#2329: Marine Links ConAir Sister’s Onion Router To FAA Base-One Murrah Bomb, Serco Black-Hand Lubitz Dam

Plum City – (AbelDanger.net): United States Marine Field McConnell has linked his sister Kristine Marcy’s development of a ConAir onion router network to FAA signal paths allegedly used by Base One Technologies to trigger bombs placed in the Alfred P. Murrah Federal Building, Oklahoma City, Oklahoma, and by Serco’s Black Hand* navigators to crash Andreas Lubitz’s Airbus 320 about 20 km from the Serre-Ponçon dam in the French Alps..

McConnell infers his ConAir Sister Marcy’s decoy and evidence-emoval role in the Murrah Building bombing http://www.ufomind.com/area51/list/1997/jan/a07-008.shtml “Con-Air” in 1/6 San Diego Union Tribune Nichols and McVeigh were transported in the dead of night in an operation much akin to a clandestine military operation, Little said. He did not want to go into details but mentioned that a decoy plane was among the ploys used to guard against possible attempts by supporters to free the suspects. Federal officials have always been circumspect about the fine points of prisoner movement. But ConAir soon could gain a higher public profile with the planned release in June of a movie by the same name. In the Disney film, Nicolas Cage plays a hapless prisoner who wanders into a hijack plot aboard a Marshals Service plane carrying a group of high-security inmates. The Hollywood marshals rough up some of the prisoners, and the plane crashes, leaving the real Marshals Service frowning on the silver screen’s invention, said Kristine Marcy, a top official in charge of detentions [and decoy contract hits]. “We don’t beat up our prisoners, and our planes certainly don’t crash,” Marcy said on a recent trip to San Diego, where she was trying to find more jail space for federal prisoners.”

Benton K. Partin Brigadier Gen. USAF (Ret.) 

8908 Captains Row 
Alexandria, Virginia 22308 
July 30, 1995

Sen. Trent Lott 
United States Senate 
487 Senate Russell Office Building 
Washington, DC 

Dear Sen. Lott:

The attached report contains conclusive proof that the bombing of the Alfred P. Murrah Federal Building, Oklahoma City, Oklahoma, was not caused solely by the truck bomb. Evidence shows that the massive destruction was primarily the result of four demolition charges placed at critical structural points at the third floor level.

… Both the Federal Building in Oklahoma and the Trade Center in New York (See New York Times, October 28, 1993, p. A1) show evidence of a counterterrorism sting gone wrong.

No government law enforcement agency should be permitted to demolish, smash and bury evidence of a counterterrorism sting operation, sabotage or terrorist attack without a thorough examination by an independent, technically competent agency.

If an aircraft crashed because of a bomb, or a counterterrorism sting or an FAA Controller error, the FAA would not be permitted to gather and bury the evidence. The National Transportation Safety Board would have been called in to conduct an investigation and where possible every piece of debris would have been collected and arrayed to determine cause of failure.

To remove all ambiguity with respect to the use of supplementary demolition charges, the FBI should be required to release the high quality surveillance color TV camera tape of the Murrah building bombing on April 19, 1995.

It is my observation that the effort required to bomb the A. P. Murrah Federal Building in Oklahoma City pales in comparison with the effort to cover up evidence in Oklahoma and the media’s withholding of vital information from the American people. …

Resume of Brig. Gen. Benton R. Partin USAF (Ret.) 
OKC Bomb Report Index Page

ouise attaque a dit… Bonjour à tous. Il me semble que le barrage de Serre-Ponçon, le plus grand barrage en terre d’Europe qui contient la plus importante retenue d’eau de France (lac artificiel de Serre-Ponçon) se situe sur la trajectoire de vol de l’A320. Le crash a eu lieu à seulement une vingtaine de kilomètre à vol d’oiseau du barrage. Je n’ose imaginer le nombre de morts supplémentaires si l’impact avait dû avoir lieu contre le barrage.”

Serco’s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals.”

Dark web ethnographic method Because this is an ethnography of a dark web SNS, there were several methodological challenges. The dark web is different from the “clear web” in important ways. The dark web is part of the Internet that cannot be accessed by mainstream software.1 It includes hidden sites that end in “.onion” or “.i2p” or other Top-Level Domain names only available through modified browsers or special software. Accessing I2P sites requires a special routing program. Accessing non-mainstream Top-Level Domains through OpenNIC requires the user to change the DNS server addresses on his or her router. Accessing .onion sites requires Tor (for a tutorial on Tor and .onions, see Hoffman (2012)). Moreover, those who run dark websites that end in .onion are able to hide their identities and locations from most, if not all.

McConnell notes his sister’s Senior Executive Service launched both ConAir and the Serco protégé company, Base One Technologies, in 1994 when Serco (the world’s largest air traffic controller) began building State Department honeypots through backdoor operations of the U.S. National Visa Center, the U.S. Patent and Trademark Office — onion router patent published July 2001 — and FAA Contract Towers.

McConnell claims that his sister’s Senior Executive Service ordered Serco and its Base One protégé to transfer the U.S Naval Research Lab’s onion router networks into the custody of her Conair and FAA managers so they could use the FAA’s global ad-hoc signal paths to trigger bombs in the Murrah Building and drone Lubitz’s Airbus and ensure both crime scenes were cleared of onion router evidence.

McConnell claims that his sister’s Senior Executive Service allows Serco (formerly RCA GB 1929) to operate under Crown Rights rules where Conair practises any patent issued including using FAA onion routers or Boeing Uninterruptible Autopilots to trigger Black Hand hacks of passenger planes or bombs in WTC#7, NYC, or the Murrah Building in OKC.

Black Hand* – Serco navigators’ using the British Crown’s “Patent Rights to Track, Film and Kill” from the City of London’s Honourable Artillery Company 1537; The Master Mariners and The Air Pilots (formerly GAPAN) 1929, and The Ancient and Honorable Artillery Company of Massachusetts 1638 – whose alumni include U.S. Presidents James Monroe, Chester Alan Arthur, Calvin Coolidge and John F. Kennedy and – perhaps – Barack ‘Down Low’ Obama.

While in London, England on Saturday, 11 April, 2015, Field McConnell was urged by a publisher to write his life story and his book, “Honor Thy Parents” will be available on Amazon.com by 11 September, 2015.

Prequel 1: #2328: Marine Links Serco’s Clinton State Of Treason To FAA Base One Onion Router, Black Hand Lubitz Dam

Prequel 2: Letter from Gen. Partin to U.S. Sen. Trent Lott

Prequel 3: TRIAL BY MEDIA: co-pilot Andreas Lubitz – Abel Danger In Germany – Field McConnell besucht Deutschland – Der Whistleblower der Luftfahrtindustrie, Field McConnell – The Hegelian Odyssey of Andreas Lubitz Continues – SHOT DOWN 4U9525 UNITES FRANCE & GERMANY

Trailer – Con Air (1997) 

Oklahoma City Bombing News Reports: Unexploded bombs found in the Murrah building! 

Black box fligh recorder airbus a320 4u 9525 GermanWings aircrash – Andreas Lubitz pilot

Serco… Would you like to know more? 
SWISSLEAKS – “HSBC developed dangerous clients:
 arms merchants, drug dealers, terrorism financers”
Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! (Mobile Playback Version) 
[Note that HSBC is Serco’s banker and, with Allianz and Her Majesty’s Government, one of Serco’s major shareholders ] 

“We may never know exactly what really happened. The memory
chip of the second black box recording flight data was missing, something which
in itself is very odd. .. If the plane did crash, the cause may have been the
hacking of the computer system during the repairs the day prior to the flight.
The three French Mirage planes could have jammed the electronic communication
and control system. Also, odd is the alleged appearance of an Italian fighter
jet near the alsp, which squawked on the emergency channel of the Airbus the
very time when radio contact was lost.”

Hello World,
Another commercial
plane went down and again the blame is on the pilot. The Germanwings 9525, an
Airbus A320-211, crashed into the Alps mountains after what is being defined as
a constant descent, beginning few minutes after a routine contact with air
traffic control. I sincerely believe, this accident has more to do with the
aircraft than the pilot. Here are the reasons why I do not buy the ‘Crazy-Pilot’

This time, instead of
waiting for the media to speculate, the Crisis-Management efforts have
efficiently used the media elements to prevent the general public from thinking
anywhere near the actual root-cause of the incident. 

Firstly, the very fact
that the prosecutors’ claims are being published as key findings and then
publishing the findings as support indicates that this effort is avoiding
the acceptance and analysis of possibilities that will indicate the
mistake of individuals other than the flight crew. 

How did a German
media-house get hold of cockpit voice recording (or its transcript) at a time
when no such information was officially released? If the report was alleged and
the claim unsupported by facts of the leak, what actions are being taken
against the German media-house that published such a report? [Nobody will talk
about it because it probably was a paid media campaign] ….


In my view, the
aircraft was an aging platform, well near or over its design operational life
and it might have been subjected to a very questionable
‘Life-Extension-Program’ which in part or full might have rendered the aircraft
vulnerable to multiple unidentified failure modes, one of which struck the
aircraft during its final flight that ended in the crash. The
Life-Extension-Program was approved by EASA but FAA refused to allow its
inclusion at one point of time. If one regulator finds enough evidence to agree
why does another find enough evidence to disagree? What does that tell about
the very viability of the Life-Extension-Program and its impact on the aircraft
it is approved for, irrespective of its full/partial implementation?

The possibility of
co-pilot deliberately crashing the plane is a story being cooked up to cover up
this incident so as to protect multiple commercial interests. In the end, as it
turns out, pilots can no longer divulge their health issues or personal fronts
to their managements as those details will be cleverly used against them, when
they are not even alive to defend their stand.

At this point I am
even curious to learn if those individuals who get angry at speculators online
(and drag the discussion to the most insignificant bolt on the plane) might be
part of a specially constituted online-clean-up team reporting to the
crisis-management team that is trying to keep operator, manufacturer,
maintainer and the regulator from any possible blame, every time a plane
goes down (debris recovery is irrelevant here).

How in the world do these stakeholders remain untouched while pilots alone get
blamed for ‘tendencies’ and ‘depressions’ based on what everyone proudly calls ‘initial reports’?????

The lack of exceptions in this trend is what keeps me wondering what really
happens to these untouched possibilities of plane crashes.”

“Base One Technologies [DOMESTIC
BUSINESS CORPORATION, located in New Rochelle, NY and was formed on Feb 15,
1994.This file was obtained from the 
[Clinton] Secretary of State and
has a file number of 1795583] …. N/WAN Design
Provide an IP based Network
Solution in response to an RFI from the FAA (Federal Aviation Agency) to
re-engineer their existing networks (FTI 2000). .. Responsible for providing
and demonstrating the capabilities of an IP Network Architectural Design
including a Disaster Recover Solution in response to an RFI for the FAA to
upgrade or replace their current Mission Critical Network in the United States
[allegedly to prepare for the attacks of 9/11] … Responsible for providing a
security solution included for the entire network using technologies such as
Nokia/CheckPoint Firewall, Cylink ATM DS3, T1/FT1 & ISDN Encryptors, and Dragon LAN based Intrusion Detection
. .. Managed
[Clinton war
room for]
all loaned personnel who assisted in installing, maintaining,
configuring and documenting loaned hardware and software

United 93 reaches cruising altitude of 35,000 feet and as the passengers relax
and are being served breakfast the terrorists wait for the right moment to
hijack the plane.
After al-Haznawi returns from a toilet wearing an
artificial bomb around his torso al-Ghamdi holds one of the flight attendants
Debbie Welsh at knife point while the passengers are moved to the rear of the
plane after al-Haznawi displays the “bomb.” Both Jarrah and al-Ghamdi
force Debbie to let them into the cockpit and both pilots as well as Debbie are
murdered. Jarrah then takes over as the pilot and claims they have 50 minutes
left to live as he flies the plane for their chosen target which is implied to
be the 
. However the passengers
decide to save themselves after discovering that the pilots are dead as well as
learning via air phones the 
World Trade
 and Pentagon have
been struck. After coming up with a plan and praying, the passengers attempt to
take back the airplane. After al-Haznawi is killed al-Nami warns Jarrah and
al-Ghamdi and despite his vain attempts to delay the passengers he is killed
after Jeremy Glick snaps his neck. The male passengers frantically break into
cockpit and attempt to land the plane but Jarrah manages to turn the
plane upside down before the aircraft crashes into 
Pennsylvania and the scene fades out implying everyone on board has been killed

“I remember a long time ago (2002) when some of the actions of the
hijackers of the September 11 planes, namely the United 93 one, included trying
to turn off the autopilot several times, then re-engaging it (at which point it
returned to it cruise altitude and course).
Apparently on the
‘transmissions’ they made over the ATC frequency (telling the “Air Traffic
Controller” to sit down and remain calm and remain seated) there was the
Autopilot disconnect horn going off in the background. This was also shown in
Paul Greengrass’ movie United 93 with the actor playing Ziad Jarrah (UAL93
hijacker pilot) trying desperate to silence the Autopilot alarm by pressing
random buttons, (Including the “engage autopilot” Button) and not
getting anywhere. The alarm continues wailing for several minutes through the
cockpit scenes in the movie. Later he decides that he will “Descend to
speed up”, thereby increasing the aircraft’s Indicated airspeed (into
Overspeed clacker warning) but ultimately decreasing the aircraft’s Ground
speed and Mach (ie: he actually slowed due to not understanding what Indicated
Airspeed is). Maybe these details make me more annoyed/angry at n00bs than I
would otherwise be, since they seem to have the same misconceptions about the
operation of airliners that the movie (and possibly real) UAL93 hijackers did.”

One Technologies …. N/WAN Design
Provide an IP based Network Solution in
response to an RFI from the FAA (Federal Aviation Agency) to re-engineer their
existing networks (FTI 2000). .. Responsible for providing and demonstrating
the capabilities of an IP Network Architectural Design including a Disaster
Recover Solution in response to an RFI for the FAA to upgrade or replace their
current Mission Critical Network in the United States. Responsible for
providing a solution and a plan to transition the FAA’s current X.25
environment to the proposed IP (BGP/OSPF) network. Challenging performance
requirements, such high availability (99.9997%) with very strict and aggressive
Mean-Time-To-Recover (6 seconds), were exceeded or met. Using Networking
solutions from Nortel Networks and Cisco Systems, we provided a highly
scaleable, deterministic and secured IP network running over ATM. FT1/T1 was
provided in areas where ATM was not available. ISDN dial backup and
dial-on-demand routing were used to increase availability and enhance MTTR.
User connectivity was provided with Hot-Standby-Routing-Protocol (HSRP) through
robust and highly available Cisco Catalyst switches. Responsible for providing
a security solution included for the entire network using technologies such as
Nokia/CheckPoint Firewall, Cylink ATM DS3, T1/FT1 & ISDN Encryptors, and
Dragon LAN based Intrusion Detection Systems. .. Managed all loaned personnel
who assisted in installing, maintaining, configuring and documenting loaned
hardware and software.” … 

One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York,
NY and was formed on Feb 15, 1994.This file was obtained from the [Clinton]
Secretary of State and has a file number of 1795583]
..  Conducts IT Security and Risk Assessment in
Federal government as well as security testing, implementing security for
multiple platforms and operating systems around the world … Develops, implements and supports Information
Security Counter measures such as honey-pots and
evidence logging and incident documentation processes and solutions.
SOURCE: Base One Technologies September 02, 2008 09:00 ET Base One
Technologies, Inc. Continues Operations in Government Space NEW ROCHELLE,
NY–(Marketwire – September 2, 2008) – Base One Technologies, Inc. is pleased
to announce that it has sold its affiliate, Base One Technologies Ltd., to
Apptis Inc. Base One Technologies, Inc. will continue to compete in the
government space as an 8(a), HubZone and Woman Owned Small Disadvantage
Company. Base One Technologies, Inc. is an IT Engineering and Technical
Services company founded in 1994. Base One has a Top Secret Facilities
Clearance and specializes in: Enterprise Architecture, Network Infrastructure
Support, Data Security, Software & Database Services, Disaster Recovery
& Contingency Planning, and Independent Validation & Verification. Base
One is a privately-held organization with headquarters in New Rochelle, NY. For
more information visit: 
www.base-one.com. Contact Information: Liza R. Zaneri Base One Technologies 914
633-0200 x205 “

“Serco Awarded $187 Million Federal Aviation Administration Contracts

Date : 16 April 2015

Serco Inc., a provider of professional, technology and managed services,
announced today the award of two contracts to continue its 20-plus years of
supporting the Federal Aviation Administration’s (FAA) Contract Tower (FCT)
Program. Serco will provide air traffic control specialists, safety managers,
and program management services in support of 58 Air Traffic Control Towers
(ATCTs) in 11 western states, including Alaska, California and Colorado. The
two five-year contracts each have one base year and four one-year option
periods, with a combined value of $187 million, if all options are exercised.

Under these contracts, Serco’s Air Traffic Controllers will be responsible for
the safe and efficient movement of commercial, general aviation and military
aircraft on the airport and in the airspace surrounding the airport.  The
Company will also provide risk management, quality assurance and program
management to meet FAA service standards and quality metrics.  Serco will
utilise its Aviation Safety Management System to improve safety and mitigate
risks in the National Airspace System.

“Air Traffic Control Towers provide vital services ensuring that airports
are safer for pilots and passengers at airports across the country.” said
Dan Allen, Serco Inc.’s Chairman and Chief Executive officer. “As experts
in aviation and management solutions, we are honored and eager to continue
supporting the FAA in 2015 and beyond.”

As part of Serco Group, one of the largest contracted providers of Air
Navigation Services worldwide, the company is responsible for more than 960,000
miles of airspace and handles more than seven million aircraft movements a
year. Serco employs more than 700 air traffic control specialists at over 75 airports
– located in the U.S., U.K. and Middle East – who help maintain flight safety.
In the US, the company has also been honored with the prestigious Willie F.
Card Federal Aviation Administration (FAA) Contract Tower Award at towers in
Lewiston, ID, Phoenix-Mesa Gateway, AZ, Jackson Hole, WY, Goodyear, AZ, and San
Luis Obispo, CA.”

routing network for securely moving data through communication networks
US 6266704 B1
ABSTRACT The onion routing network is used to protect
Internet initiators and responders against both eavesdropping and traffic
analysis from other users of the Internet. In the onion routing of the
invention, instead of making connections directly to a responding machine,
users make connections through onion routers. The onion routing network allows
the connection between the initiator and responder to remain anonymous.
Anonymous connections hide who is connected to whom and for what purpose from
outside eavesdroppers.”

“The best security: A trip through The Onion Router How TOR works. Courtesy TOR Project. Published: April 24, 2013, 11:38 am .. Before the Internet, people flocked to secret and well-hidden underground markets to purchase either illegal or morally questionable items. With the birth of the Internet, unlimited access to these items from around the world became a reality. The issue was creating a tunnel to transfer anything from heroin to full libraries of downloaded books, from one part of the world to the next securely and secretly. Enter Tor. The U.S Naval Research Lab created Tor, or The Onion Router, as an experiment in 1996. The lab has been studying different methods of carrying out anonymous communication between governments for years. The result was the original Tor network. .. Perhaps what Tor has become most well known for, though, is the Silk Road. Run by an anonymous individual who refers to themselves only as the Dread Pirate Roberts, the Silk Road is a highly illegal and highly profitable passageway for very illegal items. Buyers can purchase pounds of heroin or an arsenal and have it delivered to their home without leaving a trace. Discussions take place on a huge number of Tor forums daily between drug dealers from around the world discussing the latest trends and their future purchases. .. It may have been underground at one point, but it is no longer just a whisper in the dark forums of the Internet’s underbelly. It’s become a tool for activists, hackers, drug dealers, and curious minds. It’s the beginning of a line of networks that
will become commonplace very soon. .. © COPYRIGHT – POSTMEDIA NEWS”

“Hillary wiped her server clean: As NBC’s Kristen Welker reported over the weekend, the top Republican investigating the 2012 Benghazi attack, Rep. Trey Gowdy (R-SC), revealed that Hillary Clinton had wiped her server clean of her emails. “Clinton’s attorney, David Kendall, said Gowdy was looking in the wrong place,” the AP says. “In a six-page letter released late Friday, Kendall said Clinton had turned over to the State Department all work-related emails sent or received during her tenure as secretary of state from 2009 to 2013. ‘The Department of State is therefore in possession of all Secretary Clinton’s work-related emails from the (personal email) account,’ Kendall wrote.” Here’s the “Meet the Press” discussion over the Clinton emails.”

Yours sincerely,

Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year
airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222

David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well
blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation

517 Total Views 1 Views Today
Please follow and like us:

Related Post