasis, W.J. Export-Import, Adjusters International, Clear Forest Corporation, First Union Securities”
“Adjusters International, formed in 1985, is a public adjusting and disaster recovery company, who assists clients with financial recovery from insurance claims and U.S. Federal Emergency Management Agency (FEMA) grants. The company’s headquarters is in Utica, New York. It has more than 40 regional offices across the United States.
Public insurance adjusters represent clients for a small percentage of the resulting settlement money from the insurance claim. Adjusters mostly represent clients who have been victim to property damage or loss. Most cases involve natural disasters including:fires, floods, hurricanes, ice damage, and earthquakes. Public adjusters are the only type of claims adjuster that can legally represent the rights of an insured during an insurance claim process.”
“Serco chief quits before investigation into electronic tagging charges
Chris Hyman says he is leaving the services company because it is the best way to mend relationship with UK government
Jill Treanor and Rajeev Syal
Friday 25 October 2013 19.20 BST
Last modified on Tuesday 19 July 201616.43 BST
The boss of government outsourcing group Serco quit to allow a new boss to be appointed from outside the troubled company.
Serco is scrambling to restore its reputation following a series of debacles ranging from failing to provide enough doctors in Cornwall to charging the government for electronic tags on dead prisoners. Chris Hyman, left with immediate effect on Friday after 20 years with the operator of hospitals, prisons and railways. He said he would “step back” from his chief executive role, held for 11 years, to allow relations with the government to be rebuilt.”
“July 7, 2016
Clinton Threat To “Destroy Everyone” Throws Washington Into Chaos
By: Sorcha Faal, and as reported to her Western Subscribers A stunning Foreign Intelligence Service (SVR) report circulating in the Kremlin today says that during President Putin’s “telephonic conversation” with President Obama yesterday, the American leader stated that Washington D.C. was in “political chaos” after former President Bill Clinton threatened to “destroy everyone” with his “blackmail files” should his wife, Hillary Clinton, be indicted for the crimes she committed against her own government and people. [Note: Some words and/or phrases appearing in quotes are English language approximations of Russian words and/or phrases having no exact counterpart.]
According to this report, President Putin was forced to personally call President Obama after Russian military commanders attempting to finalize a US initiated agreement regarding Syria proposed by the American leader last week had been continually rebuffed by the Pentagon—and that we reported on in our 4 July report titled “Prepare For War” Warns Russian Military, “Obama Is No Longer In Charge”.
Fearing President Obama was no longer in charge of his own military forces, this report continues, President Putin took it upon himself, yesterday, to personally call President Obama where an agreement on closer military cooperation between the US and Russia in regards to Syria was reached—but during that conversation, President Obama detailed to President Putin the chaos the US government was presently enduring due to former President Clinton’s threat.
Though the text of the exact words spoken between President Putin and President Obama during their call are of a higher security rating then this “general/common” SVR report allows, Russian intelligence agents contributing to it lay out a devastating timeline regarding the facts surrounding Hillary Clinton that shows:
1.) The full knowledge that the Kremlin was in possession of all of the emails from Hillary Clinton’s private computer servers was allowed to be released to the public on 6 May—and which was confirmed this week by both the FBI and US experts.
2.) President Putin, on 13 May, warning military commanders that if Hillary Clinton is elected to be the next US president “it means war”.
3.) The Investigative Committee (SLEDCOM), on 19 May, opening a war crimes file against Hillary Clinton over her illegally obtaining millions-of-dollars in bribes from the murderous Saudi regime.
4.) The SVR reporting, on 2 June, that the husband, Shahriar Zolfaghari, of Georgia’s statewide prosecutor for human trafficking Camila Wright, who was investigating former President Bill Clinton and his Clinton Foundation co-founder Jeffery Epstein for child sex charges was gunned down. [Clinton body count rises]
5.) The SVR reporting, on 13 June, that Hillary Clinton had been linked to the Orlando murders of pop singer Christina Grimmie and nearly 50 gay pride celebrants in a false flag “massacre event”.
6.) The SVR reporting, on 23 June, that former UN President John Ashe was discovered dead in his home by FBI agents who were going to escort him to testify in front of a grand jury probing Hillary Clinton. [Clinton body count rises]
7.) The SVR reporting, on 28 June, that the US Supreme Court, in an unprecedented ruling, gave Hillary Clinton a “get out of jail free” card for the many bribes she received.
8.) The SVR reporting, on 28 June, that former President Bill Clinton held a secretive meeting with US Attorney General Loretta Lynch where the final details were worked out for Hillary Clinton’s “total exoneration.”
9.) The SVR reporting, on 30 June, that Hillary Clinton was going to retain US Attorney General Loretta Lynch in office.
10.) The SVR reporting that on 1 July, the hacker known as Guccifer, who was able to obtain all of Hillary Clinton’s emails, was discovered missing from his US prison cell by FBI agents. [Potential rise of Clinton body count]
11.) The SVR reporting that on 1 July, US Attorney General Loretta Lynch made a public statement that she would abide by the decision of the FBI Director James Comey as to if charges would filed against Hillary Clinton.
12.) The SVR reporting that on 2 July, Hillary Clinton was interviewed by the FBI.
13.) The SVR reporting that on 5 July, FBI Director James Comey delivered a nationwide address in which he detailed all of Hillary Clinton’s crimes relating to her secret emails—but then said he wasn’t recommending prosecution.
14.) The SVR reporting that on 5 July, President Obama made a public appearance with Hillary Clinton just hours after FBI Director Comey’s exoneration of her stating that he was “ready to pass the baton.”
15.) The SVR reporting that on 6 July, US Attorney General Loretta Lynch issued a statement that not only wouldn’t Hillary Clinton be charged with any crimes, none of her criminal accomplices would be either.
SVR intelligence analysts contributing to this report note that by the Obama regime’s exoneration of Hillary Clinton they not only nullified 6 US Federal criminal laws, but, also, disgraced the FBI and its once stellar reputation.
Also to be destroyed by Hillary Clinton’s exoneration, this report continues, is the United States reputation as being a nation of laws that apply to everyone equally—made especially damning in the light of China sending one its top politicians to jail for life for excepting bribes this past week, and Russia itself, also this past week, firing two of its top military commanders for the mere suspicion that they were negligent in their duties.
To why the Clintons have been allowed to continue their 25-year-saga of existing outside of the laws every other American has to live by, this report concludes, is solely due to the massive blackmail files former President Bill Clinton has compiled on numerous top politicians, bankers and elites (and has threatened to release if Hillary Clinton is ever charged) containing videos and photos of them having sex with child sex slaves kept by Jeffery Epstein—and that EVERY SINGLE American news media outlet knows about, but are too terrified to report on.”
“Developments in PKI occurred in the early 1970s at the British intelligence agency GCHQ, where James Ellis, Clifford Cocks and others made important discoveries related to encryption algorithms and key distribution. However, as developments at GCHQ are highly classified, the results of this work were kept secret and not publicly acknowledged until the mid-1990s.
The public disclosure of both secure key exchange and asymmetric key algorithms in 1976 by Diffie, Hellman, Rivest, Shamir, and Adlemanchanged secure communications entirely. With the further development of high-speed digital electronic communications (the Internet and its predecessors), a need became evident for ways in which users could securely communicate with each other, and as a further consequence of that, for ways in which users could be sure with whom they were actually interacting.
Assorted cryptographic protocols were invented and analyzed within which the new cryptographic primitives could be effectively used. With the invention of the World Wide Web and its rapid spread, the need for authentication and secure communication became still more acute. Commercial reasons alone (e.g., e-commerce, online access to proprietary databases from web browsers) were sufficient. Taher Elgamal and others at Netscape developed the SSL protocol (‘https’ in Web URLs); it included key establishment, server authentication (prior to v3, one-way only), and so on. A PKI structure was thus created for Web users/sites wishing secure communications.
Vendors and entrepreneurs saw the possibility of a large market, started companies (or new projects at existing companies), and began to agitate for legal recognition and protection from liability. An American Bar Association technology project published an extensive analysis of some of the foreseeable legal aspects of PKI operations (see ABA digital signature guidelines), and shortly thereafter, several U.S. states (Utah being the first in 1995) and other jurisdictions throughout the world began to enact laws and adopt regulations. Consumer groups raised questions about privacy, access, and liability considerations, which were more taken into consideration in some jurisdictions than in others.
The enacted laws and regulations differed, there were technical and operational problems in converting PKI schemes into successful commercial operation, and progress has been much slower than pioneers had imagined it would be.
By the first few years of the 21st century, the underlying cryptographic engineering was clearly not easy to deploy correctly. Operating procedures (manual or automatic) were not easy to correctly design (nor even if so designed, to execute perfectly, which the engineering required). The standards that existed were insufficient.
PKI vendors have found a market, but it is not quite the market envisioned in the mid-1990s, and it has grown both more slowly and in somewhat different ways than were anticipated. PKIs have not solved some of the problems they were expected to, and several major vendors have gone out of business or been acquired by others. PKI has had the most success in government implementations; the largest PKI implementation to date is the Defense Information Systems Agency (DISA) PKI infrastructure for the Common Access Cards program.”
“Base One Technologies – Corporate Strategy – We are a Government Certified Women-Owned Business
We practice Diversity Recruitment and Staffing for IT positions Base One was founded in 1994 by a women engineer who had made a career in technology research for many years. Base One has been very successful in focusing on diversity recruiting and staffing for IT projects. It has been our experience that the greater the diversity mix, the more creative the solution. As in any field the more diverse the viewpoint the more thorough your analysis. Our engineers can think out of the box.
Because of our affiliations we have access to pools of resources among more diverse groups & individuals. We work with a large pool of minority professionals who specialize in IT skills. We are able to have access to these resources through our status as a D/MWBD firm and our affiliations. These affiliations assist us in working with resources among more diverse groups & individuals. We are also partnered with firms that are 8A certified as Minority firms, Disabled Veteran firms, Native American firms, Vietnam veteran firms, women owned firms.
Our hub zone location keeps us close to the professional organizations of great diversity. We are active in recruiting from and networking with these community organizations of local IT professionals. This has given us access to a large pool of diversity talent.
Base One’s staff of engineers are a diverse group of professionals. This diverse network of engineers helps us to branch out to other engineers and creates an even larger network of resources for us to work with. The greater the diversity the more complete & thorough the analysis. The broader the spectrum of points of view the broader the scope of the analysis. We feel that a diverse team gives us a greater advantage in creating cutting edge solutions. To that end we will continue to nurture these relationships to further extend our talent pool.
The greater the diversity mix, the more creative the solution.
The more diverse the viewpoint, the more thorough the analysis. The more diverse our team, the more our engineers can think out of the box.
This is why Base One Technologies concentrates on diversity recruitment in the belief that a diverse team gives us a greater advantage in creating cutting edge solutions.”
Information Security Planning is the process whereby an organization seeks to protect its operations and assets from data theft or computer hackers that seek to obtain unauthorized information or sabotage business operations.
Key Clients Benefiting From Our Information Security Expertise: Pentagon Renovation Program, FAA, Citigroup, MCI.
Base One Technologies
Expertly researches, designs, and develops information security policies that protect your data and manage your firm’s information technology risk at levels acceptable to your business.
Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report.
Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions.”
“Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994.This file was obtained from the Secretary of State and has a file number of 1795583.” “Serco’s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals.” http://www.dtic.mil/whs/directives/corres/pdf/100515p.pdf
“Opened in 1994 as the successor to the Transitional Immigrant Visa Processing Center in Rosslyn, Va., the NVC centralizes all immigrant visa pre-processing and appointment scheduling for overseas posts. The NVC collects paperwork and fees before forwarding a case, ready for adjudication, to the responsible post.
The center also handles immigrant and fiancé visa petitions, and while it does not adjudicate visa applications, it provides technical assistance and support to visa-adjudicating consular officials overseas.
Only two Foreign Service officers, the director and deputy director, work at the center, along with just five Civil Service employees. They work with almost 500 contract employees doing preprocessing of visas, making the center one of the largest employers in the Portsmouth area.
The contractor, Serco, Inc., has worked with the NVC since its inception and with the Department for almost 18 years.
The NVC houses more than 2.6 million immigrant visa files, receives almost two million pieces of mail per year and received more than half a million petitions from the U.S. Citizenship and Immigration Service (USCIS) in 2011. Its file rooms’ high-density shelves are stacked floor-to-ceiling with files, each a collection of someone’s hopes and dreams and each requiring proper handling. ….
The NVC also preprocesses the chief of mission (COM) application required for the filing of a petition for a Special Immigrant Visa (SIV). Such visas, for foreign nationals who have performed services for the U.S. government in Iraq and Afghanistan, require COM concurrence before the applicant can file a petition with USCIS. The NVC collects the requisite documents from such applicants and, when complete, forwards the package to the U.S. embassies in Baghdad or Kabul for COM approval”
“Serco farewell to NPL after 19 years of innovation 8 January 2015 Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco’s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade…. NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading [for Serco’s front running banks] in the City through NPL [Zulu] Time.”
“UK Cabinet Office – Emergency Planning College – Serco …..Types of Exercise Workshop Exercises These are structured discussion events where participants can explore issues in a less pressurised environment. They are an ideal way of developing solutions, procedures and plans rather than the focus being on decision making. Table Top Exercises These involve a realistic scenario and will follow a time line, either in real-time or with time jumps to concentrate on the more important areas. The participants would be expected to be familiar with the plans and procedures that are being used although the exercise tempo and complexity can be adjusted to suit the current state of training and readiness. Simulation and media play can be used to support the exercise. Table-top exercises help develop teamwork and allow participants to gain a better understanding of their roles and that of other agencies and organisations. Command/Control Post Exercises These are designed primarily to exercise the senior leadership and support staff in collective planning and decision making within a strategic grouping. Ideally such exercises would be run from the real command and control locations and using their communications and information systems[Feeling lucky, Punk?]. This could include a mix of locations and varying levels of technical simulation support. The Gold Standard system is flexible to allow the tempo and intensity to be adjusted to ensure maximum training benefit, or to fully test and evaluate the most important aspects of a plan. Such exercises also test information flow, communications, equipment, procedures, decision making and coordination. Live Exercises These can range from testing individual components of a system or organisation through to a full-scale rehearsal. They are particularly useful where there are regulatory requirements or with high-risk situations. They are more complex and costly to organise and deliver but can be integrated with Command Post Exercises as part of a wider exercising package.”
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation