US Quite Invasion of Syria

Source: armywtfmoments.com

Defense Department identifies soldier killed in Syria

May 27, 2017

A U.S. service member was killed in northern Syria on Thursday.

Etienne J. Murphy, 22, was an infantryman assigned to Bravo Company, 1st Battalion, 75th Ranger Regiment at Hunter Army Airfield, Georgia. Spc. Murphy, died in Al-Hasakah, Syria, of injuries sustained during a vehicle rollover related incident, according to the Pentagon.

Officials said he was on his first deployment.

He was born in May 1995 in Boston and enlisted in the U.S. Army from his hometown of Snellville, Georgia in June 2013.

The Army said Murphy’s awards and decorations include the Parachutist Badge, Army Achievement Medal with 3 OLC, Army Good Conduct Medal, National Defense Service Medal, Global War on Terrorism Service Medal, Army Service Ribbon, NATO Medal, and Operation Inherent Resolve Campaign Medal with Campaign Star.

Murphy was posthumously awarded the Army Commendation Medal.

The United States has slightly more than 900 military personnel in Syria to advise and assist Kurdish and Arab rebel forces fighting ISIS.

Two other American service members have died in Syria since U.S. troops arrived there in early 2016.

Navy Senior Chief Petty Officer Scott C. Dayton, 42, was killed by an improvised explosive device in northern Syria on Nov. 24, 2016.

U.S. Air Force Staff Sgt. Austin L. Bieren, 25, died from suspected natural causes while deployed to northern Syria on March 28.

The History of the Neocon Takeover of the USA

Source: Forbidden KnowledgeTV

May 27, 2017

The History of the Neocon Takeover of the USA

This is the interview I just did with authors, Elizabeth Gould and Paul Fitzgerald, who have written a definitive 4-part article on the origins and the history of the Neocon movement. The influence of the Neoconservatives has been catastrophic to the American government – and to much of the world, yet as they point out, it never seems to end. The authors describe it as an elitist cult; a rabid ideology which doesn’t rely on facts to justify itself.

Senator J. William Fulbright identified the Neocons’ irrational system for making endless war in Vietnam 45 years ago, in a New Yorker article titled Reflections in Thrall to Fear: “Cold War psychology is the totally illogical transfer of the burden of proof from those who make charges to those who question them”, leading to “The ultimate illogic: war is the course of prudence and sobriety until the case for peace is proved under impossible rules of evidence [or never] – or until the enemy surrenders. Rational men cannot deal with each other on this basis…But these were not rational men and their need to further their irrational quest only increased with the loss of the Vietnam War.”

This same ideology drove the failed War in Iraq – and now, they’re at it again, with their foolhardy saber-rattling towards Russia.

The birth of the Neocon movement grew out of what had previously been known within the Eastern Establishment as “Team B”, in which official policies were tested by “competitive analysis”. The first Team B was created by George H. W. Bush, while he was Director of the CIA. This brought together very unlikely bedfellows, such as the ex-Trotskyite, James Burnham and Right Wing business interests, both of whom lobbied heavily for big military budgets, advanced weapons systems and aggressive action to confront Soviet Communism.

This Team B/Neocon doomsday cult managed to weather the defeat of the Vietnam War and their non-fact-based analyses continue to maintain a stranglehold on US policy.

James Burnham‘s nihilist, elitist vision was criticized by George Orwell in his 1946 essay, Second Thoughts on James Burnham, in which he wrote, “What Burnham is mainly concerned to show [in the latter’s book, The Machiavellians] is that a democratic society has never existed and, so far as we can see, never will exist. Society is of its nature oligarchical, and the power of the oligarchy always rests upon force and fraud… Power can sometimes be won and maintained without violence, but never without fraud.” In fact, George Orwell’s classic book, 1984 was based on Burnham’s vision of the coming totalitarian state, which he described as “A new kind of society, neither Capitalist nor Socialist, and probably based upon slavery.”

There are many well-known godfathers of the Neoconservative agenda of “Endless War”, the guiding principle of America’s foreign policymakers today but Gould and Fitzgerald identify James Burnham as by far its most important figure, although he is little-known today.

Burnham was born in Chicago, the son of an English immigrant father. He attended Princeton University and later Oxford University’s Balliol College. He briefly became a close advisor to Communist revolutionary Leon Trotsky, from whom he learned the tactics and strategies of infiltration, political subversion and dirty tricks. Gould and Fitzgerald note that the Right Wing Neocon cult of “Endless War” is ironically rooted in Trotsky’s permanent “Communist Revolution” and they describe how James Burnham helped to turn this into the permanent battle plan for a global Anglo-American empire. They write, “All that was needed to complete Burnham’s dialectic was a permanent enemy and that would require a sophisticated psychological campaign to keep the hatred of Russia alive for generations.”

In 1941, Burnham renounced his allegiance to Trotsky and Marxist idealism and he moved towards a cruel realism, with his belief in the inevitable failure of democracy and the rise of the oligarch. During the following years, he wrote several books and memos, predicting the rise of a technocratic elite. By 1947, Burnham’s transformation from Communist radical to New World Order American Conservative was complete, landing him smack into the loving arms of America’s Right Wing defense establishment during and after World War II.

In my own writings, I’ve noted that the use of the word “Freedom” by the US Government, whether it be “Freedom Fries”, “Operation Iraqi Freedom” or “They hate us for our freedom,” has completely mangled the significance of this F-word, certainly from a Constitutional perspective. Gould and Fitzgerald trace the bastardization of this word to James Burnham:

“Burnham’s Freedom only applied to those intellectuals (the Machiavellians) willing to tell people the hard truth about the unpopular political realities they faced. These were the realities that would usher in a brave new world of the managerial class who would set about denying Americans the very Democracy they thought they already owned. As Orwell observed about Burnham’s Machiavellian beliefs, in his 1946 Second Thoughts, ‘Power can sometimes be won or maintained without violence, but never without fraud, because it is necessary to use the masses.'”

With the CIA’s 1950 founding of the Congress for Cultural Freedom (CCF), Gould and Fitzgerald write, “By its own admission, the CIA’s strategy of promoting the non-Communist Left would become the theoretical foundation of the Agency’s political operations against Communism over the next two decades.”

Today, it appears that this strategy has been a smashing success, where we see the so-called Left in the US playing the role of fulminating, pro-Establishment Statists, a behavior formerly relegated to the Right. Never, in my wildest dreams would I have imagined the “tolerant Left” behaving like an army of Phyllis Schlaflys!

Prior to the catastrophe that was the Vietnam War, the Right was the establishment. The factual defeat of the ideals which drove this war was instrumental to the rise of the 1960s Counterculture movement, which was an even bigger disaster for the Neocons than losing the war. The Counterculture needed to be co-opted by any means necessary and I believe this has been successfully achieved.

Please go to Forbidden KnowledgeTV to read the entire introduction to the essay by the Mytho-Poetic Radar Team.
________

 

Please go to The Saker blog to read the entire essay on the Neocons by the Mytho-Poetic Radar Team.

The history of the Neocon takeover of the USA (a 4 part analysis)

Invisible History Blog

 

Insights into British Intelligence:

After Dark – British Intelligence

Kushner back channel with Russia involved Syria

Source: AP

May 27, 2017

WASHINGTON (AP) — President Donald Trump’s son-in-law and now top White House adviser Jared Kushner proposed a secret back channel between the Kremlin and the Trump transition team during a December meeting with a leading Russian diplomat.

Kushner spoke with Ambassador Sergey Kislyak [AD note: It should be remembered that Vitaly Churkin, 64, had represented Russia at the UN since 2006. He was known as a champion of Moscow who did not hesitate to highlight what he called “hypocrisy inherent in U.S. foreign policy”. Vitaly Churkin died suddenly of an alleged heart attack in New York on February 20, 2017.] about creating that line of communication to facilitate sensitive discussions aimed at exploring the incoming administration’s options with Russia as it was developing its Syria policy, according to a person familiar with the discussions who spoke with The Associated Press.

The intent was to connect Trump’s chief national security adviser at the time, Michael Flynn, with Russian military leaders, said this person, who wasn’t authorized to publicly discuss private policy deliberations and spoke on condition of anonymity.

Russia, a pivotal player in Syria, has backed Syrian President Bashar Assad, often at the expense of civilians during a long civil war. [AD note: This is not a “civil war” taking place in Syria. It is a long thought out well coordinated and cynical international criminal conspiracy to first destroy the country of Syria, then destabilize the country eventually making it ungovernable and balkanized. Furthermore, Russian military command have set up first aid locations, have transshipped tonnes of supplies and medicine to Syria, as well as taking precautions to prevent civilian causalities.]

The White House did not acknowledge the meeting or Kushner’s attendance until March. At the time, a White House official dismissed it as a brief courtesy meeting.

Kushner’s involvement in the proposed back channel was first reported by The Washington Post, which said he proposed using Russian diplomatic facilities for the discussions, apparently to make them more difficult to monitor.

The newspaper cited anonymous U.S. officials who were briefed on intelligence reports on intercepted Russian communications.

The Post wrote that Kislyak was reportedly taken aback by the suggestion of allowing an American to use Russian communications gear at its embassy or consulate — a proposal that would have carried security risks for Moscow as well as the Trump team.

According to the person familiar with the Kushner meeting, the Trump team eventually felt there was no need for a back channel once Rex Tillerson was confirmed as secretary of state, and decided to communicate with Moscow through more official channels. Tillerson was sworn in on Feb. 1.

Flynn served briefly as Trump’s national security adviser before being fired in February after officials said he misled Vice President Mike Pence about whether he and the ambassador had discussed U.S. sanctions against Russia in a phone call.

Sally Yates, the former acting attorney general, told Congress this month that that deception left Flynn vulnerable to being blackmailed by the Russians. Flynn remains under federal investigation in Virginia over his foreign business ties and was interviewed by the FBI in January about his contacts with Kislyak.

The disclosure of the back channel put White House advisers on the defensive Saturday, as Trump wrapped up his first foreign trip as president, and led lawyers for Kushner to say he is willing to talk with federal and congressional investigators about his foreign contacts and his work on the Trump campaign.

Meeting with reporters in Sicily, two Trump advisers refused to address the contents of Kushner’s December meeting with the Russian diplomat. But they did not dismiss the idea that the administration would go outside normal U.S. government and diplomatic channels for communications with other countries.

Speaking generally, national security adviser H.R. McMaster said “we have back channel communications with a number of countries.” He added: “It allows you to communicate in a discreet manner.”

In response to repeated questions from reporters, Trump economic adviser Gary Cohn said, “We’re not going to comment on Jared. We’re just not going to comment.”

Kushner was a trusted Trump adviser last year, overseeing the campaign’s digital strategy, and remains an influential confidant within the White House as does his wife, Ivanka Trump.

Please go to AP to read the entire article.
________

 

Related reading:

Kushner Role In White House Suddenly Unclear; May “Return To Private Life”

 

 

Essentially a Declaration of War Against Iran and Shia Muslims and the Alliance With Wahhabi Regimes

Source: PressTV

Trump’s visit to Saudi Arabia was a war against Shia Muslims: Analyst

May 27, 2017

US President Donald Trump’s visit to Saudi Arabia during his first official overseas trip this week was essentially a declaration of war against Iran and Shia Muslims and signaled an alliance with Wahhabi regimes, an investigative journalist in Washington says.

“I think its very problematic for President Trump to have gone to this summit in Riyadh which I believe he was actually used by the Saudis to promote their interests,” said Wayne Madsen, an author and columnist specializing in intelligence and international affairs.

“What Trump effectively did was declare war on the Shia religion; he aligned himself with these Wahhabist regimes in Saudi Arabia, Qatar, Bahrain, Kuwait [and the] United Arab Emirates,” Madsen said during a phone interview with Press TV on Friday.

“He even said that past problems between the US and Bahrain are over with; we know he’s selling them weapons now,” Madsen added.

Saudi Arabia was the first stop on Trump’s first international trip this week. No other US president has made Saudi Arabia their first foreign visit.

Trump and Saudi King Salman bin Abdulaziz Al Saud signed a “strategic vision” agreement in Riyadh on May 20 to bolster cooperation on military, economics and other areas.

Trump also signed an arms deal worth $110 billion with the Saudis, despite warnings he could be accused of being complicit in the regime’s war crimes in neighboring Yemen.

The $110 billion arms deal signed by US and Saudi leaders last week was a component of $350 billion in economic and military investments between the two countries over the next 10 years, according to US Secretary of State Rex Tillerson.

Less than a year ago on the campaign trail, Trump vilified the Saudi influence on US foreign policy, openly accused the kingdom of being behind the 9/11 terror attacks, and demanded the US be paid for protecting the monarchy.

Experts say Trump’s selection of Saudi Arabia as his first overseas trip signals that he is willing to change his behavior and tone to embrace a country responsible for widespread human rights violations and an escalating humanitarian crisis in Yemen.
________

 

Donald Trump’s speech writer is Steven Miller who wrote Trump’s speech given in Riyadh. Miller according to Wayne Madsen, is a “creature of the Zionist movement” and Miller’s mentor is David Horowitz, a right wing Muslim-hating Neocon.

Trump Speech in Saudi Arabia to Muslim World

Related reading:

The Believer

Stephen Miller Is Writing the Big Speech on Islam That Trump Is Delivering in Saudi Arabia

David Horowitz: Stephen Miller, a Second Thoughts Warrior

 

The following is a good example of this declaration of war on Shia Islam as well as NATO wanting a piece of the action to kill Shia Muslims which comes right on the heels of the alleged terrorist™ attack on Manchester (evidence is beginning to appear Salman Abedi is an MI5/MI6 asset):

US-led air strikes killed record number of civilians in Syria

NATO to Join Air War In Syria and Iraq

UPDATED: Manchester Bomber Was a British Intelligence MI6 Asset

 

Bombshell Intel on Former FBI Comey

Source: Before It’s News

May 27, 2017
By Capt. Dave Bertrand (Ret.)

(Twitter) #Dave Bertrand (@bertranddave1)

Ed Note: This intel report comes from our own (New York insider) Ziad Abdelnour (Blackhawk Partners) and he wants you to know the extent of how serious the Trump / Swamp situation is and for this intel to be spread worldwide via your contacts. He also states that President Trump is fully aware of each detail of this report. Corporate Fakestream Media have strict orders to avoid discussion of Comey’s close ties with the Clinton crime network. – Dave Bertrand

Ed Note from Ziad:

For those of you folks who want to know the TRUTH and real story behind this dirty snake Jim Comey…..

There are very few crime/mystery novels that approach this true story for compelling drama, intrigue and brinkmanship (with the nation in the balance).

Don’t believe the fake-media story that Trump made a mistake or huge gaffe by firing Comey.

Don’t believe the media narrative from the left that it was an attempt to silence Comey from some investigation into Trump.

Don’t believe the RINO narrative that Comey is a good guy just trying to do his job in terrible circumstances and the timing was bad.

Don’t believe the lie that Comey was admired and respected by career FBI investigators and agents.

Don’t believe the lie that Trump’s “tweets” are not professional and have no strategic purpose. His tweets are weaponized and deadly.

James Comey is a poisonous snake of the highest order… a deep-water Swamp Denizen who has been highly paid to deliberately provide cover for high-level corruption by the Clintons and Obama. He is has been central to trying to destroy the Trump campaign and then the Trump administration from the start.

He is as dirty as they come in DC. He had highest-level cover (the FBI no less) and was deep into an effort to eliminate Trump. Trump had to move hard, fast, and at exactly the right time to cut the head off the snake without getting bitten by the snake or being finished by the other swamp denizens.

Begin by noticing how the President fired Comey when Comey was 3,000 miles away from his office, that Comey had no inkling he was being cut, that all his files, computers, and everything in his office were seized by his boss Sessions and the justice department. This was not a violation of protocol, it was tactical.

Notice how Prez Trump compartmentalized the strike and did not inform any of his White House “staff” to prevent leaks. Notice how he emasculated Comey and the swamp denizens by letting them know in a tweet that the Attorney General got information (surveillance “tapes” from the seizure of Comey’s office) to let Comey and his handlers know that Trump’s DOJ has the goods on them.

This was a brilliant, strategic and totally imperative move at exactly the right time against horrible, evil and corrupt powers infesting our government.

The swamp is on notice that the President is on to them, they are sweating bullets because their criminal games of corruption are being pursued and they know it. They are screaming and ranting because they are desperate denizens of the swamp who are beginning to realize they are roadkill.

THIS IS WHAT YOU NEED TO KNOW ABOUT THE COMEY SCAM. Taken from credible public sources (readily available if you want to look or want me to send them to you), with a few reasonable “fill in the blank” conclusions of my own.

Please go to Before It’s News to read the entire article on Comey.
________

 

What Is The FBI?

28 CFR 0.85 – General functions.

§ 0.85 General functions.

The Director of the Federal Bureau of Investigation shall:

(a) Investigate violations of the laws, including the criminal drug laws, of the United States and collect evidence in cases in which the United States is or may be a party in interest, except in cases in which such responsibility is by statute or otherwise exclusively assigned to another investigative agency. The Director’s authority to investigate violations of and collect evidence in cases involving the criminal drug laws of the United States is concurrent with such authority of the Administrator of the Drug Enforcement Administration under § 0.100 of this part. In investigating violations of such laws and in collecting evidence in such cases, the Director may exercise so much of the authority vested in the Attorney General by sections 1 and 2 of Reorganization Plan No. 1 of 1968, section 1 of Reorganization Plan No. 2 of 1973 and the Comprehensive Drug Abuse Prevention and Control Act of 1970, as amended, as he determines is necessary. He may also release FBI information on the same terms and for the same purposes that the Administrator of the Drug Enforcement Administration may disclose DEA information under § 0.103 of this part. The Director and his authorized delegates may seize, forfeit and remit or mitigate the forfeiture of property in accordance with 21 U.S.C. 881, 21 CFR 1316.71 through 1316.81, and 28 CFR 9.1 through 9.7.

(b) Conduct the acquisition, collection, exchange, classification and preservation of fingerprints and identification records from criminal justice and other governmental agencies, including fingerprints voluntarily submitted by individuals for personal identification purposes; provide expert testimony in Federal, State and local courts as to fingerprint examinations; and provide fingerprint training and provide identification assistance in disasters and for other humanitarian purposes.

(c) Conduct personnel investigations requisite to the work of the Department of Justice and whenever required by statute or otherwise.

(d) Carry out the Presidential directive of September 6, 1939, as reaffirmed by Presidential directives of January 8, 1943, July 24, 1950, and December 15, 1953, designating the Federal Bureau of Investigation to take charge of investigative work in matters relating to espionage, sabotage, subversive activities, and related matters, including investigating any potential violations of the Arms Export Control Act, the Export Administration Act, the Trading with the Enemy Act, or the International Emergency Economic Powers Act, relating to any foreign counterintelligence matter.

