#2425: Serco Shaking Hands With The Devil’s Clocks – Hedging Wills By Delay To Di – Marine Corps’ Spot in 8(a) Suites
1. Serco began shaking hands with devil clocks in 1994 when David Cameron and Hillary Clinton appear to have outsourced FVEY network time protocols and allowed Serco to synchronize communications with pre-deployed tagged offenders at false-flag crime scenes.
2. By 1997, Christopher Hyman, Serco’s former European finance director, appears to have equipped women in hedge funds for online assassination betting where Serco tagged offenders allegedly delayed the time of death of Princess Diana and provided the women with a real-time time-stamped snuff film to hedge the future activities of Diana’s bereaved son, Prince William (“Wills”), the second in line to succeed his grandmother, Queen Elizabeth II, after his father.
3. By 1997, Serco had equipped James Jones, former deputy chief of staff at Headquarters Marine Corps in Washington, D.C., and hedge-fund suites in the world’s top hotels, for continuity-of-government operations where Serco 8(a) protégés help elite women stage man-in-the-middle attacks by spot fixing the time of death of enemies, rebels and whistleblowers.
Noting that Serco promoted Chris Hyman to Chief Operating Officer and apparently sent him to coordinate synchronized FVEY/8(a) attacks from the 47th floor of the World Trade Center on 9/11, Field McConnell invites the current Marine Corps General Joseph Dunford – Obama’s nominee Chairman of the Joint Chiefs of Staff – to show cause why he should not be indicted for Misprision of Treason, given McConnell’s unanswered challenge as described at the link below.
“Doctor tells of Princess Diana’s last moments
Repeated electric shocks failed to revive the Princess
By Gordon Rayner, Chief Reporter
12:01AM GMT 14 Nov 2007
A doctor has described the moment medics realised they had lost the battle to save Diana, Princess of Wales.
The inquest into the Princess’s death was told that staff at the Pitie-Salpetriere Hospital in Paris constantly carried out cardiac massage as surgeons tried to repair a ruptured blood vessel next to her heart which was causing massive internal bleeding.
But after repeated electric shocks also failed to revive the Princess, doctors accepted they could do no more to save her life.
Diana inquest: Doctor thought she would live
13 Nov 2007
Anaesthetist Daniel Eyraud said in a statement read to hearing at the Royal Courts of Justice in London: “We decided by common consent to stop heart massage as it was completely impossible to restore cardiac activity after such a long period of arrest.
“From that point, the Princess was pronounced dead. I personally believe we did everything possible to save the Princess with the appropriate means.”
The jury has already been told that Diana went into cardiac arrest at around 2.10am and was finally pronounced dead at 4am.
Diana had suffered massive internal injuries when the car in which she was a passenger crashed in the Alma underpass at around 12.25am on August 31, 1997.
The “compressive right haemothorax” in turn put pressure on the Princess’s right lung and her heart, Dr Eyraud explained.
Her heart stopped for the first time as she was taken out of the wreck of the Mercedes by emergency service staff at around 1am.
Immediate cardiac massage was applied and her heart restarted.
But as she was being taken to hospital by ambulance, her condition deteriorated again and the vehicle had to be stopped to allow a doctor to work on her, the court heard.
By the time she arrived at the hospital, staff were on hand, ready for a “worst case scenario”, the anaesthetist said.
Diana was already unconscious and, although she did have a heartbeat, she quickly needed artificial help to breathe.
“Upon her arrival, the Princess was ‘intubated-ventilated’ which means that a piece of apparatus was making her breathe,” Dr Eyraud said.
“She was unconscious, I’m positive of that, and on artificial respiration.
“She was in shock, but nevertheless had a heart rhythm.
“This means that her blood pressure was very low but that her heart was still beating.”
Ambulance driver Michel Massebeuf said in a statement that he had driven slowly to the hospital on the orders of the doctor in the ambulance.
Conspiracy theorists have claimed that Diana’s journey to hospital was deliberately slowed down as part of a plot to murder her, but Mr Massebeuf said: “Driving slowly is a rule, the sole objective of which is to preserve a casualty where necessary.”
A short distance from the hospital the doctor asked him to stop so he could administer emergency treatment after Diana’s blood pressure dropped, he added.
The hearing continues.”
Behind the Sordid World of Online Assassination Betting
I have heard rumors about this website, but I still cannot quite believe that it exists. I am looking at what I think is a hit list.
There are photographs of people I recognize—prominent politicians, mostly—and, next to each, an amount of money. The site’s creator, who uses the pseudonym Kuwabatake Sanjuro, thinks that if you could pay to have someone murdered with no chance—I mean absolutely zero chance—of being caught, you would.
That’s one of the reasons why he has created the Assassination Market.
There are four simple instructions listed on its front page:
Add a name to the list
Add money to the pot in the person’s name
Predict when that person will die
Correct predictions get the pot
The Assassination Market can’t be found with a
Google search. It sits on a hidden, encrypted part of the internet that, until recently, could only be accessed with a browser called The Onion Router, or Tor. Tor began life as a U.S. Naval Research Laboratory project, but today exists as a not-for-profit organization, partly funded by the U.S. government and various civil liberties groups [100 Women in Hedge Funds], allowing millions of people around the world to browse the internet anonymously and securely.
To put it simply, Tor works by repeatedly encrypting computer activity and routing it via several network nodes, or “onion routers,” in so doing concealing the origin, destination, and content of the activity. Users of Tor are untraceable, as are the websites, forums, and blogs that exist as Tor Hidden Services, which use the same traffic encryption system to cloak their location.
The Assassination Market may be hosted on an unfamiliar part of the net, but it’s easy enough to find, if you know how to look. All that’s required is simple (and free) Tor software. Then sign up, follow the instructions, and wait. It is impossible to know the number of people who are doing exactly that, but at the time of writing, if I correctly predict the date of the death of Ben Bernanke, the former chairman of the Federal Reserve, I’d receive approximately $56,000. It may seem like a fairly pointless bet. It’s very difficult to guess when someone is going to die. That’s why the Assassination Market has a fifth instruction:
Making your prediction come true is entirely optional”
Time Protocol (NTP) is a networking protocol for clock synchronization between
computer systems over packet-switched,
variable-latency data networks. In operation since before 1985, NTP is one
of the oldest Internet
protocols in current use.
NTP was originally designed by David L. Mills of the University
of Delaware, who still oversees
its development. … While no one doubts
the contribution of NTP to network performance, several security concerns have
arisen in late 2014. Previously, researchers became aware that NTP servers can
be susceptible to man-in-the-middle
attacks unless packets are
cryptographically signed for authentication. The computational overhead involved can make this impractical on
busy servers, particularly during denial of service attacks. NTP message spoofing can
be used to move clocks on client computers and allow a number of attacks based
on bypassing of cryptographic key expiration.”
drama television series and a contemporary adaptation of Sir Arthur Conan Doyle‘s Sherlock
Holmes detective stories. Created by Steven
Moffat and Mark Gatiss, it stars Benedict Cumberbatch as Sherlock Holmes
and Martin Freeman as Doctor
John Watson. Nine episodes have been produced,
the first three of which were broadcast in 2010. Series two was broadcast in
2012, and a third series was broadcast in 2014. The third series has become the
UK’s most watched drama series since 2001.Sherlock has
been sold to over 200 territories. Sue Vertue and
Elaine Cameron of Hartswood Films produced the series for theBBC and co-produced
it withWGBH Boston
for its Masterpieceanthology
series on PBS.
The series is primarily filmed in Cardiff,Wales. North Gower Street inLondon is
used for exterior shots of Holmes and Watson’s 221B
Baker Street residence.
been highly positive, with many reviews praising the quality of the writing,
performances, and direction.Sherlock has been nominated for
numerous awards including:BAFTAs, Emmys,
and Golden Globe, winning several awards across a
variety of categories. The show received the most wins at the 66th Primetime Emmy Awards including Outstanding
Writing for a Miniseries, Movie or a Dramatic Special for Moffat,Outstanding
Lead Actor in a Miniseries or a Movie for Cumberbatch, and Outstanding
Supporting Actor in a Miniseries or a Movie for Freeman. In addition,
the show was also honoured with a Peabody
Award in 2011.
been released on DVD and Blu-ray, alongside tie-in editions
of selected original Conan Doyle stories and original soundtrack composed
by David Arnold and Michael Price. In January 2014, the show
launched its official mobile app called Sherlock: The Network. On
2 July 2014, Sherlock was renewed for a fourth series. The three-episode series
is scheduled to be filmed in early 2016, following a full-length Christmas 2015
special that went into production in January 2015.“
refer to an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States.
