#2925: Can Trump Link Deep-State Serco’s Fake-News Key To Con Air Marcy’s Day Care Bomb?
United States Marine Field McConnell
Plum City Online – (AbelDanger.net)
March 10, 2017
Abel Danger (AD) has explained how President Trump can link a deep-state PKI* root key allegedly used by Serco to inject fake news of Bill Clinton’s launch of a reinvention of government program on March 3, 1993 to ICE Foundation director Kristine Marcy and her alleged use of ConAir planes to remove and destroy evidence of the day-care center bomb which killed 19 children in the Murrah Building OKC on April 19, 1995 to Washington D.C., and, to carry Timothy McVeigh to the deep state murder of a patsy by lethal injection on June 11, 2001.
PKI = Public Key Infrastructure (Check Nortel spin off Entrust and 9/11 use of Joint Automated Booking System)
Abel Danger Global Operations Director Field McConnell claims that Serco’s Small Business [8(a)] Technology Companies (‘S.B.T.C’) used his ConAir founder sister Kristine Marcy to stage the JonBenét Ramsey murder in December 1996 and extort support for the transfer of U.S. government powers to the deep state through the root key custodian (UK MOD!) for the Federal Bridge Certification Authority network.
Abel Danger claims that Serco – C4I supplier to Boeing – used a BBC/MOD archive of child pornography, partly assembled by Lord Boothby (d. 1986), Clement Freud (d. 2009) and Jimmy Savile (d. 2011), to blackmail Boeing into moving its HQ to Chicago and mentoring 8(a) attacks over the federal bridge on 9/11.
Abel Danger claims that Serco provided the UK Cabinet Office with 8(a) resilience training for 9/11 when BBC pedophile elites allegedly injected fake news into media plays while 8(a) company actors, experienced journalists and television crews produced the “first live broadcast mass snuff film in human history.”
Abel Danger claims that Serco organized the late Clement Freud and Tony and John Podesta into a Pizzagate pedophile news group and tracked their virtual identities with Demon face recognition software through the crime scenes associated with the abduction of Madeleine McCann on 3 May 2007 from her bed in a holiday apartment in Praia da Luz, a resort in the Algarve region of Portugal.
Field McConnell is asking to meet with President Trump to explain how he could arrange a 14-word amendment [see brackets below] to 18 U.S. Code § 1958, to prevent Serco from injecting fake news of murder for hire and the UK outsourcer’s alleged use of deep-state assets to transport or destroy evidence of a nearly-25 year conspiracy to reinvent the American government …. “Whoever travels … with intent that a murder be committed [or news or evidence of such a murder be concealed, withheld, destroyed or faked] … and if death results, shall be punished by death or life imprisonment, or shall be fined not more than $250,000, or both.”
“Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”
“Entrust’s technology selected to be the foundation for the MoD’s PKI ecosystem [and Serco proxy control of the deep state]DALLAS – In an effort to enforce their strategy of centrally controlling policy to maintain a trusted network environment, the United Kingdom’s Ministry of Defence (MoD) sought a public key infrastructure (PKI) solution to manage authentication, digital signatures and encryption capabilities.
Entrust, Inc. [NASDAQ: ENTU] proudly announces that the company has licensed its Entrust Authority™ Security Manager to the the UK’s MoD where it is to be used as the MoD root certification authority (Root CA).”
“The National Partnership for Reinventing Government (NPR), originally the National Performance Review, was an interagency task force to reform the way the United States federal government works in the Clinton Administration. The NPR was created on March 3, 1993. It was the eleventh federal reform effort in the 20th century. In early 1998, the National Performance Review was renamed to the National Partnership for Reinventing Government.”
“TERROR IN OKLAHOMA: THE CHILDREN; Tender Memories of Day-Care Center Are All That Remain After The Bomb
By RICK BRAGG
Published: May 3, 1995 OKLAHOMA CITY, May 2— The babies used to try to grab the sunlight.
Their cribs, four of them, were always lined up next to the windows of the America’s Kids day-care center on the second floor of the Federal Building, said Melva Noakes, the 42-year-old Sunday school teacher who owned the business. …..
“I want to go to bed every night,” she said, “and say, ‘They didn’t know,’ I don’t want to believe it, because I don’t know if I could live knowing that they did mean to do it.”
Mrs. Noakes believes that the bombers did know, that they did plan to kill the children. Common sense tells her that, because the babies were in plain view of anyone in front of the building.
“I feel sorry for the man,” she said, referring to Timothy J. McVeigh, the main suspect. “Because he is so sick. No one in their right mind would pull their vehicle right under the window where the cribs were.
“You could see them there, in the windows. People always liked to walk by, on the sidewalk, and look at the babies there.”
All three of the children who are still missing are infants, the ones who slept, played and cried in the sunshine by the second-floor windows, just a few feet from the origin of the explosion.
Rescuers did find mangled tricycles, shredded teddy bears, melted dolls and pieces of carriages, but no children in the past several days. There were story books in ashes, but no toy guns.”
“Entrust’s technology selected to be the foundation for the MoD’s PKI ecosystem DALLAS – In an effort to enforce their strategy of centrally controlling policy to maintain a trusted network environment, the United Kingdom’s Ministry of Defence (MoD) sought a public key infrastructure (PKI) solution to manage authentication, digital signatures and encryption capabilities. Entrust, Inc. [NASDAQ: ENTU] proudly announces that the company has licensed its Entrust Authority™ Security Manager to the the UK’s MoD where it is to be used as the MoD root certification authority (Root CA).”
“Sean Spicer suggests there may be an organized ‘deep state’ group leftover from the Obama administration working to undermine Trump
Press Secretary Sean Spicer said it shouldn’t surprise people that some staffers from the Obama era were working for the values of the old administration
He said the CIA is not working to remove the people working for a liberal agenda
Some conservative outlets suggest leaks are a sign that there is a shadow regime
By Kaileen Gaul For Dailymail.com
PUBLISHED: 14:37 GMT, 11 March 2017 | UPDATED: 15:48 GMT, 11 March 2017
Press Secretary Sean Spicer didn’t reject the idea of ‘deep state’ at his Friday briefing, implying there may be an organized group of people leftover from the Obama administration working from within to undermine President Trump.
When asked whether or not there is a deep state, Spicer answered: ‘I think that there’s no question when you have eight years of one party in office, there are people who stay in government — and continue to espouse the agenda of the previous administration.’
‘So I don’t think it should come as any surprise there are people that burrowed into government during eight years of the last administration and may have believed in that agenda and may continue to seek it.’
‘I don’t think that should come as a surprise.’
Spicer said the CIA is not actively working to remove the people working against the administration. Deep state is the latest phrase and hashtag in the era of conspiracy theorizing that says there is a state working within a state working against the elected party.
It’s not a new expression but the way it is being used today is unique in the context of an administration that already labels news ‘fake’, facts ‘alternative’ and protesters ‘paid’.
It’s used by conservatives to condemn the alleged network of traitors and by liberals as a glimmer of hope in a Republican dominated administration.
Friday, Sean Spicer said: ‘I don’t think it should come as any surprise there are people that burrowed into government during eight years of the last administration’ The phrase ‘deep state’ originated in Turkey in response to deep state sponsored killings and engineered riots, which President Trump has tweeted about without proof
The Economist reported the phrase originated in Turkey in the 1950s in reference to deep state sponsored murders and ‘engineered riots’, something President Trump has said several times about protests to his presidency.
Last month, the president tweeted: ‘Professional anarchists, thugs and paid protesters are proving the point of the millions of people who voted to MAKE AMERICA GREAT AGAIN!’
However, the sheer amount of leaks during Donald Trump’s few months in office suggests to some that there may be people actively working against the president.
Sean Hannity said on Fox Thursday: ‘It’s time for the Trump administration to begin to purge these saboteurs before it’s too late.’ But California Representative Ted Leiu, a Democrat, suggested the deep state network is not a bad thing.
He linked an article refuting Trump’s claims that former President Obama wiretapped Trump Tower, writing: ‘We are whistleblowers, press, judges, legislators, cooks, teachers. We are #DeepState. We are the American people.’
Read more: http://www.dailymail.co.uk/news/article-4304082/Spicer-doesn-t-reject-idea-deep-state.html#ixzz4b2LjgnUw Follow us: @MailOnline on Twitter | DailyMail on Facebook”
“At 9:02 a.m., Wednesday, April 19, 1995, terrorism struck Oklahoma City, when a bomb exploded in front of the Alfred P. Murrah Federal Building. The bomb was located within the confines of a 24-foot Ryder rental truck. The explosive mixture had been prepared for charge with a detonation cord and pre-positioned, parked parallel, in a loading lane on the north side of the Murrah Building, near the intersection of N.W. 5th Street and Robinson Avenue. The force of the explosion was of such magnitude that it destroyed approximately one-third of the Murrah Building. The entire north face of the structure was reduced to rubble and each of the nine floors, plus the roof, received extensive damage. Contents of the first and second floors were blown against the southern portion of the building, while the third through ninth floors were initially raised by the blast and proceeded to pancake one atop the other at street level. When the dust cleared, approximately one-third of the structure was located in a pile of debris, measuring in some places 35-feet in height and running the length of the building. At the time of the blast, the Murrah Building housed some 600 federal and contract workers, as well as an estimated 250 visitors. Federal agencies housed in the Murrah Building included the Bureau of Alcohol, Tobacco, and Firearms; the Drug Enforcement Administration; the Secret Service; the Department of Housing and Urban Development; the Social Security Administration; the U.S. Army and U.S. Marine Corps recruitment offices; the Veterans Administration; the General Accounting Office; the Department of Health and Human Services; the Department of Defense; the U.S. Customs Service; the Department of Agriculture; the Department of Transportation; and, the General Services Administration. An office of the Federal Employees Credit Union and the “America’s Kids” Child Care Development Center were also housed in the building. (A floor plan of the Murrah Building is detailed in Exhibit A) Damage extended throughout Oklahoma City’s downtown, covering an estimated 48-square-block area.”
“Inspector General Uncovers SBA Encouraged Fraud for Over 20 Years
ASBL Uncovers Over 20 Years of Fraud Investigations at the SBA
May 06, 2015, 07:13 ET from American Small Business League PETALUMA, Calif., May 6, 2015 /PRNewswire-USNewswire/ — As early as 1995 the Small Business Administration (SBA) Inspector General uncovered rampant fraud in federal small business contracting programs. TheAmerican Small Business League (ASBL) reviewed 20 years of investigations that found the SBA clearly knew about rampant fraud, but adopted policies that encouraged fraud and protected fraudulent firms to inflate small business contracting data.
The investigation found the SBA Press Office responded to the damming Inspector General reports by claiming the fraud was the result ofmiscoding, computer glitches, anomalies and simple human error. They even released press releases claiming the fraud was a “myth.”
The Inspector General suggested in Report 5-14, “If SBA had put as much effort into verifying whether the company currently met the award’s size standard as it put into trying to find ways to earn credit towards its small business goals, then perhaps the contract action would have been awarded to a company that was legitimately small at the time of award.”
A 1995 SBA Inspector General investigation found evidence of a “particular fraudulent practice” where large businesses continued to illegally misrepresent themselves as small to hijack federal small business contracts. The Inspector General recommended the SBA to publish a list of all the fraudulent firms and circulate the list to all federal agencies to prevent the fraudulent firms from continuing to receive small business contracts.
The SBA refused to adopt the Inspector General’s recommendations. As a result, the fraudulent firms continued to receive billions of dollars in federal small business contracts. The investigations revealed the SBA has continued to knowingly include contracts to fraudulent firms in their annual small business contracting data for over 20 years.
In 2005, the SBA Inspector General released Report 5-15 that stated, “One of the most important challenges facing the Small Business Administration (SBA) and the entire Federal Government today is that large businesses are receiving small business procurement awards and agencies are receiving credit for these awards.”
Report 5-14 uncovered 66 percent of the high dollar procurement the SBA itself had reported as going to small businesses actually went to large businesses. One of those firms was Dutch corporate giant Buhrmann NV with over 26,000 employees around the world.