(e) Establish and conduct law enforcement training programs to provide training for State and local law enforcement personnel; operate the Federal Bureau of Investigation National Academy; develop new approaches, techniques, systems, equipment, and devices to improve and strengthen law enforcement and assist in conducting State and local training programs, pursuant to section 404 of the Omnibus Crime Control and Safe Streets Act of 1968, 82 Stat. 204.

(f) Operate a central clearinghouse for police statistics under the Uniform Crime Reporting Program, and a computerized nationwide index of law enforcement information under the National Crime Information Center.

(g) Operate the Federal Bureau of Investigation Laboratory to serve not only the Federal Bureau of Investigation, but also to provide, without cost, technical and scientific assistance, including expert testimony in Federal or local courts, for all duly constituted law enforcement agencies, other organizational units of the Department of Justice, and other Federal agencies, which may desire to avail themselves of the service. As provided for in procedures agreed upon between the Secretary of State and the Attorney General, the services of the Federal Bureau of Investigation Laboratory may also be made available to foreign law enforcement agencies and courts.

(h) Make recommendations to the Office of Personnel Management in connection with applications for retirement under 5 U.S.C. 8336(c).

(i) Investigate alleged fraudulent conduct in connection with operations of the Department of Housing and Urban Development and other alleged violations of the criminal provisions of the National Housing Act, including 18 U.S.C. 1010.

(j) Exercise the power and authority vested in the Attorney General to approve and conduct the exchanges of identification records enumerated at § 50.12(a) of this chapter.

(k) Payment of awards (including those over $10,000) under 28 U.S.C. 524(c)(2), and purchase of evidence (including the authority to pay more than $100,000) under 28 U.S.C. 524(c)(1)(F).

(l) Exercise Lead Agency responsibility in investigating all crimes for which it has primary or concurrent jurisdiction and which involve terrorist activities or acts in preparation of terrorist activities within the statutory jurisdiction of the United States. Within the United States, this would include the collection, coordination, analysis, management and dissemination of intelligence and criminal information as appropriate. If another Federal agency identifies an individual who is engaged in terrorist activities or in acts in preparation of terrorist activities, that agency is requested to promptly notify the FBI. Terrorism includes the unlawful use of force and violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.

(m) Carry out the Department’s responsibilities under the Hate Crime Statistics Act.

(n) Exercise the authority vested in the Attorney General under section 528(a), Public Law 101-509, to accept from federal departments and agencies the services of law enforcement personnel to assist the Department of Justice in the investigation and prosecution of fraud or other criminal or unlawful activity in or against any federally insured financial institution or the Resolution Trust Corporation, and to coordinate the activities of such law enforcement personnel in the conduct of such investigations and prosecutions.

(o) Carry out the responsibilities conferred upon the Attorney General under the Communications Assistance for Law Enforcement Act, Title I of Pub. L. 103-414 ( 108 Stat. 4279), subject to the general supervision and direction of the Attorney General.

#2974: AD Links Serco Patentee Swamp To Obama Unabom, Clinton Demon Spot-Fix Bridge

From: United States Marine Field McConnell
Plum City Online – (AbelDanger.net) – May 27, 2017

To Whom It May Concern:

Field McConnell – United States Marine and Global Operations Director of Abel Danger (AD) – has linked Serco‘s patentee swamp in the United States Patent and Trademark Office to Barack Obama’s alleged development of Unabom devices for Hillary Clinton’s use in spot-fixing victim deaths with images from Demon face-recognition software on the federal-bridge email network.

McConnell alleges that Serco patent-office and visa-center operatives have allowed shareholders including the University Superannuation Scheme, HSBC, Goldman Sachs and the British and Saudi Arabian governments, to spot fix patsies and inject fake news for the U.S. embassy bombings in Africa in 1998, the WTC Twin Towers demolition on

9/11 and the remote detonation of the Manchester Arena bomb on May 22, 2017.


A Unabomb detonator system – “Plus ça change, plus c’est la même chose”—”the more it changes, the more it’s the same thing”

Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! (Mobile Playback Version)
https://www.youtube.com/watch?v=ncj9tg1WD1I


SERCO Owns the World, | Big Brother Watch

McConnell is standing by to brief President Trump and retired Marine Corps two-star Randolph “Tex” Alles, director of the United States Secret Service on how to take down Serco (USPTO, National Visa Center and NPL-clock operator and the world’s largest air traffic controller) with a RICO action and purge demon blackmailers and spot-fixing bombers from the federal bridge.

 

“Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”

“PATENTEE. He to whom a patent has been granted. [Check Serco‘s Use Of Crown Rights Rules] The term is usually applied to one who has obtained letters-patent for a new invention.

2. His rights are, 1. To make, sell and enjoy the profits, during the existence, of his rights, of the invention or discovery patented. 2. To recover damages for a violation of such rights. 3. To have an injunction to prevent any infringement of such rights.

3. His duties are to supply the public, upon reasonable terms, with the thing patented.”

“Statement from President Trump on leaks …. The alleged leaks coming out of government agencies are deeply troubling. These leaks have been going on for a long time and my Administration will get to the bottom of this.

The leaks of sensitive information pose a grave threat to our national security.

I am asking the Department of Justice and other relevant agencies to launch a complete review of this matter, and if appropriate, the culprit should be prosecuted to the fullest extent of the law.

There is no relationship we cherish more than the Special Relationship between the United States and the United Kingdom.

Bomber Salman Abedi carried his bomb in a common Karrimor rucksack which was triggered with a switch held in his left hand, leaked crime scene photographs suggest.

Experts who analysed the photographs last night said that the mechanisms raised the possibility that someone else could have detonated the explosives for Abedi – which could explain why Islamic State did not describe his barbaric attack as a suicide.

The photographs, which were leaked to the New York Times, were described as ‘law enforcement’ images – apparently leaked after being shared between British and US security agencies.

Colonel Hamish de Bretton-Gordon, former head of the Joint Chemical, Biological, Radiological and Nuclear Regiment for the Army, said its ‘sophistication’ pointed to an Islamic State device. He said: ‘The sophistication of this is absolutely key. Of all the detonators I’ve seen in Syria, this one leads me to believe it is the handiwork of IS.’

The photographs also showed the metal nuts and screws that were blasted out of the bag, turning them into deadly shrapnel. And police found the remnants of a Yuasa 12 volt, 2.1amp lead acid battery, said to be more powerful – and, at £12, more expensive – than batteries found in other suicide bombs. The batteries, which are similar to a small car battery in appearance, are sometimes used to power emergency lighting.

The evidence helps to explain why the security services are so convinced Abedi had travelled to a conflict zone in which he received training and was part of a wider terrorist cell.”

“New York Times – Obama and ’60s Bomber: A Look Into Crossed Paths
By SCOTT SHANE OCT. 3, 2008
CHICAGO — At a tumultuous meeting of anti-Vietnam War militants at the Chicago Coliseum in 1969, Bill Ayers helped found the radical Weathermen, launching a campaign of bombings that would target the Pentagon and United States Capitol.

Twenty-six years later, at a lunchtime meeting about school reform in a Chicago skyscraper, Barack Obama met Mr. Ayers, by then an education professor. Their paths have crossed sporadically since then, at a coffee Mr. Ayers hosted for Mr. Obama’s first run for office, on the schools project and a charitable board, and in casual encounters as Hyde Park neighbors.

Their relationship has become a touchstone for opponents of Mr. Obama, the Democratic senator, in his bid for the presidency. Video clips on YouTube, including a new advertisement that was broadcast on Friday, juxtapose Mr. Obama’s face with the young Mr. Ayers or grainy shots of the bombings.

In a televised interview last spring, Senator John McCain, Mr. Obama’s Republican rival, asked, “How can you countenance someone who was engaged in bombings that could have or did kill innocent people?”

More recently, conservative critics who accuse Mr. Obama of a stealth radical agenda have asserted that he has misleadingly minimized his relationship with Mr. Ayers, whom the candidate has dismissed as “a guy who lives in my neighborhood” and “somebody who worked on education issues in Chicago that I know.””

“Understanding Unabom provides in depth insight into the coordinated activities of elements of the FBI, NSA, and CIA before September 11th 2001.

http://www.unabombers.com/ Activities that included the manufacture and management of a series of high profile, random terrorist events and selective assassinations. The case explodes the fiction that the FBI and the CIA did not Communicate in high profile cases. Ultimately, it exposes the deep common roots, and the common personnel of many different dirty cases tracing all the way back to Rumsfeld and Cheney’s coverup of the Olsen murder during the Ford Administration. The facts of Unabom have been covered up in a blizzard of ridicule akin to Kennedy’s grassy knoll. Covered up, despite a wide trail of undeniable proof and multiple witnesses.

The only Unabom eyewitness rejected the first two sketches, but the FBI insisted on using them for seven years. They looked like Kaczynski…because they were designed to look like Kaczynski. The first Unabom sketches were actually computer morphed by the FBI from a Berkley photo of the Patsy. The eyewitness insisted on the third and final sketch (below right). The FBI stubbornly resisted for years then finally relented under pressure. It became the known sketch. You cannot create the first two wanted posters from the patsy’s photo, then 7 years later claim you did not know who he was. It is impossible. It conclusively proves a frame-up, proof printed in hundreds of national magazines [See Computer Morph]

The only eyewitness to see the bomber in action describes the FBI charade
“Heck, who am I? Just the witness,” she asked and answered quietly in a single breath. “Never mind what I think I saw.They’ll tell me what I saw, and when I tell them it’s off base, they’ll just tell me again. That drawing’s never been right. I’ve tried to tell them.” [Boylan’s “Portraits Of Guilt” Chapter One]. The witness identity has never been revealed and no reaction to Kaczynski’s arrest has ever been recorded.

Witness “Not Right” Ted Kaczynski “Never been Right”

Ted Kaczynski Morphed Sketch The Morphs Reference Witness “Not Right”

Mid-Life Ted Kaczynski The Familiar Sketch J Ray Dettling

Enlarge the FBI Sketch and Decide for Yourself if it was
Morphed from Ted Kaczynski’s Photograph !!!
[See Computer Morph]
CD Burnable Site Download
Site Page Rank

DECLARATION OF

I do hereby depose and swear;
Nathan R Note and Handwriting Analysis
The Nathan R note was a handwritten note… written on the envelope of the June 1992 letter sent by the Unabomber to the NY Times. The Nathan R note is a phone note written in my handwriting by me. [Polygraph] The letter inside the envelope pre-announced the Epstein and Gelernter bombs. [See Note and Handwriting Samples] The bombs went off after the letter was posted, and before it was delivered… to the NY Times. I wrote the “Nathan R” note, while sitting at J Ray Dettling’s desk in Saratoga California, to record a call from Nathan Salmon to J Ray Dettling. [LA Times] I wrote the note using a Pen which had no ink and later recopied the message to give to Dettling. Nathan Salmon is Dettling’s common law stepson from his relationship with Tessie Ann Salmon. [Grant Deed] [PI Report] I clearly remember the call [Houston Chronicle] and the act of writing of the note itself. Three former associates recognize the handwriting in the note as being similar to my handwriting. [College Roommates E-Mail] The format of the note is the exact same format I used to record calls at the Bohlman road residence (Call X followed by an initial for the person followed by the date and time the call was received). After initially reading the typewritten text of the Nathan R note (R for Ray) on the Internet, I immediately recognized the notes format and informed an aid to US Senator Max Baucus (Greg Devlin, Polson Mt) that the note would be in my handwriting and that it was recorded with a pen without ink. This later was confirmed. It was in my handwriting, and in a pen without Ink. The call was the only time I ever talked to Nathan. During the call I had assumed I was talking to Dettling’s other son Aaron, age 14. Nathan’s abruptness and commanding impatience at my inability to find a working pen made the call confusing and memorable. The call was a long distance call received in October or November of 1992 on a Wednesday at 7 pm. When asked for a number Nathan said that he would be where Ray would know the number.� Handwritten examples describing [The Call] and [Manifesto Night]

Unabomber Manifesto

One evening in October of 1992 Michael Hren and I read parts of the Unabomber Manifesto on Dettling’s computer (three years before it was mailed to the New York Times) and discussed it extensively with Dettling. Dettling arrived home while Hren and I were examining the manifesto, just as I had used the search command on the word “kill” [Polygraph] to locate the sentence:

“In order to get our message before the public with some chance of making a lasting impression, we’ve had to kill people.” [Unabomber Manifesto Paragraph p96]
Hren immediately asked Dettling in a booming voice, “Hey Ray who’d you kill”, intending a joke. Michael Hren reluctantly remembers the incident [Voice Call], but clearly recognizes one line [Voice Call] of the Manifesto from that night [Hren’s Statement]. When asked what the document was, Dettling stated that “it was a work of fiction about a serial bomber”. Later during a conversation about the Unabomber in Hren’s presence, he cited four instances of Unabomber bombs, defending each. The first three examples seemed ludicrous to me, particularly the example of the computer store owner and my reaction was sarcastic “Great reason to bomb someone” I commented. I was shocked and vividly remember his apparent glee and approval attached to the bombings. His fourth instance of Unabomber bombings was a timber lobbyist, citing the timber industry actions on Redwoods as a justification. The justification was a continuance of a prior conversation. [Polygraph]. Sacramento timber lobbyist Gil Murray was murdered two years later by a Unabomber bomb. During this incident Dettling had just returned from an evening out, was intoxicated and highly animated. Calls were recorded in Colorado and are legally admissible.

Patents, Unexplained Income, NASA, and G.I. Joe
Patents were used for years for a paper trail cover for “black” operations payments by the CIA to avoid complications with IRS etc. For example…when the IRS asked “Where’d ya get the million bucks?”…. “For Murder” was not an acceptable paper trail for a CIA operative. Over the years they used Patents instead…until recently, the most confusing and intractable paper source in existence. Dettling’s residence was a palatial multi-million dollar mountaintop complex with 12-foot window panels overlooking Silicon Valley. Dettling drove a rare and expensive car. His closet had over a dozen high quality fur coats as gifts. [Photo] He spent money freely. [Phone Call] But Dettling had no substantial job for many years, and no identifiable source of income other than five US Patents. The Patents trace (via Assignee) to companies involved in supplying the Military, CIA and Intelligence agencies (United Technologies, MB Associates etc. [Mitchel Page Resume] and to NASA (See also: [Plain Dealer]). It is my opinion that Dettling did not have adequate scientific knowledge or abilities to create the concepts described by the Patents. (Patents [3,771,152], see also [3,873,892], 3,979,052, [3,979,052-2], [4,021,267], and NASA Patent [4,146,180]).”

Serco Processes 2 Millionth Patent Application for U.S. Patent and Trademark Office
March 19, 2013
RESTON, VIRGINIA – March 18, 2013 – Serco Inc., a leading provider of professional, technology, and management services to the federal government, announced today that their Pre-Grant Publication (PGPubs) Classification Services team recently processed their 2 millionth patent application for the U.S. Patent & Trademark Office (USPTO). Each application was also processed within the contractually required 28-day window.

USPTO is the government agency that grants U.S. patents and registers trademarks. In 2006 Serco was awarded the contract with USPTO to manage their Pre-Grant Publication (PGPubs) Classification Services. Serco‘s PGPubs team has since been responsible for analyzing the claims made in patent applications and assigning the appropriate U.S. and international classifications to key aspects of proposed inventions.

In a single day, Serco‘s PGPubs Patent Classifiers process approximately 1,450 patent applications by analyzing more than 21,800 patent claims and assigning more than 7,900 U.S. and international classifications while exceeding quality goals with a better than 97% accuracy rate. The Serco team has received multiple awards from the government for greatly exceeding quality standards.

The Serco PGPubs team has also been extremely innovative in responding to USPTO’s challenges by implementing new methods and systems for better business processes. Since 2006 the team has built a virtually paperless classification operation. The operation includes a secure facility with IT infrastructure, procedures for recruiting and training highly skilled staff, and implementation of a set of automated tools that streamlined the classification process while minimizing errors. The facility is located in Harrisonburg, VA and the project now employs 135 people.

In honor of the 2 millionth patent being processed, U.S. Congressman Bob Goodlatte personally visited the facility and congratulated Serco‘s PGPubs team for their support. “America is the world leader in innovation and creativity,” said Congressman Goodlatte. “The strength of our economy and American jobs rely on our ability to protect new inventions through the patent system and build on innovation in the 21st century. Congratulations to Serco‘s PGPubs team on achieving this milestone and helping to make America more competitive.””

“Saturday, 20 October 2012 Andrea Davison, Jimmy Savile, SERCO and How it all Fits In With Child Abuse, Covert Arms Shipments and Government Fraud … Andrea and journalist Pete Sawyer continued the exposure through Scallywag magazine who’s co founder, and editor of its successor Spiked, Angus James Wilson, died mysteriously in Cyprus around 1996. Scallywag also exposed that MI5 took foreign diplomats and important people to the North Wales homes and secretly filmed them abusing and torturing boys to use the tapes for blackmail. This is a classic Intelligence modus operandi with regard to child abuse by the famous and influential – especially politicians that they want to control. The cover-up of child abuse over decades indicated the hand of the State Agencies. This all linked covert arms deals and child abuse.

In Interviews victims had named a number of police officers including Fraud Squad officer DC Stephen Winnard who later arrested Andrea in 2010, senior judges, celebrities, and Politicians including, Derek Laud, McAlpine and Peter Morrison and also the Duke of Westminster. Victims claimed they were collected from the Children’s Homes in expensive cars, including Jimmy Savile’s Rolls Royce and taken to be abused by an elite paedophile ring. These interviews and other evidence were kept by Andrea.

Late 2009 she felt able to begin a new investigation and was instructed to look into SERCO http://en.wikipedia.org/wiki/Serco_Group and who really owned Britain Nuclear deterrent. Silent Players were making fortunes from the grant of lucrative contracts involving billions of tax payer’s money and other secret money which appeared to be gathered from Government sponsored International fraud. SERCO was winning contracts in every area of British life from emptying the bins in Milton Keynes to running Prisons and providing probation services. Its power was staggering and it was slowly and incrementally taking over the Criminal Justice System.

Evidence indicated people in SERCO were covertly selling nuclear technology to anyone who would pay and in 2009 a massive on-going fraud network began to surface possibly linking the City of London Police and SERCO with frauds around the Globe. But just as this evidence was being compiled in January 2010 the Derby Fraud Squad working with the City of London Police Raided her small flat and removed all the evidence. At the same time they stole thousands of documents on arms to Iraq, the Jillings report and interviews with the victims of sexual abuse naming Police Officers and High profile abusers.”

“28 November 2001
Global swoop on newsgroup paedophiles
By Will Knight
More than 130 people in 19 different countries have been arrested or are under investigation after police traced the distribution of child pornography through different internet newsgroups.

Technical experts at UK internet service provider Demon Internet aided officers from the National Crime Squad’&s new Hi-Tech Crime Unit with the investigation.
A spokesperson from Thus, Demon’s parent company, says that investigators were not given access to the server logs that record Demon users’ activities.

Investigators were simply provided with access to newsgroup postings in the same way as any other Demon customer. Technical experts from Demon then helped officers distinguish the identifying information contained within the message “headers” of particular postings.
Face recognition

Officers traced postings relating to certain images to different internet service providers around the world and then contacted Interpol to track down suspects.

Investigators say they discovered 10,000 suspect postings to over 30 different newsgroups and identified 60,000 new images. They plan to use face recognition software to identify victims in different images, to help trace them. This software has been developed in conjunction with UK company Serco, although no technical details have been released.

“This operation has sadly and distressingly brought thousands of new images of abuse to our attention,” said Detective Superintendent Peter Spindler of the National Crime Squad. “These young victims need to be identified and protected as quickly as possible.”

Spindler added: “We are able to show that those accessing these newsgroups did so regularly and with purpose.”

Nine regional police forces in the UK were involved in the operation. Warrants for searches or arrests were issued in 19 countries, including Australia, Canada, Germany, Israel, Japan, Russia, Sweden, Turkey, and the US.

Evading detection

According to a report by the BBC, another 400 suspects could not be traced by investigators. Police have not said how they evaded detection but it is possible to post messages to news groups anonymously using intermediary servers that strip away header information.

The UK government introduced legislation in 2000, giving the police greater access to internet communications. Further provisions for the extended storage of data is included in new anti-terrorist legislation currently passing through parliament.

Privacy advocates claim that these laws could be misused and some question the justification for the legislation. Peter Sommer, at the London School of Economics computer science department, says that the techniques involved in the latest paedophile investigation did not require a special police warrant.

“It is apparent that the existing legislation was sufficient to help the NCS gather evidence and secure the ISP co-operation needed,” Sommer told New Scientist.”
http://itccs.org/2011/02/02/memorandum-on-the-organized-disappearance-torture-exploitation-and-murder-of-women-and-children-on-canada-s-west-coast-a-summary-from-eyewitnesses/

Serco operates the National Border Targeting Centre for UK Visas and Immigration and provides the carrier gateway—the interface between carriers and the agency. NVC Contract Award. On January 31, 2006, in a re-competition for our expiring National Visa Center, or NVC, contract, we [Serco] were awarded the successor contract for the NVC contract by the Department of State. Under the contract, we anticipate performing over 20 million immigrant visa transactions each year at the NVC in Portsmouth, New Hampshire and at the Kentucky Consular Center in Williamsburg, Kentucky. The prime contract has a one-year base period and four one-year options with a potential value of approximately $84 million, inclusive of the options. The prior NVC contract generated 9.1% of our total revenues in fiscal 2005 and 9.2% of our total revenues in fiscal 2004.”

Serco Group plc is a British outsourcing company based in Hook, Hampshire.[3] It operates public and private transport and traffic control, aviation, military weapons, detention centres, call centres, prisons and schools on behalf of its customers.
It is listed on the London Stock Exchange and is a constituent of the FTSE 250 Index. Serco operates in Continental Europe, the Middle East, the Asia Pacific region and North America, but the majority of its turnover comes from the UK.

Serco was founded in 1929 as RCA Services Limited, a United Kingdom division of the Radio Corporation of America and initially provided services to the cinema industry.[4]Following the takeover of RCA by General Electric in late 1985, RCA Services Limited was bought out by its local management. It changed its name to Serco in 1987 and has been a London Stock Exchange listed company since 1988.[4]”

Serco Combined Resilience Exercising … Simulation and Media Support The method of delivering an exercise is flexible and will be designed with the client to meet their requirements with options ranging from simple paper-based delivery through to full use of their real communications systems and advance computer simulation. In addition, media play can also be added in the form of news injects and the provision of experienced journalists and television crews to help test procedures and also assist in training key staff.”

Serco awarded new European External Action Service IT contract
Serco has secured a new service contract to deliver a central management service for ITclassified systems. The services will be delivered in Brussels with all staff executing the service holding security clearance up to ‘Secret UE’ level to access the classified zones. The duration of the contract is 4 years and it is valued at 9,000,000 EUR.

The European External Action Service is the European Union’s diplomatic corps. It supports the EU foreign affairs chief (High Representative for Foreign Affairs and Security Policy, Catherine Ashton) in conducting the common foreign and security policy. It has Delegations around the world working on behalf of the people of Europe and representing the EU as a whole. The EEAS manages the EU’s response to crises, has intelligence capabilities and cooperates with the European Commission in areas which it shares competence with.

The EEAS operates classified information systems (CIS) in order to securely exchange and process classified information. Serco are responsible for ensuring these CIS will be maintained, supported and monitored on a daily basis to ensure reliable and performing services.
The service’s that Serco will be responsible for include, setting up a Service Centre to manage the services in a global approach, beyond pure support. This Service Centre will resolve all tickets and service requests related to CIS:

It shall act as a single interface for receiving and recording of all calls, incidents and requests regarding CIS;
It shall restore as quickly as possible the service in order to minimize the impact of an incident.
Serco will also support and maintain: .. Email .. Shared IT Services .. Back-up / Archiving .. Network infrastructure Services … Email Gateway … Voice Gateway … Security Services .. Information Assurance Anti-Virus management IP Encryption Devices Primary Key Infrastructure services existing on classified networks
Michael Alner, Managing Director of Serco‘s European Institutions business said: “We are delighted to support the important work of the European External Action Service through the award of this new contract.”

Serco farewell to NPL after 19 years of innovation 8 January 2015 Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco‘s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade…. NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading [and death-pool spot-fixed betting] in the City [by Serco shareholders including pig-farm custodian banks] through NPL [Zulu] Time.”

“The Emergency Planning College (EPC) delivers Cabinet Office-approved emergency planning and crisis management training. Managed by Serco, we are positioned at the heart of Government, within the Civil Contingencies Secretariat (CCS) of the Cabinet Office. Our highly experienced industry leading experts provide a wide range of dynamic and diverse training courses, seminars and workshops for public and private sector clients across the UK and overseas. We also offer real-time simulation exercises enabling delegates to fully test their emergency plans while gaining invaluable real life experience in dealing with a major incident. We provide a central forum for knowledge-sharing and focus on multi-agency working, disseminating best practice nationally and internationally to enhance worldwide resilience against natural disasters, major incidents and malicious attack.”

“Serious Fraud Office launches inquiry into G4S and Serco overcharging claims
Investigation follows justice secretary’s claims that firms overcharged on electronic tagging contracts for offenders
Under the contracts more than 20,000 offenders are monitored on electronic tags at any one time.
Alan Travis, home affairs editor
Monday 4 November 2013 12.34 GMTFirst published on Monday 4 November 2013 12.34 GMT
The Serious Fraud Office has launched a formal criminal investigation into two of the government’s biggest suppliers, G4S and Serco, following claims by the justice secretary, Chris Grayling, of tens of millions of pounds of overcharging on electronic tagging contracts for offenders.

Grayling asked the SFO to look into the billing allegations in July when he told MPs that an external audit had revealed that the overcharging included billing for tracking the movements of criminals who had moved abroad, who were back in prison, who had had their tags removed and even, in a few cases, those who had died.

The justice secretary said that in some cases the bills had continued to be presented years after active monitoring had stopped.

Whitehall sources have confirmed that the central allegation in the case revolves around charges for 3,000 phantom offenders. The justice ministry was being billed by the two companies for the tagging of 18,000 offenders a day under the £700m contract when only 15,000 were actually being monitored.”

“Statement of Jim Flyzik Acting Assistant Secretary for Management and Chief Information Officer (CIO) before the House Government Reform Committee 6/21/2001 ….

Treasury also hosted the Federal Bridge Certification Authority (FBCA) project for the Federal government, currently operated by GSA. The FBCA is a mechanism for the secure exchange of information between government agencies. The bridge allows agency public key infrastructures (PKIs) to interoperate as it permits digital credentials (called “digital certificates”) issued by each agency to its employees to be accepted with trust and confidence by other agencies for electronic transactions. This functionality directly supports E-Government, as agencies will be able to perform Internet-enabled transactions, such as credit card collections through banks, or secure emails between agencies, with previously unattainable trust and confidence. A prototype version of the FBCA became operational in February 2000 and was successfully used in a large-scale test in April 2000. During that time, the PKIs of five different organizations within the U.S., the Canadian Government and academia, were cross-certified through the prototype FBCA. The agencies were able to interoperate, successfully exchanging digitally signed electronic mail messages. FBCA is operated by GSA and, once cross-certification has been completed, will be used by NASA, USDA’s National Finance Center, FDIC, Treasury, the State of Illinois, and the Canadian Government for the electronic transfer of documents.”

DHS ICE OTD … Since 1986, through various contracts, Serco has provided full training lifecycle support for all areas of this key Law Enforcement organization including Inspections, Border Patrol, Enforcement, and DHS operations at the Federal Law Enforcement Training Academy in Glynco, GA. .. Serco developed and scripted three scenarios based on negligent practices identified by the IG report that have resulted in the use of lost or uncontrolled weapons for robbery, murder, and the accidental death of a child. We used creative animation techniques, sound effects, music, and talented voice actors playing multiple characters to create an emotional appeal much different—and infinitely more powerful—from the standard WBT offering.

Serco has trained more than 400,000 DHS students in every region and district, at every land, air and sea border crossing, in classrooms, through WBT, train-the-trainer programs, on-the-job training and through the implementation of performance support systems in a blended learning environment. In collaboration with ICE OTD, our latest efforts have resulted in the accreditation and completion of three programs, including HSI FOTP, ICE OTD IDC, and ICE OPR. Serco was integral to the ICE team that was recognized by the 2012 “Excellence in Law Enforcement” Award given to the ICE Domestic Field Operations Training Program (DFTOP) Accreditation Project for having greatly improved ICE training, increasing operational efficacy and efficiency, and minimizing safety issues to ICE officers and the public.”

Yours sincerely,

 

Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222

McConnell’s Co-researcher David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation

Fusing With The Enemy

Source: TVOI News

By Vicky Davison
May 26, 2017

On May 23, 2017, the House Intelligence Committee held another hearing concerning the alleged Russian hacking of our election system which really isn’t about hacking, it’s about Russian “active measures” which really means disinformation and influence operations. Of course as a citizen researcher/sort-of-journalist, my response is that the Russians don’t need to engage in disinfo in the U.S., our own mainstream media does that job. If Russian media does counter messaging to our mainstream disinfo operations, then Russian information must be good. It would be nice if it was that simple but it isn’t. The apparent objective of the Infowar is Infochaos.

The best question of the day during the hearing goes to Congresswoman Jackie Speier (D-CA). She asked Brennan “Are Russian Oligarchs encouraged to invest in the United States”? Listen to what Brennan says – and watch his body language.

Speier Questions Brennan

It stretches credulity to the limit to believe that the director of the CIA is unaware of the EB-5 visa program and that 109 visas were issued for Russian oligarchs especially in view of his promotion of the idea of Russian influence operations in our election system. One might be tempted to think that because he was the Director of the CIA that he might not be aware of all U.S. programs for foreigners – except that the legislation that authorized EB-5 visas was passed in 1990 and in the last decade or so, they’ve been the subject of news stories because these visas actually sell American citizenship in exchange for investment in the United States. If the CIA doesn’t monitor that program, then exactly what is it that they do because it can’t have anything to do with the security of the United States.

And actually, it does seem to be true that the CIA has nothing to do with the security of the United States. Brennan is what I would call, an IT guy – if not directly, then as a director of IT projects and systems. As you can see in this video clip of Brennan, he mentions the “system of systems” and “international architecture”. System of systems is Total Information Awareness.

Brennan System of Systems

The TIA system has access information for all systems that the intelligence agencies can access – either through the front door or the back door. As the controllers of the “system of systems” they can define portals for sharing with other entities such as the directors of intelligence operations that were on the stage with Brennan.

The fatal flaw for the information pigs is that they think they can form functional alliances across governments because they all have a mission of “security”. Call me crazy but I don’t think that Saudi Arabia’s idea of security is the same as the United States. Nor do I think the Communist Chinese idea of security is the same as ours. John Brennan and his operation to link information systems across borders by function says to me that they “forgot” their purpose. Systems should support an operation – not become the operation. When you have IT people who have taken control of the operation rather than supporting an operation, then you have a germinating totalitarian system.

By now everybody except the mushrooms has seen the images and/or video of Donald Trump putting his hands on the glowing orb (earth) to turn on the systems of the new Global Center for Combating Extremist Ideology in Riyadh.

Please go to TVOI News to read the entire article.

#2973: Can Trump Track Serco Fake-News Demon Bridge To Clinton’s Zulu Spot-Fixed Bomb?

United States Marine Field McConnell 
Plum City Online – (AbelDanger.net)
May 26, 2017

To Whom It May Concern:

Field McConnell – United States Marine and Global Operations Director of Abel Danger (AD) – is asking if President Trump can track the authors of Serco’s alleged fake-news injects with Demon face-recognition software on the federal-bridge network to Hillary Clinton’s aides’ apparent use of Zulu timing signals on their private email servers to spot fix a remotely-detonated bomb outside the Manchester Arena on May 22, 2017.

McConnell alleges that Serco’s Demon death pools allow agents for shareholders including the University Superannuation Scheme, HSBC, Goldman Sachs and the British and Saudi Arabian governments to place images of child abuse and torture on the federal bridge and blackmail news groups into concealing spot-fixing at mass-casualty events such as the 1998 bombings of two U.S. embassies in Africa, the controlled demolition of the WTC Twin Towers on 9/11, the rogue 7/7 Underground resilience exercise and the remote detonation of the Manchester Arena bomb.

Theresa May to confront Trump over leaks at terror summit (25May17)

A Unabomb detonator system – “Plus ça change, plus c’est la même chose”—”the more it changes, the more it’s the same thing”

Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! (Mobile Playback Version)

Clinton hosts EU foreign policy chief Catherine Ashton

SERCO Owns the World, | Big Brother Watch

McConnell is standing by to brief President Trump in the presence of retired Marine Corps two-star Randolph “Tex” Alles, director of the United States Secret Service, on how to take down Serco (NPL Zulu clock operator, death-pool bookmaker and world’s largest air traffic controller on 9/11!) with a RICO action and purge demon blackmailers, fake news groups and spot fixers from the federal bridge.

Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”

“Statement from President Trump on leaks …. The alleged leaks coming out of government agencies are deeply troubling. These leaks have been going on for a long time and my Administration will get to the bottom of this.

The leaks of sensitive information pose a grave threat to our national security.

I am asking the Department of Justice and other relevant agencies to launch a complete review of this matter, and if appropriate, the culprit should be prosecuted to the fullest extent of the law.

There is no relationship we cherish more than the Special Relationship between the United States and the United Kingdom.

Bomber Salman Abedi carried his bomb in a common Karrimor rucksack which was triggered with a switch held in his left hand, leaked crime scene photographs suggest.

Experts who analysed the photographs last night said that the mechanisms raised the possibility that someone else could have detonated the explosives for Abedi – which could explain why Islamic State did not describe his barbaric attack as a suicide.

The photographs, which were leaked to the New York Times, were described as ‘law enforcement’ images – apparently leaked after being shared between British and US security agencies.

Colonel Hamish de Bretton-Gordon, former head of the Joint Chemical, Biological, Radiological and Nuclear Regiment for the Army, said its ‘sophistication’ pointed to an Islamic State device. He said: ‘The sophistication of this is absolutely key. Of all the detonators I’ve seen in Syria, this one leads me to believe it is the handiwork of IS.’

The photographs also showed the metal nuts and screws that were blasted out of the bag, turning them into deadly shrapnel. And police found the remnants of a Yuasa 12 volt, 2.1amp lead acid battery, said to be more powerful – and, at £12, more expensive – than batteries found in other suicide bombs. The batteries, which are similar to a small car battery in appearance, are sometimes used to power emergency lighting.

The evidence helps to explain why the security services are so convinced Abedi had travelled to a conflict zone in which he received training and was part of a wider terrorist cell.

Read more: http://www.dailymail.co.uk/news/article-4541946/Trump-vows-bottom-Manchester-bomb-leak.html#ixzz4iCABpfag

“Investigators explore Manchester bomber’s links to larger network

BY PAISLEY DODDS AND MAGGIE MICHAEL, THE ASSOCIATED PRESS

POSTED MAY 24, 2017 10:14 PM EDT

Women cry after placing flowers in a square in central Manchester, Britain, Wednesday, May 24, 2017, after the suicide attack at an Ariana Grande concert that left more than 20 people dead and many more injured, as it ended on Monday night at the Manchester Arena. (AP Photo/Emilio Morenatti)

British investigators are hunting for potential conspirators linked to the bombing that killed 22 people in a search that is exploring the possibility that the same cell linked to the Paris and Brussels terror attacks was also to blame for the Manchester Arena attack, two officials familiar with the investigation said Wednesday.

Investigators were also assessing whether Salman Abedi, the suspected bomber in the attack Monday on a pop concert in Manchester, may have been connected to known militants in the northern English city. Abedi, a 22-year-old British citizen born to Libyan parents, died in the attack.

Abedi’s father, Ramadan Abedi, was allegedly a member of the al-Qaida-backed Libyan Islamic Fighting group in the 1990s, according to a former Libyan security official, Abdel-Basit Haroun. The elder Abedi denied that he was part of the militant group and told The Associated Press that his son was not involved in the concert bombing and had no connection to militants.

“We don’t believe in killing innocents. This is not us,” the 51-year-old Abedi said in a telephone interview from Tripoli.

He said he spoke to his son five days ago and he was getting ready for a religious pilgrimage to Saudi Arabia. He said his son visited Libya a month and a half ago and was planning to return to Libya to spend the holy month of Ramadan with the family. He also denied his son had spent time in Syria or fought with the Islamic State group, which claimed responsibility for the concert bombing.

“Last time I spoke to him, he sounded normal. There was nothing worrying at all until … I heard the news that they are suspecting he was the bomber,” the elder Abedi said.

He confirmed that another son, Ismail, 23, was arrested Tuesday in Manchester. A third son, 18-year-old Hashim, was arrested in Tripoli late last night, according to a Libyan government spokesman, Ahmed bin Salem. The elder Abedi was arrested shortly after speaking to the AP, Salem said.

The anti-terror force that took Hashim Abedi into custody said that the teenager had confessed that both he and his brother were members of the Islamic State group and that he “knew all the details” of the Manchester attack plot.

Ramadan Abedi fled Tripoli in 1993 after Moammar Gadhafi’s security authorities issued an arrest warrant. He spent 25 years in Britain before returning to Libya in 2011 after Gadhafi was ousted and killed in the country’s civil war. He is now a manager of the Central Security force in Tripoli.

The Abedi family has close ties to the family of al-Qaida veteran Abu Anas al-Libi, who was snatched by U.S. special forces off a Tripoli street in 2013 for alleged involvement in the 1998 bombings of two U.S. embassies in Africa, and died in U.S. custody in 2015. Al-Libi’s wife told the AP that she went to college in Tripoli with the elder Abedi’s wife and that the two women also lived together in the U.K. before they returned t Libya.

British police said Wednesday they had not yet found the bomb maker in the Manchester Arena attack, indicating Salman Abedi was part of a larger cell.

“It’s very clear this is a network we are investigating,” Chief Constable Ian Hopkins said.

In Washington, the chairman of the U.S. House’s Homeland Security Committee said the bomb used in the attack suggested a “level of sophistication” that might indicate its maker had foreign training. Rep. Mike McCaul told The Associated Press that the bomb used the explosive TATP, the same one used in the deadly November 2015 attacks in Paris and the March 2016 attack in Brussels carried out by Islamic State extremists.

McCaul also said the evidence so far suggested that “we’re not dealing with a lone wolf situation.”

British authorities were exploring whether the bomber, who grew up in Manchester, had links with other cells across Europe and North Africa, according to two officials familiar with the case who spoke on condition of anonymity because they were not authorized to speak about the ongoing investigation.

They said one thread of the investigation involves pursuing whether Abedi could have been part of a larger terror cell that included Mohamed Abrini, otherwise known as “the man in the hat,” with connections to the Brussels and Paris attacks. Abrini visited Manchester in 2015.

Investigators were also looking into possible links between Abedi and Abdalraouf Abdallah, a Libyan refugee from Manchester who was shot in Libya and later jailed in the U.K. for terror offences, including helping Stephen Gray, a British Iraqi war veteran and Muslim covert, to join fighters in Syria.

Other Manchester connections under investigation, the officials said, include a 50-year-old former Guantanamo Bay detainee, Ronald Fiddler, also known as Jamal al-Harith. The Briton blew himself up at a military base in Iraq in February. He was one of 16 men awarded a total of 10 million pounds ($12.4 million) in compensation in 2010, when the British government settled a lawsuit alleging its intelligence agencies were complicit in the torture of prisoners at Guantanamo Bay.

Another possible link under investigation is whether Abedi had ties to Raphael Hostey, a jihadist recruiter who was killed in Syria, the officials said.

The sweeping investigation has caused friction between U.S. and British security and intelligence officials.

Home Secretary Amber Rudd, who said Abedi had been known to British security officials, complained Wednesday about U.S. officials leaking sensitive information about Abedi to the media, saying that could hinder Britain’s security services and police.

“I have been very clear with our friends that that should not happen again,” she said. It was unclear whether Abedi was under surveillance as recently as the attack.

U.S. Homeland Security Department spokesman David Lapan declined to say Wednesday if Abedi had been placed on the U.S. no-fly list. Under normal circumstances, he said, Abedi may have been able to travel to the United States because he was from Britain, a visa-waiver country, but he would have been subjected to a background check via the U.S. government’s Electronic System for Travel Authorization, or ESTA.

Lapan said the Homeland Security Department has shared some information about Abedi’s travel with the British government, but declined to offer specifics. Customs and Border Protection has access to a broad array of air travel information through the U.S. government’s National Targeting Center.”

“Saturday, 20 October 2012 Andrea Davison, Jimmy Savile, SERCO and How it all Fits In With Child Abuse, Covert Arms Shipments and Government Fraud … Andrea and journalist Pete Sawyer continued the exposure through Scallywag magazine who’s co founder, and editor of its successor Spiked, Angus James Wilson, died mysteriously in Cyprus around 1996. Scallywag also exposed that MI5 took foreign diplomats and important people to the North Wales homes and secretly filmed them abusing and torturing boys to use the tapes for blackmail. This is a classic Intelligence modus operandi with regard to child abuse by the famous and influential – especially politicians that they want to control. The cover-up of child abuse over decades indicated the hand of the State Agencies. This all linked covert arms deals and child abuse.

In Interviews victims had named a number of police officers including Fraud Squad officer DC Stephen Winnard who later arrested Andrea in 2010, senior judges, celebrities, and Politicians including, Derek Laud, McAlpine and Peter Morrison and also the Duke of Westminster. Victims claimed they were collected from the Children’s Homes in expensive cars, including Jimmy Savile’s Rolls Royce and taken to be abused by an elite paedophile ring. These interviews and other evidence were kept by Andrea.

Late 2009 she felt able to begin a new investigation and was instructed to look into SERCO and who really owned Britain Nuclear deterrent. Silent Players were making fortunes from the grant of lucrative contracts involving billions of tax payer’s money and other secret money which appeared to be gathered from Government sponsored International fraud. SERCO was winning contracts in every area of British life from emptying the bins in Milton Keynes to running Prisons and providing probation services. Its power was staggering and it was slowly and incrementally taking over the Criminal Justice System.

Evidence indicated people in SERCO were covertly selling nuclear technology to anyone who would pay and in 2009 a massive on-going fraud network began to surface possibly linking the City of London Police and SERCO with frauds around the Globe. But just as this evidence was being compiled in January 2010 the Derby Fraud Squad working with the City of London Police Raided her small flat and removed all the evidence. At the same time they stole thousands of documents on arms to Iraq, the Jillings report and interviews with the victims of sexual abuse naming Police Officers and High profile abusers.”

“28 November 2001 Global swoop on newsgroup paedophiles

By Will Knight

More than 130 people in 19 different countries have been arrested or are under investigation after police traced the distribution of child pornography through different internet newsgroups.

Technical experts at UK internet service provider Demon Internet aided officers from the National Crime Squad’s new Hi-Tech Crime Unit with the investigation.

A spokesperson from Thus, Demon’s parent company, says that investigators were not given access to the server logs that record Demon users’ activities.

Investigators were simply provided with access to newsgroup postings in the same way as any other Demon customer. Technical experts from Demon then helped officers distinguish the identifying information contained within the message “headers” of particular postings.

Face recognition

Officers traced postings relating to certain images to different internet service providers around the world and then contacted Interpol to track down suspects.

Investigators say they discovered 10,000 suspect postings to over 30 different newsgroups and identified 60,000 new images. They plan to use face recognition software to identify victims in different images, to help trace them. This software has been developed in conjunction with UK company Serco, although no technical details have been released.

“This operation has sadly and distressingly brought thousands of new images of abuse to our attention,” said Detective Superintendent Peter Spindler of the National Crime Squad. “These young victims need to be identified and protected as quickly as possible.”

Spindler added: “We are able to show that those accessing these newsgroups did so regularly and with purpose.”

Nine regional police forces in the UK were involved in the operation. Warrants for searches or arrests were issued in 19 countries, including Australia, Canada, Germany, Israel, Japan, Russia, Sweden, Turkey, and the US.

Evading detection

According to a report by the BBC, another 400 suspects could not be traced by investigators. Police have not said how they evaded detection but it is possible to post messages to news groups anonymously using intermediary servers that strip away header information.

The UK government introduced legislation in 2000, giving the police greater access to internet communications. Further provisions for the extended storage of data is included in new anti-terrorist legislation currently passing through parliament.

Privacy advocates claim that these laws could be misused and some question the justification for the legislation. Peter Sommer, at the London School of Economics computer science department, says that the techniques involved in the latest paedophile investigation did not require a special police warrant.

“It is apparent that the existing legislation was sufficient to help the NCS gather evidence and secure the ISP co-operation needed,” Sommer told New Scientist.”

“http://itccs.org/2011/02/02/memorandum-on-the-organized-disappearance-torture-exploitation-and-murder-of-women-and-children-on-canada-s-west-coast-a-summary-from-eyewitnesses/”

“Serco Combined Resilience Exercising … Simulation and Media Support The method of delivering an exercise is flexible and will be designed with the client to meet their requirements with options ranging from simple paper-based delivery through to full use of their real communications systems and advance computer simulation. In addition, media play can also be added in the form of news injects and the provision of experienced journalists and television crews to help test procedures and also assist in training key staff.”

“Serco operates the National Border Targeting Centre for UK Visas and Immigration and provides the carrier gateway—the interface between carriers and the agency.”

“NVC Contract Award. On January 31, 2006, in a re-competition for our expiring National Visa Center, or NVC, contract, we [Serco] were awarded the successor contract for the NVC contract by the Department of State.Under the contract, we anticipate performing over 20 million immigrant visa transactions each year at the NVC in Portsmouth, New Hampshire and at the Kentucky Consular Center in Williamsburg, Kentucky. The prime contract has a one-year base period and four one-year options with a potential value of approximately $84 million, inclusive of the options. The prior NVC contract generated 9.1% of our total revenues in fiscal 2005 and 9.2% of our total revenues in fiscal 2004.”

“Serco Group plc is a British outsourcing company based in Hook, Hampshire.[3] It operates public and private transport and traffic control, aviation, military weapons, detention centres, call centres, prisons and schools on behalf of its customers.

It is listed on the London Stock Exchange and is a constituent of the FTSE 250 Index. Serco operates in Continental Europe, the Middle East, the Asia Pacific region and North America, but the majority of its turnover comes from the UK.

Serco was founded in 1929 as RCA Services Limited, a United Kingdom division of the Radio Corporation of America and initially provided services to the cinema industry.[4] Following the takeover of RCA by General Electric in late 1985, RCA Services Limited was bought out by its local management. It changed its name to Serco in 1987 and has been a London Stock Exchange listed company since 1988.[4]”

“Serco Combined Resilience Exercising … Simulation and Media Support The method of delivering an exercise is flexible and will be designed with the client to meet their requirements with options ranging from simple paper-based delivery through to full use of their real communications systems and advance computer simulation. In addition, media play can also be added in the form of news injects and the provision of experienced journalists and television crews to help test procedures and also assist in training key staff.”

“Serco awarded new European External Action Service IT contract

Serco has secured a new service contract to deliver a central management service for ITclassified systems. The services will be delivered in Brussels with all staff executing the service holding security clearance up to ‘Secret UE’ level to access the classified zones. The duration of the contract is 4 years and it is valued at 9,000,000 EUR.

The European External Action Service is the European Union’s diplomatic corps. It supports the EU foreign affairs chief (High Representative for Foreign Affairs and Security Policy, Catherine Ashton) in conducting the common foreign and security policy. It has Delegations around the world working on behalf of the people of Europe and representing the EU as a whole. The EEAS manages the EU’s response to crises, has intelligence capabilities and cooperates with the European Commission in areas which it shares competence with.

The EEAS operates classified information systems (CIS) in order to securely exchange and process classified information. Serco are responsible for ensuring these CIS will be maintained, supported and monitored on a daily basis to ensure reliable and performing services.

The service’s that Serco will be responsible for include, setting up a Service Centre to manage the services in a global approach, beyond pure support. This Service Centre will resolve all tickets and service requests related to CIS:

It shall act as a single interface for receiving and recording of all calls, incidents and requests regarding CIS;

It shall restore as quickly as possible the service in order to minimize the impact of an incident.

Serco will also support and maintain: .. Email .. Shared IT Services .. Back-up / Archiving .. Network infrastructure Services … Email Gateway … Voice Gateway … Security Services .. Information Assurance Anti-Virus management IP Encryption Devices Primary Key Infrastructure services existing on classified networks

Michael Alner, Managing Director of Serco’s European Institutions business said: “We are delighted to support the important work of the European External Action Service through the award of this new contract.”

“Serco farewell to NPL after 19 years of innovation 8 January 2015 Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco’s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade…. NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading [and death-pool spot-fixed betting] in the City [by Serco shareholders including pig-farm custodian banks] through NPL [Zulu] Time.”

“The Emergency Planning College (EPC) delivers Cabinet Office-approved emergency planning and crisis management training. Managed by Serco, we are positioned at the heart of Government, within the Civil Contingencies Secretariat (CCS) of the Cabinet Office. Our highly experienced industry leading experts provide a wide range of dynamic and diverse training courses, seminars and workshops for public and private sector clients across the UK and overseas. We also offer real-time simulation exercises enabling delegates to fully test their emergency plans while gaining invaluable real life experience in dealing with a major incident. We provide a central forum for knowledge-sharing and focus on multi-agency working, disseminating best practice nationally and internationally to enhance worldwide resilience against natural disasters, major incidents and malicious attack.”

“Serious Fraud Office launches inquiry into G4S and Serco overcharging claims

Investigation follows justice secretary’s claims that firms overcharged on electronic tagging contracts for offenders

Under the contracts more than 20,000 offenders are monitored on electronic tags at any one time.

Alan Travis, home affairs editor

Monday 4 November 2013 12.34 GMTFirst published on Monday 4 November 2013 12.34 GMT

The Serious Fraud Office has launched a formal criminal investigation into two of the government’s biggest suppliers, G4S and Serco, following claims by the justice secretary, Chris Grayling, of tens of millions of pounds of overcharging on electronic tagging contracts for offenders.

Grayling asked the SFO to look into the billing allegations in July when he told MPs that an external audit had revealed that the overcharging included billing for tracking the movements of criminals who had moved abroad, who were back in prison, who had had their tags removed and even, in a few cases, those who had died.

The justice secretary said that in some cases the bills had continued to be presented years after active monitoring had stopped.

Whitehall sources have confirmed that the central allegation in the case revolves around charges for 3,000 phantom offenders. The justice ministry was being billed by the two companies for the tagging of 18,000 offenders a day under the £700m contract when only 15,000 were actually being monitored.

G4S said it would co-operate with the investigation and had been notified by the SFO director, David Green, that it would cover “the contract for the provision of electronic monitoring services which commenced in 2005 as amended and extended until the present day”.

In July Grayling asked the SFO to look into the situation after G4S refused to co-operate with a justice ministry internal forensic audit to establish whether any dishonesty had taken place. The decision to refer Serco, which did co-operate with the MoJ audit, to the SFO was taken in September.

In July Serco said senior management had not been aware of the discrepancies but they did not believe anything dishonest had taken place. The company agreed with the MoJ that if the forensic audit showed dishonesty had taken place they would jointly call in the SFO.

The pattern of overcharging was revealed by a PricewaterhouseCoopers external audit commissioned by Grayling in May after billing discrepancies were discovered during the re-tendering process.

Under the contracts, more than 20,000 offenders are monitored on electronic tags at any one time. They are a key element in the criminal justice system’s menu of community punishments as they are used to enforce curfews for prisoners on early release as well as some court orders.

In a small number of cases they have been used to track the movements of terror suspects and paedophiles. Last week prosecutions were halted against three terror suspects accused of tampering with their G4S-supplied GPS tags amid claims of faults with the tags and their straps.

The two companies are among the government’s biggest suppliers. Both have already agreed to withdraw from bidding for the £3bn next-generation tagging contract.

The Cabinet Office has also been reviewing the 28 contracts that the two companies currently hold with the government worth a total of £9bn, including the management of the atomic weapons establishment at Aldermaston. Grayling has said that both companies can bid for contracts to run 70% of the probation service but will not be awarded them unless the SFO give them a clean bill of health.

Sadiq Khan, the shadow justice secretary, said the SFO decision was a major development. “In July I wrote to the SFO calling on them to investigate claims against G4S and to act swiftly to secure any possible evidence that might be needed. I hope that the time taken to launch this investigation hasn’t resulted in the loss of important evidence,” he said.

“With future Ministry of Justice contracts up for grabs, including more than £600m of probation contracts, the government must act swiftly and bar G4S from bidding for any more until the SFO has concluded its investigation. By failing to do so, David Cameron risks undermining public confidence in our justice system.””

“Statement of Jim Flyzik Acting Assistant Secretary for Management and Chief Information Officer (CIO) before the House Government Reform Committee 6/21/2001 …. Treasury also hosted the Federal Bridge Certification Authority (FBCA) project for the Federal government, currently operated by GSA. The FBCA is a mechanism for the secure exchange of information between government agencies. The bridge allows agency public key infrastructures (PKIs) to interoperate as it permits digital credentials (called “digital certificates”) issued by each agency to its employees to be accepted with trust and confidence by other agencies for electronic transactions. This functionality directly supports E-Government, as agencies will be able to perform Internet-enabled transactions, such as credit card collections through banks, or secure emails between agencies, with previously unattainable trust and confidence. A prototype version of the FBCA became operational in February 2000 and was successfully used in a large-scale test in April 2000. During that time, the PKIs of five different organizations within the U.S., the Canadian Government and academia, were cross-certified through the prototype FBCA. The agencies were able to interoperate, successfully exchanging digitally signed electronic mail messages. FBCA is operated by GSA and, once cross-certification has been completed, will be used by NASA, USDA’s National Finance Center, FDIC, Treasury, the State of Illinois, and the Canadian Government for the electronic transfer of documents.”

“DHS ICE OTD … Since 1986, through various contracts, Serco has provided full training lifecycle support for all areas of this key Law Enforcement organization including Inspections, Border Patrol, Enforcement, and DHS operations at the Federal Law Enforcement Training Academy in Glynco, GA. .. Serco developed and scripted three scenarios based on negligent practices identified by the IG report that have resulted in the use of lost or uncontrolled weapons for robbery, murder, and the accidental death of a child. We used creative animation techniques, sound effects, music, and talented voice actors playing multiple characters to create an emotional appeal much different—and infinitely more powerful—from the standard WBT offering.

Serco has trained more than 400,000 DHS students in every region and district, at every land, air and sea border crossing, in classrooms, through WBT, train-the-trainer programs, on-the-job training and through the implementation of performance support systems in a blended learning environment. In collaboration with ICE OTD, our latest efforts have resulted in the accreditation and completion of three programs, including HSI FOTP, ICE OTD IDC, and ICE OPR. Serco was integral to the ICE team that was recognized by the 2012 “Excellence in Law Enforcement” Award given to the ICE Domestic Field Operations Training Program (DFTOP) Accreditation Project for having greatly improved ICE training, increasing operational efficacy and efficiency, and minimizing safety issues to ICE officers and the public.”

Yours sincerely,

Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222

McConnell’s Co-researcher David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation

 

1 2 3 82