These countries are bound by the multilateral UKUSA Agreement, a treaty for joint cooperation in signals
FVEY can be traced back to World War II, when theAtlantic Charter was issued by the Allies to lay out their goals for a post-war world. During the course of
the Cold War, the ECHELON surveillance system was initially developed
by the FVEY to monitor the communications of the former Soviet Union and the Eastern Bloc, although it allegedly was later used to monitor billions of private
existence of ECHELON was disclosed to the public, triggering a major debate in
Parliament and, to a lesser
extent, the United
States Congress. As part of
efforts in the ongoing War on Terror since 2001, the FVEY further expanded their surveillance
capabilities, with much emphasis placed on monitoring the World Wide Web. The former NSA contractor Edward Snowden described the Five Eyes as a “supra-national intelligence organisation that doesn’t
answer to the known laws of its own countries”.Documents leaked by Snowden in 2013 revealed that the FVEY have been
spying on one another’s citizens and sharing the collected information with
each other in order to circumvent restrictive domestic
regulations on surveillance
Snowden’s disclosures, some experts in the intelligence community believe that
no amount of global concern or outrage will affect the Five Eyes relationship,
which to this day remains one of the most comprehensive known espionage
alliances in history.”
worked for Arthur Andersen. In 1989, he won an 18-month
exchange with Ernst & Young in London, who employed him after four months. Head hunted in 1994 by Serco, Hyman became European finance
director, and in 1999 was made group finance director. In 2002, Hyman
became chief executive.
the FIA GT3 European Championship. 
“Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. In operation since before 1985, NTP is one of the oldest Internet protocols in current use. NTP was originally designed by David L. Mills of the University of Delaware, who still oversees its development. … While no one doubts the contribution of NTP to network performance, several security concerns have arisen in late 2014. Previously, researchers became aware that NTP servers can be susceptible to man-in-the-middle attacks unless packets are cryptographically signed for authentication. The computational overhead involved can make this impractical on busy servers, particularly during denial of service attacks. NTP message spoofing can be used to move clocks on client computers and allow a number of attacks based on bypassing of cryptographic key expiration.“
Eyes”, often abbreviated as “FVEY”, refer to an intelligencealliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are bound by the multilateral UKUSA Agreement, a treaty for joint cooperation in signals intelligence.
FVEY can be traced back to World War II, when theAtlantic Charter was issued by the Allies to lay out their goals for a post-war world. During the course of the Cold War, the ECHELON surveillance system was initially developed
by the FVEY to monitor the communications of the former Soviet Union and the Eastern Bloc, although it allegedly was later used to monitor billions of private communications worldwide.
existence of ECHELON was disclosed to the public, triggering a major debate in theEuropean Parliament and, to a lesser extent, the United States Congress. As part of efforts in the ongoing War on Terror since 2001, the FVEY further expanded their surveillance capabilities, with much emphasis placed on monitoring the World Wide Web. The former NSA contractor Edward Snowden described the Five Eyes as a “supra-national intelligence organisation that doesn’t answer to the known laws of its own countries”.
spying on one another’s citizens and sharing the collected information with each other in order to circumvent restrictive domestic regulations on surveillance of citizens.
Despite the impact of Snowden’s disclosures, some experts in the intelligence community believe that no amount of global concern or outrage will affect the Five Eyes relationship, which to this day remains one of the most comprehensive known espionage alliances in history.“
“*CyberSecurity and the Law: Managing CyberRisk
As challenges related to cyber security emerge as an ever-greater priority in France and the United States, the French-American Foundation, with offices in the United States and France, will organize its second annual Cyber Security and the Law forum in Washington, D.C. in September 2015. The conference will focus on the changing dimensions of cyber threats and methods to mitigate liability exposure for cyber security breaches. The conference will provide a closed-door forum for a select group of senior European and American government officials, internationally-recognized security professionals, and business leaders to address questions concerning the management of cyber security risks, with a focus on identifying solutions to emerging threats.
In 2014, the French-American Foundation organized an inaugural forum on cyber security and the growing worldwide challenge of cyber crime.
Held under the patronage of INTERPOL and the French Minister of the Interior, this series of roundtable discussions brought together European and U.S. government officials, leaders of industry, and other internationally-recognized security professionals and experts for a targeted discussion on the subject. Featured speakers included:
AdmiralMichaelRogers, Commander, U.S. Cyber Command; Director, National Security Agency/Chief, Central Security Service
Jean-Paul Paloméros, NATO Supreme Allied Commander Transformation
Michael Daniel, Special Assistant to the President and Cyber Security Coordinator, National Security Council
Michael Mukasey, former U.S. Attorney General
Rob Wainwright, Director, EUROPOL.”
“The Duke and Duchess of Cambridge and the £1.3 trillion hedge fund women
In their elegant ballgowns, they could be among the guests at any charity reception hosted by the Duke and Duchess of Cambridge.
By David Harrison and Claire Duffin
8:00AM BST 23 Oct 2011
In fact, these are some of the most powerful and influential individuals to have gathered at St James’s Palace. All leading figures in finance, they help to control assets totalling £1.3 trillion.
Left-to-right in photograph:
2) Amanda Pullinger. 45: Chief executive of Pullinger Management in New York. Executive director of 100WHF. Studied modern history at Oxford University where she was a contemporary of David Cameron. Originally from Solihull, has lived in New York for 24 years. Fan of Downton Abbey.
3) Effie Datson, 41: Head of foreign exchange and global macro prime brokerage for Deutsche Bank, which has managed assets of £480 billion. Previously worked at IKOS and Goldman Sachs. London Board Chair of 100WHF. Has a degree in social sciences and MBA, both from Harvard. Lives with husband Edwin, a venture capitalist, in a £1 million flat in Battersea, southwest London. Competes in triathlons.
4) Claire Smith, 48: Research analyst and partner with Albourne Partners, independent global advisers whose 200 clients worldwide have an estimated £145 billion invested in hedge funds. Works from home in Geneva.
5) Kathryn Graham, 39: Director of BT Pension Scheme Management in London, BT’s pensions advisory arm, the largest scheme in the UK at £34 billion. Has an MA in economics and mathematics from Edinburgh University. Trustee of hedge fund standards board in London.
6) Roxanne Mosley Sargent, 43: Previously co-head of sales and marketing at Armajaro Asset Management, formerly head of hedge fund capital group for Europe at Deutsche Bank. MBA from Harvard. Married with young children, lives in Notting Hill, west London.
7) Kristen Eshak Weldon, 33: Managing director of Blackstone Group International Partners which has £99 billion of managed assets. 100WHF London board member. Previously worked at JP Morgan. Studied at Georgetown University, Washington DC. Originally from Houston, Texas and now living in London. Likes designer fashion labels including Diane von Furstenberg, Max Mara and Donna Karan.
8) Natasha Sai, 35, a managing director with the banking giant Goldman Sachs, America’s 5th largest bank by revenue, which has £515 billion of managed assets. Lives in Hammersmith, west London. Featured in a 2001 Sky One series called The Real Sex in the City, about the lives of single girls in New York.
9) Sonia Gardner, 49: Moroccan-born president and co-founder, Avenue Capital Group, a global investment firm with £12.5 billion of managed assets. Made a donation to Hillary Clinton’s New York Senate re-election campaign. Mrs Clinton’s daughter Chelsea joined Ms Gardner’s Avenue Capital Group in 2006. [Steering Trump Entertainment Resorts Inc. out of bankruptcy protection; allegedly with the proceeds of online assassination betting!!!]
10) Stephanie Breslow: partner and co-head of the investment management group at Schulte Roth & Zabel, a New York law firm with an office in London. Lives in New York with husband and two stepchildren. Graduate of Columbia University School of Law. Is on the advisory board of the Columbia Law School’s Gender and Sexuality Centre.
11) Mindy Posoff, 51: Founder, Traversent Capital Partners, a consultancy for hedge funds and asset managers. Also managing director of Golden Seeds, dedicated to investing in young companies founded or led by women. Former director of Credit Suisse. Likes Queen Latifah, the American rapper.
12) Carol Kim: managing director, the Blackstone Group, based in Hong Kong. Previously based in New York as a Vice President in the Absolute Return Strategies Group at Lehman Brothers. 100WHF co-founder and board director. Has a BA in Urban and Economic Studies from the University of Toronto.
13) Mimi Drake, 42: President of Permit Capital Advisors, an independent investment advisory firm based in Philadelphia. Previously in magazine publishing. Has an MBA in finance from the University of Pennsylvania. Formerly Mimi Keller, she married Thomas Drake, a doctor, in 1996.
14) Kristin Fox, 47: Former journalist, founder and principal of FoxInspires consultancy. Chicago-based. A former news director of HedgeWorld. Owns 110 pairs of shoes and admits to a penchant for the creations of Mephisto, Icon and Stuart Weitzman.”
April 12, 2010 10:20 p.m. ET
A group of bondholders aligned with real-estate magnate Donald Trump won a victory over financier Carl Icahn Monday in a bid to control three casinos in Atlantic City that bear Mr. Trump’s name.
The use of the name had turned into something of a spat between the two high-profile investors.
“Serco – Procurement and Supply Chain
We apply a consistent procurement process to the selection and use of suppliers. This ensures that we comply with laws and regulations and other requirements applicable to the locations where we operate. It also means that we get maximum value from our spend, whilst meeting customer requirements.
We work collaboratively to deliver sustainable value; maintain the integrity of our procurement process; and drive continuous improvements. To achieve this we apply a consistent procurement process in selecting and using suppliers, so that we:
– manage business and financial risk, derive maximum value from our spend , through appropriate procurement strategies and supplier selection criteria, such as low cost, technically acceptable or best overall value, whilst mitigating risks to business and customer objectives and meeting our customer service requirements
– work collaboratively across all Serco’s Divisions and with suppliers to maximise and deliver sustainable value to Serco, maintain the integrity of our procurement process and drive continuous improvements
– comply with laws and regulations and other requirements applicable to the locations in which we operate our business
– reflect our ethical standards and code of conduct throughout our supply chain and ensure that sourcing initiatives are fair and ethical to both Serco and the participating suppliers consider social and environmental and other factors important to our clients and the communities within which we operate in the supply chain
All procurement activity is governed by the Serco Group plc Delegated Approval Authorities. Each Division has a Divisional Procurement and Supply Chain Lead to support effective sourcing and negotiating strategies.
A Procurement and Supply Chain Executive Board oversees the implementation of Procurement and Supply Chain strategy.
Sustainable procurement is our commitment to achieve value for money on a whole life basis in a way that delivers tangible social, environmental and economic outcomes. We expect our suppliers to meet a set of sustainable procurement standards. These are considered when reviewing the overall suitability and performance of suppliers.
Our commitments and required standards are defined in our policy statement and supporting Group Standard.
A Supplier Code of Conduct is made available for suppliers to ensure that they know what is expected of them.”
RESTON, VIRGINIA – May 19, 2011 – Serco Inc., a provider of professional, technology, and management services to the federal government, has been recognized as Supplier of the Year by The Boeing Company in the Technology category for its state-of-the-practice Enterprise Architecture solutions.
The Boeing Supplier of the Year award is the company’s premier supplier honor, presented annually to its top suppliers in recognition of their commitment to excellence and customer satisfaction. This year’s 16 winners represent an elite group among more than 17,525 active Boeing suppliers in nearly 52 countries around the world. This selection was based on stringent performance criteria for quality, delivery performance, cost, environmental initiatives, customer service and technical expertise. This is the second time Serco has been recognized as Supplier of the Year by Boeing. In January 2011, Serco also received the Boeing Performance Excellence Gold Award in recognition of the Company’s performance excellence.
“We are extremely honored to receive this recognition for our work in support of Boeing. This prestigious award demonstrates our passion for excellence and ability to apply Serco’s Enterprise Architecture expertise across a broad range of applications,” said Ed Casey, Chairman and CEO of Serco. “We continue to grow our EA practice, and over the past 15 years we have deployed solutions to support enterprises and systems across federal and commercial environments.”
Serco’s Enterprise Architecture Center of Excellence is based in Colorado Springs, CO. The team provides a variety of services in support of Boeing’s business units as well as research and development efforts. Serco’s architecture employs object-oriented (OO)/Unified Modeling Language (UML) to define, design and satisfy defense agencies’ mission-critical requirements, including Command, Control, Communications, Computers and Intelligence (C4I). This approach improves system developer’s understanding of operational requirements and how best to integrate enterprise operations and systems for the optimal fulfillment of C4I and other operational needs.
About Serco Inc.: Serco Inc. is a leading provider of professional, technology, and management services focused on the federal government. We advise, design, integrate, and deliver solutions that transform how clients achieve their missions. Our customer-first approach, robust portfolio of services, and global experience enable us to respond with solutions that achieve outcomes with value. Headquartered in Reston, Virginia, Serco Inc. has approximately 11,000 employees, annual revenue of $1.5 billion, and is ranked in the Top 30 of the largest Federal Prime Contractors by Washington Technology. Serco Inc. is a wholly-owned subsidiary of Serco Group plc, a $6.6 billion international business that helps transform government and public services around the world. More information about Serco Inc. can be found at www.serco-na.com.”
President Barack Obama today announced that the head of the U.S. Small Business Administration, Karen Mills, will be the newest cabinet member.
He made the announcement that the SBA would become a cabinet-level agency in front of small-business owners at the White House. The head of the SBA was a cabinet-level position under the Clinton Administration.
The announcement was part of a larger proposal that would combine the SBA with five other government agencies that focus on business and trade.
Those organizations include the Commerce Department’s core business and trade functions; the Office of the U.S. Trade Representative; the Export-Import Bank; the Overseas Private Investment Corporation; and the Trade and Development Agency.
These agencies combined would, according to Obama, create a more efficient climate for business development and entrepreneurship. In addition, according to AP, the merger would save the federal government $3 billion over 10 years by eliminating duplicate costs and human resources.
Barry Sloane, CEO of the Small Business Authority, applauded the move. “I think it’s constructive for two reasons,” he told CNBC.com. “By doing this, Obama is making a statement that small business is important. And, he’s making good on his promise of reducing overlapping agencies, which will reduce government spending.”
The proposal to merge the agencies must be approved by Congress. If the merger is approved, the SBA would no longer be in the cabinet.
Sloane the SBA has been an engine for recovery from the recession. “Under the Obama Recovery Act, he increased loan size from the SBA from $2 million to $5 million, and increased the amount of government guarantee on those loans, which has been helpful to business owners. This proposal is another acknowledgment of the importance of small business.”
House Small Business Committee Chairman Sam Graves (R-MO) said in a statement today that “I look forward to examining the [proposed merger] further, and I hope the President will work very closely with Congress before finalizing any changes.”
While he was non-committal on whether he would vote to approve the changes, he said: “Decreasing the size of government and reducing bureaucracy is something that I support in principle, however, it is important that any effort to make significant changes to federal commerce and trade programs be done carefully, and in a way that protects America’s small businesses.”
“Serco’s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals.” http://www.dtic.mil/whs/directives/corres/pdf/100515p.pdf
“Base One Technologies – Corporate Strategy – We are a Government Certified Women-Owned Business
We practice Diversity Recruitment and Staffing for IT positions
Base One was founded in 1994 by a women engineer who had made a career in technology research for many years. Base One has been very successful in focusing on diversity recruiting and staffing for IT projects. It has been our experience that the greater the diversity mix, the more creative the solution. As in any field the more diverse the viewpoint the more thorough your analysis. Our engineers can think out of the box.
Because of our affiliations we have access to pools of resources among more diverse groups & individuals. We work with a large pool of minority professionals who specialize in IT skills. We are able to have access to these resources through our status as a D/MWBD firm and our affiliations. These affiliations assist us in working with resources among more diverse groups & individuals.
We are also partnered with firms that are 8A certified as Minority firms, Disabled Veteran firms, Native American firms, Vietnam veteran firms, women owned firms.
Our hub zone location keeps us close to the professional organizations of great diversity. We are active in recruiting from and networking with these community organizations of local IT professionals. This has given us access to a large pool of diversity talent.
Base One’s staff of engineers are a diverse group of professionals. This diverse network of engineers helps us to branch out to other engineers and creates an even larger network of resources for us to work with.
The greater the diversity the more complete & thorough the analysis. The broader the spectrum of points of view the broader the scope of the analysis. We feel that a diverse team gives us a greater advantage in creating cutting edge solutions. To that end we will continue to nurture these relationships to further extend our talent pool.
The greater the diversity mix, the more creative the solution.
The more diverse the viewpoint, the more thorough the analysis.
The more diverse our team, the more our engineers can think out of the box.
This is why Base One Technologies concentrates on diversity recruitment in the belief that a diverse team gives us a greater advantage in creating cutting edge solutions.”
Information Security Planning is the process whereby an organization seeks to protect its operations and assets from data theft or computer hackers that seek to obtain unauthorized information or sabotage business operations.
Key Clients Benefiting From Our Information Security Expertise: Pentagon Renovation Program, FAA, Citigroup, MCI.
Base One technologies
Expertly researches, designs, and develops information security policies that protect your data and manage your firm’s information technology risk at levels acceptable to your business.
Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report.
Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions.”
“The 8(a) Business Development Program assists in the development of small businesses owned and operated by individuals who are socially and economically disadvantaged, such as women and minorities. The following ethnic groups are classified as eligible: Black Americans; Hispanic Americans; Native Americans (American Indians, Eskimos, Aleuts, or Native Hawaiians); Asian Pacific Americans (persons with origins from Burma, Thailand, Malaysia, Indonesia, Singapore, Brunei, Japan, China (including Hong Kong), Taiwan, Laos, Cambodia (Kampuchea), Vietnam, Korea, The Philippines, U.S. Trust Territory of the Pacific Islands (Republic of Palau), Republic of the Marshall Islands, Federated States of Micronesia, the Commonwealth of the Northern Mariana Islands, Guam, Samoa, Macao, Fiji, Tonga, Kiribati, Tuvalu, or Nauru); Subcontinent Asian Americans (persons with origins from India, Pakistan, Bangladesh, Sri Lanka, Bhutan, the Maldives Islands or Nepal). In 2011, the SBA, along with the FBI and the IRS, uncovered a massive scheme to defraud this program. Civilian employees of the U.S. Army Corps of Engineers, working in concert with an employee of Alaska Native Corporation Eyak Technology LLC allegedly submitted fraudulent bills to the program, totaling over 20 million dollars, and kept the money for their own use. It also alleged that the group planned to steer a further 780 million dollars towards their favored contractor.”
“On October 6, 2000, the NMCI contract was awarded to Electronic Data Systems (EDS), now HP Enterprise Services (HP). Secretary of the Navy Gordon England summed up the Navy’s IT Environment prior to the commencement of NMCI: “We basically had 28 separate commands budgeting, developing, licensing, and operating IT autonomously. It was inefficient and from the larger Department perspective, produced results that were far from optimal.”
NMCI consolidated roughly 6,000 networks—some of which could not e-mail, let alone collaborate with each other—into a single integrated and secure IT environment. HP updated more than 100,000 desktop and laptop PCs in 2007. The program also consolidated an ad hoc network of more than 8,000 applications to 500 in four years and 15,003 logistics and readiness systems to 2,759 over a two-year period.
Sub-contractors to HP include:
Harris Corporation (which acquired Multimax formerly known as Netco Government Services and WAM!NET), which provided enterprise network infrastructure design and support until its contract expired in 2014.
Verizon, which provides wide area network (WAN) connectivity.
HP also provides the security services once provided by Raytheon.
“HP also has worked with more than 400 small businesses, with 5 percent for small disadvantaged businesses, 5 percent for women-owned small businesses and 1.5 percent for HUBZone small businesses. Since its inception, NMCI has exceeded the minimum 40% small business objective set for the contract.
The Department of the Navy has shown no desire to scale back or cancel the program. On 24 March 2006 the Navy exercised its three-year, $3 billion option to extend the contract through September 2010.
In April 2006, users began to log on with Common Access Cards (CACs), a smartcard-based logon system called the Cryptographic Log On (CLO). In October 2008, NMCI’s prime contractor HP posted a set of procedures so Apple Mac users can access NMCI’s public-facing Web services, such as the e-mail and calendar functions, using their CAC readers with their Macs. The workaround also works with other Defense Department CAC-enabled networks. Alternatively, NMCI and all other CAC-authenicated DoD websites may be accessed using LPS-Public.”
“Government still paying G4S and Serco millions for tagging despite ban Alan Travis Home affairs editor
Thursday 25 June 2015 00.01 BST
The Ministry of Justice is still paying security firms G4S and Serco millions of pounds every month for supplying electronic tagging equipment, more than a year after both companies were barred from running the contract.
Both companies faced criminal investigations by the Serious Fraud Office over allegations of overcharging that led to them repaying nearly £180m.
The continuing monthly payments to the two companies were uncovered by an analysis of Ministry of Justice (MoJ) data by the Centre for Crime and Justice Studies which shows that G4S was paid a total of £8.7m between March 2014 – when it lost the tagging contract – and February 2015. Serco was paid £4.5m over the same period.
The electronic monitoring tags are used to enforce curfews on more than 100,000 offenders each year. The outsourcing giant Capita took over the contract on an interim basis in April last year.
In July 2014, Capita and three other companies were named as the winners of a £265m six-year contract to supply the next generation of satellite tracking tags, which would allow dangerous and repeat offenders to be monitored around the clock.”