Report 5-16 uncovered the SBA knew large businesses were committing felony federal contracting fraud by making “false certifications” and “improper smal lbusiness self-certifications.”
A series of federal investigations have all found fraud and abuse in federal small business contracting programs. In 2009, the Government Accountability Office essentially accused the SBA of encouraging fraud. NBC, CBS, ABC, CNN, CNBC, Fox News and RTTV have all reported on the abuses.
For 20 years the SBA has refused to adopt policies to halt the fraud, but recently finalized the “safe harbor from fraud penalties” policy that helps protect fraudulent firms that are caught hijacking federal small business contracts. CONTACT: Steve Godfrey, email@example.com, 707-789-9575”
“Timothy James McVeigh (April 23, 1968 – June 11, 2001) was an American domestic terrorist convicted and executed for the detonation of an Ammonium Nitrate and Nitromethane fertilizer truck bomb in front of the Alfred P. Murrah Federal Buildingin Oklahoma City on April 19, 1995. Commonly referred to as the Oklahoma City bombing, the attack killed 168 people and injured over 600. According to the United States Government, it was the deadliest act of terrorism within the United States prior to the September 11 attacks, and remains the most significant act of domestic terrorism in United States history.
McVeigh, a Gulf War veteran, sought revenge against the federal government for its handling of the 1993 Waco siege, which ended in the deaths of 76 people exactly two years before the bombing, as well as for the 1992 Ruby Ridge incident. McVeigh hoped to inspire a revolt against the federal government. He was convicted of eleven federal offences and sentenced to death. His execution was carried out in a considerably shorter amount of time than average after his trial, as most convicts on death row in the United States spend an average of fifteen years awaiting execution. Four years after his conviction, McVeigh was executed by lethal injection on June 11, 2001, at the Federal Correctional Complex in Terre Haute, Indiana, exactly three months before the September 11 attacks. Terry Nichols and Michael Fortier were also convicted as conspirators in the plot. Terry Nichols was sentenced to 161 life terms without parole. Fortier was sentenced to 12 years and has since been released.”
28 November 2001
Global swoop on newsgroup paedophiles
By Will Knight
More than 130 people in 19 different countries have been arrested or are under investigation after police traced the distribution of child pornography through different internet newsgroups.
Technical experts at UK internet service provider Demon Internet aided officers from the National Crime Squad’s new Hi-Tech Crime Unit with the investigation.
A spokesperson from Thus, Demon’s parent company, says that investigators were not given access to the server logs that record Demon users’ activities.
Investigators were simply provided with access to newsgroup postings in the same way as any other Demon customer. Technical experts from Demon then helped officers distinguish the identifying information contained within the message “headers” of particular postings.
Officers traced postings relating to certain images to different internet service providers around the world and then contacted Interpol to track down suspects.
Investigators say they discovered 10,000 suspect postings to over 30 different newsgroups and identified 60,000 new images. They plan to use face recognition software to identify victims in different images, to help trace them. This software has been developed in conjunction with UK company Serco, although no technical details have been released”.
“Serco Awarded $95 Million Patent Classification Contract with the U.S. Patent and Trademark Office
November 30, 2015
RESTON, VA – November 30, 2015 – Serco Inc., a provider of professional, technology, and management services, announced today the Company has been awarded a patent classification services contract with the United States Patent and Trademark Office (USPTO). Serco will provide initial patent classification and reclassification services to support USPTO’s core mission of examining, granting, and disseminating patents and trademarks. The recompete contract has a one-year base period with four one-year option periods, and is valued at $95 million over the five-year period, if all options and award terms are exercised.”
“Serco: Is it a company or a sovereign power?
Posted on 2010 October 5 | Leave a comment
SERCO – The Biggest Company You’ve Never Heard Of From Australian television [2:49] If one single company had to be chosen as the exemplar of the military/industrial complex, esnl’s pick would be Serco, a British company created in 1929 as a local branch of Radio Corporation of America.
Today the firm runs air traffic control towers in the U.S., immigration detention centers in Australia, schools and the anti-missile defense system in Britain, and much, much more.
Of special interest to us is the company’s growing role in the espionage world and intelligence world, especially here in the U.S., where it is based in Reston, Virginia, the nation’s capital of corporate spookery.
According to Crocodyl, the company holds contracts with an alphabet soup of three- and four-letter agencies, including the National Security Agency [NSA], National Geospatial-Intelligence Agency [NGA], the Defense Information Systems Agency (DISA), Office of Naval Intelligence, the Air Force Information Warfare Center, and the Department of Defense.
Here’s an example of the folks who work for Serco, from a new hire announcement posted by the company two years ago: Serco Inc., a provider of professional, technology, and management services to the federal government, announced today that Maureen Baginski has been named Vice President of the intelligence business and National Security Advisor at Serco. … From 2003 to 2005, Ms. Baginski served as the FBI’s Executive Assistant Director for Intelligence where she was responsible for establishing and managing the FBI’s first-ever intelligence program. Her mission was to adapt FBI intelligence capabilities with information technologies to create an intelligence-sharing operation that could identify threats before they became attacks.
From 1979 to 2003, Ms. Baginski served at the National Security Agency (NSA), where she held a variety of positions, including Signals Intelligence (SIGINT) Director, Senior Operations Officer in the National Security Operations Center; Executive Assistant to the Director of NSA/Central Security Service, Chief Officer of the Director; Assistant Deputy Director of Technology and Systems; and lead analyst for the Soviet Union. As SIGINT Director, Ms. Baginski successfully established and directed a unified program to exploit encrypted or denied information on global networks. Leading the NSA’s Signals Intelligence Directorate, the Nation’s high technology cryptology organization, she managed a complex and geographically dispersed distributed information production enterprise.
The company’s CEO is an India-born Pentecostal Christian [shades of Dinesh D’Souza], and is profiled here by The Guardian’s Janice Martinson in 2006.”
“DHS ICE OTD … Since 1986, through various contracts, Serco has provided full training lifecycle support for all areas of this key Law Enforcement organization including Inspections, Border Patrol, Enforcement, and DHS operations at the Federal Law Enforcement Training Academy in Glynco, GA. .. Serco developed and scripted three scenarios based on negligent practices identified by the IG report that have resulted in the use of lost or uncontrolled weapons for robbery, murder, and the accidental death of a child. We used creative animation techniques, sound effects, music, and talented voice actors playing multiple characters to create an emotional appeal much different—and infinitely more powerful—from the standard WBT offering.
Serco has trained more than 400,000 DHS students in every region and district, at every land, air and sea border crossing, in classrooms, through WBT, train-the-trainer programs, on-the-job training and through the implementation of performance support systems in a blended learning environment. In collaboration with ICE OTD, our latest efforts have resulted in the accreditation and completion of three programs, including HSI FOTP, ICE OTD IDC, and ICE OPR. Serco was integral to the ICE team that was recognized by the 2012 “Excellence in Law Enforcement” Award given to the ICE Domestic Field Operations Training Program (DFTOP) Accreditation Project for having greatly improved ICE training, increasing operational efficacy and efficiency, and minimizing safety issues to ICE officers and the public.”
“Serco Combined Resilience Exercising
Types of Exercise Workshop Exercises These are structured discussion events where participants can explore issues in a less pressurized environment.
They are an ideal way of developing solutions, procedures and plans rather than the focus being on decision making. Table Top Exercises These involve a realistic scenario and will follow a time line, either in real-time or with time jumps to concentrate on the more important areas. The participants would be expected to be familiar with the plans and procedures that are being used although the exercise tempo and complexity can be adjusted to suit the current state of training and readiness. Simulation and media play can be used to support the exercise. Table-top exercises help develop teamwork and allow participants to gain a better understanding of their roles and that of other agencies and organisations.
Command/Control Post Exercises These are designed primarily to exercise the senior leadership and support staff in collective planning and decision making within a strategic grouping. Ideally such exercises would be run from the real command and control locations and using their communications and information systems. This could include a mix of locations and varying levels of technical simulation support. The GoldStandard system is flexible to allow the tempo and intensity to be adjusted to ensure maximum training benefit, or to fully test and evaluate the most important aspects of a plan. Such exercises also test information flow, communications, equipment, procedures, decision making and coordination.
Simulation and Media Support The method of delivering an exercise is flexible and will be designed with the client to meet their requirements with options ranging from simple paper-based delivery through to full use of their real communications systems [Red Switch Network and Hawkeye onion router surveillance aircraft] and advance computer simulation [In Trump’s death pool and war room suites]. In addition, media play can also be added in the form of news injects and the provision of experienced journalists and television crews to help test procedures and also assist in training key staff.
Gold Standard Emergency Planning College The Hawkhills, Easingwold, York North Yorkshire, YO61 3EG +44(0) 1347 821406 firstname.lastname@example.org www.epcollege.com”
Board Director The National Academy of Public Administration (NAPA) Kristine M. Marcy served as President and CEO of the National Academy of Public Administration, a non-profit organization chartered by Congress and dedicated to improving Government from January 2011 to June 30, 2011 at the unanimous request of the Board of Directors. Ms. Marcy is a retired federal executive with over 30 years of experience in ten federal departments and agencies including Small Business Administration, Department of Justice Immigration and Naturalization Service, DOJ U.S. Marshals Service, and DOJ Office of the Deputy Attorney General. During her career, Ms. Marcy blended deep technical knowledge with extensive hands-on experience to assist agencies in both operational and leadership positions. Post retirement, Ms. Marcy was an executive consultant for McConnell International, a Government Relations consulting firm, and brought her considerable network of contacts and her direct knowledge of many US federal agencies to help private sector clients develop business strategies.”
“Serco’s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies.Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals.”
“Contact 111 Eighth Avenue New York, NY 10011 Description Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994. This file was obtained from the Secretary of State and has a file number of 1795583.” ….
“Base One Technologies – Corporate Strategy – We are a Government Certified Women-Owned Business We practice Diversity Recruitment and Staffing for IT positions Base One was founded in 1994 by a women engineer who had made a career in technology research for many years. ..We are also partnered with firms that are 8A certified as Minority firms, Disabled , Native American firms, Vietnam veteran firms, women owned firms. .. Base One’s staff of engineers are a diverse group of professionals. This diverse network of engineers helps us to branch out to other engineers and creates an even larger network of resources for us to work with. .. Information Security Planning is the process whereby an organization seeks to protect its operations and assets from data theft or computer hackers that seek to obtain unauthorized information or sabotage business operations. Key Clients Benefiting From Our Information Security Expertise: Pentagon Renovation Program, FAA, Citigroup, MCI. .. Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report. Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions.”
“The 8(a) Business Development Program assists in the development of small businesses owned and operated by individuals who are socially and economically disadvantaged, such as women and minorities. The following ethnic groups are classified as eligible: Black Americans; Hispanic Americans; Native Americans (American Indians, Eskimos, Aleuts, or Native Hawaiians); Asian Pacific Americans (persons with origins from Burma, Thailand, Malaysia, Indonesia, Singapore, Brunei, Japan, China (including Hong Kong), Taiwan, Laos, Cambodia (Kampuchea), Vietnam, Korea, The Philippines, U.S. Trust Territory of the Pacific Islands (Republic of Palau), Republic of the Marshall Islands, Federated States of Micronesia, the Commonwealth of the Northern Mariana Islands, Guam, Samoa, Macao, Fiji, Tonga, Kiribati, Tuvalu, or Nauru); Subcontinent Asian Americans (persons with origins from India, Pakistan, Bangladesh, Sri Lanka, Bhutan, the Maldives Islands or Nepal). In 2011, the SBA, along with the FBI and the IRS, uncovered a massive scheme to defraud this program. Civilian employees of the U.S. Army Corps of Engineers, working in concert with an employee of Alaska Native Corporation Eyak Technology LLC allegedly submitted fraudulent bills to the program, totaling over 20 million dollars, and kept the money for their own use. It also alleged that the group planned to steer a further 780 million dollars towards their favored contractor.”
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation