#2324: Marine Links FAA Fuddy To Huerta Hack By Base One Tor, Black Hand Deaths By Serco Towers
Plum City – (AbelDanger.net): United States Marine Field McConnell has linked the FAA’s role in the alleged murder of Lorretta Fuddy off the coast of Molokai, Hawaii on December 12, 2013, to a Base One Technologies’ hack of FAA administrator Michael Huerta through the onion router (tor) and deaths by Black-Hand* agents in Serco airport control towers.
McConnell claims that Serco, operator of the U.S. National Visa Center, and its protégé Base One converted the U.S Naval Research Lab’s onion router into a honeypot patent thicket where devices accessible to the State Department and Serco’s Black Hand navigators, could be used to silence people such as Fuddy and scan a document conversion of the Obama birth certificate.
McConnell notes Serco (the world’s largest air traffic controller) filed a tor patent application in 1998 and processed a 2 millionth patent application for the U.S. Patent and Trademark Office in March 2013 giving its Base One protégé and Black Hand navigators ample opportunities to hack Huerta’s chain of command, crash planes, kill passengers and remove evidence from crime scenes.
Black Hand* – Serco navigators’ using the British Crown’s “Patent Rights to Track, Film and Kill” from the City of London’s Honourable Artillery Company 1537; The Master Mariners and The Air Pilots (formerly GAPAN) 1929, and The Ancient and Honorable Artillery Company of Massachusetts 1638 – whose alumni include U.S. Presidents James Monroe, Chester Alan Arthur, Calvin Coolidge and John F. Kennedy and – perhaps – Barack ‘Down Low’ Obama.
McConnell (30 year airline and 22 year military pilot with 23,000 hours of safety) is offering his expert-witness services to explain the FAA role in the murder of Lorretta Fuddy and how a Base One hack of FAA administrator Michael Huerta through the onion router (tor) serves to camouflage a Black-Hand murder-for-hire service by, in or near, Serco’s airport control towers.
death lend credence to assassination hypothesis
2014 by Dr. Eowyn | 8 Comments Loretta Fuddy was the woman who, as director of the State of Hawaii’s Department of Health, verified the authenticity of Obama’s alleged Hawaii birth certificate, an image of which he released on April 27, 2011 in an effort to silence “birthers”. (Fuddy said she gave Obama’s lawyer, Judith Corley, two photocopies of his original 1961 birth certificate on April 25, 2011. Obama posted a scan of that birth certificate on the White House website on April 27, 2011.)
Since then, however,
numerous documents experts have determined the certificate to be a
Loretta Fuddy On
December 12, 2013, news came that 65-year-old Fuddy was one of nine passengers
in a small commercial Cessna plane that crashed off the coast of Molokai,
Hawaii. The Coast Guard found the passengers floating in the water with life
jackets on. Fuddy died at the scene, while the other eight passengers,
including DOH deputy director Keith Yamamoto, all survived with only minor
the beginning, news accounts of Fuddy’s death were inconsistent and
Los Angeles Times reported that Honolulu Fire Captain Terry Seelig said Fuddy
didn’t get out of the plane but had “remained in the fuselage of the
plane.” Lt. William Juan with the Maui Police Department also said that
Fuddy’s body had been recovered from the wreckage.
On Dec. 14, 2013, the
Associated Press had a very different account. According to a priest, Rev.
Patrick Killilea, who consoled Keith Yamamoto after the crash, Yamamoto told
him [Killilea] he had helped Fuddy get out of the plane wreck and into her life
jacket, then held her hand to help her relax. The priest said, “They were
all floating together, and she [Fuddy] let go and there was no response from
her.” KITV reported that other eye witnesses also said Fuddy had made it
out of the plane just fine and was floating in the water, in her lifejacket,
with fellow passengers. Another local news source reported that Coast Guard
rescue swimmers said that they had found Fuddy, dead, floating in the water
after the plane sank.
The latest is that
there are THREE conflicting accounts of the cause of Fuddy’s death:
drowning severe internal injuries.
Linda Jordan is a self-described
“ordinary” American “housewife and mom of three” living in
the state of Washington. In an article for Birther Report, Nov. 10, 2014,
Jordan details the three conflicting causes of Fuddy’s death.
1. CARDIAC ARRHYTHMIA
On January 6, 2014, a press release from the Maui County Police Department
stated that Loretta Fuddy had died from cardiac arrhythmia after the small
plane she was in had to make an emergency ocean landing due to a failed engine.
2. DROWNING Nine
months later in September 2014, Jordan discovered a report by Maui police
detective Jamie Winfrey stating that “On December 13, 2013, an autopsy on
the body of Loretta Fuddy was performed by medical examiner Dr. Lindsey Harle
within the morgue at Molokai General Hospital. The preliminary cause of death
is drowning,” pending final autopsy report and toxicology results.
3. INTERNAL INJURIES
Then in November 2014, Jordan found a debriefing report by a commander of the
United States Coast Guard (USCG) who was part of the rescue effort in the
waters of Molokai. The report says Loretta Fuddy died from “severe internal
part of the debriefing report, USCG Case Report Case #665884:
A/C Commander = the
USCG commander, whose name is LT (the name after LT is blacked out) CG1720 =
Coast Guard 1720 1720 = a plane identifier number for the Coast Guard’s
O/S at 0220Z …..A/C Commander did not notice if a 121.5 distress signal was
radiating. He relayed that the pilot of the downed A/C stated that he lost
engine power shortly after take-off as he was making the left turn to head
towards Honolulu, after his second attempt to restart the engine failed he
prepped passengers and crew for a water landing and had them don PFD’s. He was
able to execute a good water landing and disembark passengers prior to the A/C
sinking. Mrs. Fuddy was alive but had sustained severe internal injuries during
the ditching. She succumbed to those injuries while awaiting rescue resources
To complicate matters,
Fuddy’s entire autopsy report, in spite of it being a public record, was
blacked out. No medical findings were revealed other than the official cause of
death of drowning.
Jordan points out that
Hawaii Revised Statute HRS 841-3 requires a full investigation into accidental
and unusual deaths. HRS 841-3 states:
“As soon as any
coroner or deputy coroner has notice of the death of any person within the
coroner’s or deputy coroner’s jurisdiction as the result of violence, or as the
result of any accident, or by suicide, or suddenly when in apparent health, or
when unattended by a physician, or in prison, or in a suspicious or unusual
manner, or within twenty-four hours after admission to a hospital or
institution, the coroner or deputy coroner shall forthwith inquire into and
make a complete investigation of the cause of the death.
On October 29, 2014,
Maui Police Chief Janice Okubo told Jordan that they have complied with HRS
841-3 by conducting an autopsy on Loretta Fuddy.
The problem is “a
complete investigation” into a “suspicious or unusual” death
involves more than just an autopsy. It includes interviewing witnesses and
first responders, under sworn oath, and collecting evidence. The investigation
also must be conducted in a manner where said interviews and evidence can be
used in a court of law.
Jordan explains why we
should be concerned about the death of Loretta Fuddy:
I’ll tell you why. [In
his autobiography] Obama said his father was a citizen of Kenya. For 16 years
he told people that he himself was born in Kenya and was raised in Indonesia
and Hawaii. This was in his biography on his publisher’s website. [In the]
biography he wrote about himself [which] he updated…several times during those
16 years…he always left in the part about being born in Kenya. And people
This was before he had proven himself to be a consummate liar so
why shouldn’t they have believed him? Those familiar with the Constitution
pointed out that if he was born in Kenya and if his father was a citizen of
Kenya, he was not eligible to be President of the United States.
Realizing the error of
his ways, Obama immediately began insisting that he was a citizen of this
country. He announced his bid for the presidency in February 2007 and on April
21,2007, he changed his biography to say that he was born in Hawaii.
That’s about the same
time people began demanding that he produce his original birth certificate.
Fours years later, and
in re-election mode, Obama announced he was tired of all the “silliness”
surrounding his citizenship status and asked Loretta Fuddy for a photocopy of
his original birth certificate. What Obama actually posted, however, on the
White House website, was an image of a forged Hawaiian birth certificate. A
month before Fuddy died she had been named in an affidavit requesting that a
Grand Jury launch an investigation into Obama’s forged birth certificate and
Fuddy’s role, if any, in the production of it. There were nine souls on board
the plane that day on December 11, 2013, and Fuddy was the only fatality. So
you can see why those of us who are convinced that Obama’s birth certificate
was forged, suspected foul play.
Of course we could be
completely wrong. But the recent discovery that there were three extremely
different causes of death listed for Fuddy, first, severe internal injuries,
second, drowning and third, cardiac arrhythmia, bolsters that original
suspicion.When stories change red flags should go up.
At the very least I am
convinced that someone is trying to hide something about the way she died. Are
they hiding incompetence, confusion at the scene of rescue, murder or something
else? I don’t know. But I do know this, an official investigation into the
demise of Loretta Fuddy is long overdue and I don’t care if it proves me wrong
or proves me right. I just want to get this story straight.
Thank you, Linda
Jordan, for your courage and tenacity in pursuit of the truth!”
“Michael Peter Huerta (born November 18, 1956) is the Administrator
of the Federal Aviation Administration. He
was confirmed as deputy Administrator on June 23, 2010, and became acting
Administrator upon the resignation of Randy
Babbitt on December 6, 2011. He was confirmed as Administrator on
January 7, 2013.
He received his
bachelor’s degree in political science from theUniversity of California, Riverside and
his master’s in international relations from the Woodrow
Wilson School of Public and International Affairs at Princeton University.
commissioner of New York City‘s Department of Ports, International
Trade and Commerce from 1986 to 1989. In January 1989, he left to serve as the
executive director of the Port of San Francisco until 1993. From
1993 to 1998 he held senior positions at the United States Department of
Transportation in Washington,
D.C., serving under Secretaries Federico
Peña and Rodney E. Slater during the Bill
Huerta worked as a
Managing Director with the Salt Lake Organizing Committee for the 2002 Olympic Winter Games,prepared Salt
Lake City‘s transportation outlets for the Olympics. Huerta was involved in
the planning and construction of a variety of Olympic transportation
facilities, as well as the development of a highly successful travel demand management system that
made sure that the transportation system operated safely and efficiently.
Huerta was Group President of the Transportation Solutions Group at Affiliated Computer Services, a
company later acquired by Xerox, specializing in business processes and information
nominated Huerta as Deputy Administrator of the Federal Aviation Administration (FAA).
On January 26, 2010, Huerta appeared before Congress for
his confirmation hearing, but
his Congressional confirmation was held up by Texas Senator John Cornyn over
fighter drones patrolling the Mexico–United States border near Corpus Christi. Huerta
waited over five months for his congressional confirmation; on June 23, 2010,
he became Deputy Administrator of the FAA.
Administrator of the FAA upon the resignation of Randy
Babbitt on December 6, 2011.As Acting
Administrator, Huerta helped oversee the operation of the National Airspace System and a
$16 billion budget.
On March 27, 2012,
President Barack Obama formally nominated him to serve as the next permanent
Administrator of the Federal Aviation Administration for a term of five years;
the nomination was subsequently confirmed by the U.S. Senate on January 1,
In December 2013, under Huerta’s supervision, the Federal Aviation
Administration selected six public entities to develop unmanned aircraft
systems (UAS) research and test sites around the country.
was named one of 8 Most Influential People in Drones.“
again about not having the Internet at 30,000 ft.
Yes, having access to
Facebook on a long flight helps to pass the time, but it could also be putting
passengers in the crosshairs of terrorists and hackers, according to a new
report released this week by a U.S. watchdog agency.
In a dossier released
Tuesday, the U.S. Government Accountability Office (GAO) said new aircraft may
be susceptible to having their inflight computer systems hacked through onboard
wi-fi networks or remotely by individuals elsewhere.
“According to cybersecurity experts we
interviewed, Internet connectivity in the cabin should be considered a direct
link between the aircraft and the outside world, which includes potential
malicious actors,” read the 56-page report.
The GAO stated that
planes possess firewalls designed to block cyberattacks and protect the craft’s
avionics; however, that software is still susceptible to being
experts with whom we spoke discussed firewall vulnerabilities, and all four
said that because firewalls are software components, they could be hacked like
any other software and circumvented,” the report said.
The situation is made
all the worse by the prevalent use of smartphones and other mobile devices by
passengers and pilots alike on flights worldwide everyday.
personal smartphones and tablets in the cockpit increases the risk of a
system’s being compromised by trusted insiders, both malicious and
non-malicious, if these devices have the capability to transmit information to
aircraft avionics systems,” stated the dossier.
The Federal Aviation
Administration said it has already begun taking steps to make cockpits safer
and is consulting security experts to single out areas of concern.
“This threat will
continue to evolve and it is something that needs to be at the forefront of our
thinking,” Michael Huerta, the FAA’s administrator, told a Senate oversight
panel this week, according to Reuters.
publication of the report, lawmakers demanded that the federal agencies act
fast to counter any potential threats to the aviation industry.
“[The FAA] must focus
on aircraft certification standards that would prevent a terrorist with a
laptop in the cabin or on the ground from taking control of an airplane through
the passenger wi-fi system,” Representative Peter DeFazio told CNN.”
“Base One Technologies …. N/WAN Design
Provide an IP based
Network Solution in response to an RFI from the FAA (Federal Aviation Agency)
to re-engineer their existing networks (FTI 2000).
providing and demonstrating the capabilities of an IP Network Architectural
Design including a Disaster Recover Solution in response to an RFI for the
FAA to upgrade or replace their current Mission Critical Network in the
providing a solution and a plan to transition the FAA’s current X.25
environment to the proposed IP (BGP/OSPF) network.
performance requirements, such high availability (99.9997%) with very strict
and aggressive Mean-Time-To-Recover (6 seconds), were exceeded or met. Using
Networking solutions from Nortel Networks and Cisco Systems, we provided a
highly scaleable, deterministic and secured IP network running over ATM.
FT1/T1 was provided in areas where ATM was not available. ISDN dial backup
and dial-on-demand routing were used to increase availability and enhance
MTTR. User connectivity was provided with Hot-Standby-Routing-Protocol (HSRP)
through robust and highly available Cisco Catalyst switches.
providing a security solution included for the entire network using
technologies such as Nokia/CheckPoint Firewall, Cylink ATM DS3, T1/FT1 &
ISDN Encryptors, and Dragon LAN based Intrusion
Network Design and Installation
integrated Network Management Platform solution to monitor the entire
proposed network. Management solution included HP OpenView, HP NetMetrix, NAI
Distributed Sniffers, CiscoWorks2000, Preside Multiservice Data Manager, etc.
Provided a prototype
lab using loaned equipment from major network device vendors. The equipment
included Nortel Networks WAN Passport Switches, Cisco Systems Routers and LAN
Switches, Adtran ISDN PRI/BRI simulators/switches, in addition to security
and network management hardware and software.
Proof-of-Concept presentation to MCI/WorldCom and the FAA representatives to
demonstrate the capabilities of the proposed Network Architecture.
the RFI submitted by the Federal Agency of Aviation. Produced lists of
questions on items that needed clarifications and submit to FAA. Reviewed all
responses and adjust our proposals accordingly.
Managed all loaned
personnel who assisted in installing, maintaining, configuring and
documenting loaned hardware and software.”
“Serco Awarded $187 Million Federal Aviation Administration Contracts
Date : 16 April 2015
Serco Inc., a provider of professional, technology and managed services,
announced today the award of two contracts to continue its 20-plus years of
supporting the Federal Aviation Administration’s (FAA) Contract Tower (FCT)
Program. Serco will provide air traffic control specialists, safety managers,
and program management services in support of 58 Air Traffic Control Towers
(ATCTs) in 11 western states, including Alaska, California and Colorado. The
two five-year contracts each have one base year and four one-year option
periods, with a combined value of $187 million, if all options are exercised.
Under these contracts, Serco’s Air Traffic Controllers will be responsible for
the safe and efficient movement of commercial, general aviation and military
aircraft on the airport and in the airspace surrounding the airport. The
Company will also provide risk management, quality assurance and program
management to meet FAA service standards and quality metrics. Serco will
utilise its Aviation Safety Management System to improve safety and mitigate
risks in the National Airspace System.
“Air Traffic Control Towers provide vital services ensuring that airports
are safer for pilots and passengers at airports across the country.” said
Dan Allen, Serco Inc.’s Chairman and Chief Executive officer. “As experts
in aviation and management solutions, we are honored and eager to continue
supporting the FAA in 2015 and beyond.”
As part of Serco Group, one of the largest contracted providers of Air
Navigation Services worldwide, the company is responsible for more than 960,000
miles of airspace and handles more than seven million aircraft movements a
year. Serco employs more than 700 air traffic control specialists at over 75
airports – located in the U.S., U.K. and Middle East – who help maintain flight
safety. In the US, the company has also been honored with the prestigious
Willie F. Card Federal Aviation Administration (FAA) Contract Tower Award at
towers in Lewiston, ID, Phoenix-Mesa Gateway, AZ, Jackson Hole, WY, Goodyear,
AZ, and San Luis Obispo, CA.”
routing network for securely moving data through communication networks
US 6266704 B1 ABSTRACT The onion routing network is used to protect
Internet initiators and responders against both eavesdropping and traffic
analysis from other users of the Internet. In the onion routing of the
invention, instead of making connections directly to a responding machine,
users make connections through onion routers. The onion routing network allows
the connection between the initiator and responder to remain anonymous.
Anonymous connections hide who is connected to whom and for what purpose from
“The best security: A trip through The Onion Router How TOR
works. Courtesy TOR Project. Published: April 24, 2013, 11:38 am .. Before the
Internet, people flocked to secret and well-hidden underground markets to
purchase either illegal or morally questionable items. With the birth of the
Internet, unlimited access to these items from around the world became a
reality. The issue was creating a tunnel to transfer anything from heroin to
full libraries of downloaded books, from one part of the world to the next
securely and secretly. Enter Tor. The U.S Naval Research Lab created Tor, or The Onion Router, as an
experiment in 1996. The lab has been studying different methods of carrying out
anonymous communication between governments for years. The result was the
original Tor network. .. Perhaps what Tor has become most well known for,
though, is the Silk Road. Run by an anonymous individual who refers to themselves
only as the Dread Pirate Roberts, the Silk Road is a highly illegal and highly
profitable passageway for very illegal items. Buyers can purchase pounds of heroin or an arsenal and have it
delivered to their home without leaving a trace. Discussions take place on a
huge number of Tor forums daily between drug dealers from around the world
discussing the latest trends and their future purchases. .. It may have
been underground at one point, but it is no longer just a whisper in the dark
forums of the Internet’s underbelly. It’s become a tool for activists, hackers,
drug dealers, and curious minds. It’s the beginning of a line of networks that
will become commonplace very soon. .. © COPYRIGHT – POSTMEDIA NEWS”
“Hillary wiped her server clean: As NBC’s Kristen Welker
reported over the weekend, the top Republican investigating the 2012 Benghazi
attack, Rep. Trey Gowdy (R-SC), revealed that Hillary Clinton had wiped her
server clean of her emails. “Clinton’s attorney, David Kendall, said Gowdy was
looking in the wrong place,” the AP says. “In a six-page letter released late
Friday, Kendall said Clinton had turned over to the State Department all
work-related emails sent or received during her tenure as secretary of state
from 2009 to 2013. ‘The Department of State is therefore in possession of all
Secretary Clinton’s work-related emails from the (personal email) account,’
Kendall wrote.” Here’s the “Meet the Press” discussion over the Clinton emails.”
“[Base One Technologies, Ltd. is a DOMESTIC
BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15,
1994.This file was obtained from the Secretary of State and has a
file number of 1795583] Expertly researches, designs, and develops
information security policies that protect your data and manage your firm’s
information technology risk at levels acceptable to your business. Performs
architectural assessments and conducts both internal and external penetration
testing. The results of these efforts culminate in an extensive risk analysis
and vulnerabilities report. Develops and implements multi-layer Information
Security Solutions, practices and procedures. We deploy Intrusion Detection Systems
(IDS) and IP Security with VPN solutions using Cisco routers, Frame Relay,
firewalls, address and port translation, obscurity standards and authentication
technologies (AAA, 3DES, TACACS, etcŠ), to enhance and meet the level of Data
Security required for global organizations. Conducts IT Security and Risk
Assessment in Federal government as well as security testing, implementing
security for multiple platforms and operating systems around the world. Ability
to conduct business process analysis to provide technical security
countermeasures, risk management and data communications security planning for
large organizations. Provides computer security integration for web server and
traditional client-server based applications. We secure environments up to as
many layers as required by our clients’ policies, industry practices, and
regulating bodies – including the desktop and user experience as
required. Develops, implements and
supports Information Security Counter measures such as honey-pots and evidence logging and incident
documentation processes and solutions.”
“SOURCE: Base One Technologies September 02, 2008 09:00 ET Base One
Technologies, Inc. Continues Operations in Government Space NEW ROCHELLE,
NY–(Marketwire – September 2, 2008) – Base One Technologies, Inc. is pleased
to announce that it has sold its affiliate, Base One Technologies Ltd., to
Apptis Inc. Base One Technologies, Inc. will continue to compete in the
government space as an 8(a), HubZone and Woman Owned Small Disadvantage Company.
Base One Technologies, Inc. is an IT Engineering and Technical Services company
founded in 1994. Base One has a Top Secret Facilities Clearance and specializes
in: Enterprise Architecture, Network Infrastructure Support, Data Security,
Software & Database Services, Disaster Recovery & Contingency Planning,
and Independent Validation & Verification. Base One is a privately-held
organization with headquarters in New Rochelle, NY. For more information
visit: www.base-one.com. Contact
Information: Liza R. Zaneri Base One Technologies 914 633-0200 x205 “www.base-one.com”
“Serco’s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth
strategies. Through the OPR, Serco mentors four local small businesses
under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One
Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the
fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services
were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year
airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well
blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation