#2427: Serco 8(a) Clinton Intranet – Marine Corps Onion Router Cole – MH Spot Fixed Boeing 777s
1. In 1994, Serco configured selected 8(a) protégé companies into an Intranet and embedded them into mentored defense contractors so that they could allegedly support Serco remote-assassination-betting services to the various women in hedge funds who have participated over the last 25 years in Hillary Clinton’s pay-to-play frauds.
2. In October 2000, Serco allegedly configured the 8(a) Intranet with a Marine Corps onion router (Tor) clock, synchronised the bombing ambush of the USS Cole in Aden Harbour, and, gave Clinton’s hedge-fund women a lucrative long/short position on Litton Industries (bought by Northrop Grumman in 2001) which owned the Ingalls Yard where the Cole was repaired.
3. Serco allegedly used the Marine Corps clock to spot fix the time of deaths of everyone on the Boeing 777s of MH Flights 17 and 37 which crashed or disappeared in 2014 and supply those times to the Clinton hedge-fund women to identify which 8(a) companies should scoop the pot.
McConnell will expose the criminal M.O. of actors engaged in remote assassination betting – allegedly resulting in the wrongful deaths of the victims of the Serco 8(a) attacks on the USS Cole and the Malaysian Airlines Boeing 777s – in his e-book “Shaking Hands With the Devil’s Clocks“.
“The Countless Crimes of Hillary Clinton: Special Prosecutor Needed Now Hillary finally hands over her server—after it’s been professionally wiped clean
By Sidney Powell | 08/13/15 4:17pm
After years of holding herself above the law, telling lie after lie, and months of flat-out obstruction, HIllary Clinton has finally produced to the FBI her server and three thumb drives. Apparently, the server has been professionally wiped clean of any useable information, and the thumb drives contain only what she selectively culled. Myriad criminal offenses apply to this conduct.
Anyone with knowledge of government workings has known from inception that Hillary’s communications necessarily would contain classified and national security related information.
Thanks to the Inspector General for the Intelligence Community, it is now beyond dispute that she had ultra-Top Secret information and more that should never have left the State Department.
Equal to Ms. Clinton’s outrageous misconduct is that of the entire federal law enforcement community. It has long chosen to be deliberately blind to these flagrant infractions of laws designed to protect national security—laws for which other people, even reporters, have endured atrocious investigations, prosecutions, and some served years in prison for comparatively minor infractions. During the same years that Hillary was communicating about national security and world affairs off the grid, the Department of Justice has had no qualms threatening news reporters and prosecuting whistleblowers under the Espionage Act. ..
As Lt. Col. Ralph Peters had the guts to say last night on FoxNews, “Hillary Clinton is a criminal.” Military heroes who have risked their lives for this country have gone to prison for less. The Department of Justice’s selective prosecutions have been well-document. Its favoritism and targeting practices must end. As discussed on NewsMaxTV’s Hardline last night, it’s time for a national outcry for the appointment of a special prosecutor to investigate and indict Ms. Clinton’s flagrant violations of some of our most important laws. Anyone else would have been arrested by now. Until there is a massive change in this country, justice is a game.”
Malaysia Airlines Flight 17 (MH17/MAS17)[a] was a scheduled international passenger flight from Amsterdam to Kuala Lumpur that crashed on 17 July 2014 after being shot down, killing all 283 passengers and 15 crew on board. The Boeing 777-200ERairliner lost contact about 50 km (31 mi) from the Ukraine–Russia border and crashed near Torez in Donetsk Oblast, Ukraine, 40 km (25 mi) from the border. … Around 90 minutes after the incident, Ukraine closed all routes in Eastern Ukrainian airspace, at all altitudes. The incident dramatically heightened fears about airliner shootdowns, leading to a number of airlines announcing they would avoid overflying conflict zones.
It was suggested that credit and debit cards may have been looted from the bodies of the victims, and the Dutch Banking Association said it would take “preventative measures” against any possible fraud. There were also accusations that other possessions had been removed and that evidence at the crash site had been destroyed. Dutch prime minister Mark Rutte acknowledged on 6 August that early reports of chaos and criminality around the site may have been exaggerated. One eye-witness observed that valuable items like shoes and bottles of alcohol were untouched in the wreckage, while a video published by News Corp Australia in July 2015 recorded at the scene shortly after the crash shows militants described as “Russian-backed rebels” arriving and ransacking the wreckage.
Shortly after the crash, it was announced that Malaysia Airlines would retire flight number MH17 and change the Amsterdam–Kuala Lumpur route to flight number MH19 beginning on 25 July 2014. On 18 July 2014, shares in Malaysia Airlines dropped by nearly 16%.
On 23 July 2014, two Ukrainian military jets were hit by missiles at the altitude of 17,000 feet (5,200 m) close to the area of the MH17 crash. According to the Ukrainian Security Council, preliminary information indicated that the missiles came from Russia.”
USS Cole Arrives Home
P A S C A G O U L A, Miss., Dec. 13
By Paul Payne
The USS Cole, the missile destroyer damaged by a terrorist bomb that killed 17 sailors in Yemen, completed its journey across the Atlantic today.
A Norwegian-owned heavy-lift ship, the Blue Marlin, transported the vessel to Litton Ingalls Shipbuilding in Pascagoula, Miss., where it will be repaired.
Den Knecht, vice president of industrial relations for Ingalls, said it will take about a year to complete the repairs and cost roughly $240 million.
“We won’t start on the repairs until after we get back from the holidays Jan. 8,” Knecht said after it was announced the Cole would return to Ingalls where it was christened in Feb. 1995.
A small boat maneuvered close to the Cole on Oct. 12 while it was refueling in Aden’s harbor and detonated a bomb that blew a hole in the Cole’s hull 40 feet wide and 40 feet high.
Yemen’s prime minister said at least three Yemenis suspected of belonging to an international terrorist network will go on trial next month for the deadly attack.
Investigation Makes Headway
Prime Minister Abdul-Karim al-Iryani said as many as six people — all Yemenis — could be tried on charges of laying the groundwork for the attack.
Yemeni and American law enforcement authorities are still investigating the attack, for which no credible claim of responsibility has been made.
The investigation has also determined the crew of the Cole did not implement all of the self-protection measures the ship’s skipper had drawn up before it was bombed, a senior defense official said.
The Arleigh Burke-class Aegis guided missile destroyer is armed with nine weapons systems, including anti-air, anti-submarine and anti-surface warfare, ship self-defense and strike warfare.
The Navy said it selected the Pascagoula facility because the 505-foot Cole requires extensive repairs and its workers are experienced in building Aegis-class destroyers. Bath Iron Works of Maine, which also builds destroyers, will assist.”
“Litton Industries acquired Ingalls in 1961, and in 1968 expanded its facilities to the other side of the river. Ingalls reached a high point of employment in 1977, with 27,280 workers. In April 2001, Litton was acquired by Northrop Grumman Corporation.
“Named after inventor Charles Litton, Sr., Litton Industries was a large defense contractor in the United States, bought by the Northrop Grumman Corporation in 2001. Litton started in 1953 as an electronics company building navigation, communications and electronic warfare equipment. They diversified and became a much bigger business, with major shipyards, etc., and even manufacturing microwave ovens.
In the early 1990s, Litton Industries split into separate military and commercial companies. The US$2 billion commercial business, which included Litton’s oilfield services, business and automated assembly line operations, was named Western Atlas, Inc.
The early “li” was designed by Robert Miles Runyan, but was modified in 1986 by designer Gregory Thomas after a worldwide comprehensive study and analysis of the corporate identity. For much of the early 1980s and 90s, “li SWEDA” and “li COLE” were commonly found on product goods but it was modified to bring emphasis to the parent company, whose name was little known.”
“Serco farewell to NPL after 19 years of innovation 8 January 2015 .. During that period under Serco’s management and leadership.. .. NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency [a.k.a. White’s Club Death-Bet] trading in the City through NPLTime.”
“Behind the Sordid World of Online Assassination Betting
I have heard rumors about this website, but I still cannot quite believe that it exists. I am looking at what I think is a hit list.
There are photographs of people I recognize—prominent politicians, mostly—and, next to each, an amount of money. The site’s creator, who uses the pseudonym Kuwabatake Sanjuro, thinks that if you could pay to have someone murdered with no chance—I mean absolutely zero chance—of being caught, you would.
That’s one of the reasons why he has created the Assassination Market.
There are four simple instructions listed on its front page:
Add a name to the list
Add money to the pot in the person’s name
Predict when that person will die
Correct predictions get the pot
The Assassination Market can’t be found with a
Google search. It sits on a hidden, encrypted part of the internet that, until recently, could only be accessed with a browser called The Onion Router, or Tor. Tor began life as a U.S. Naval Research Laboratory project, but today exists as a not-for-profit organization, partly funded by the U.S. government and various civil liberties groups [100 Women in Hedge Funds], allowing millions of people around the world to browse the internet anonymously and securely.
To put it simply, Tor works by repeatedly encrypting computer activity and routing it via several network nodes, or “onion routers,” in so doing concealing the origin, destination, and content of the activity. Users of Tor are untraceable, as are the websites, forums, and blogs that exist as Tor Hidden Services, which use the same traffic encryption system to cloak their location.
The Assassination Market may be hosted on an unfamiliar part of the net, but it’s easy enough to find, if you know how to look. All that’s required is simple (and free) Tor software. Then sign up, follow the instructions, and wait. It is impossible to know the number of people who are doing exactly that, but at the time of writing, if I correctly predict the date of the death of Ben Bernanke, the former chairman of the Federal Reserve, I’d receive approximately $56,000. It may seem like a fairly pointless bet. It’s very difficult to guess when someone is going to die. That’s why the Assassination Market has a fifth instruction:
Making your prediction come true is entirely optional”
“Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. In operation since before 1985, NTP is one of the oldest Internet protocols in current use. NTP was originally designed by David L. Mills of the University of Delaware, who still oversees its development. … While no one doubts the contribution of NTP to network performance, several security concerns have arisen in late 2014. Previously, researchers became aware that NTP servers can be susceptible to man-in-the-middle attacks unless packets are cryptographically signed for authentication. The computational overhead involved can make this impractical on busy servers, particularly during denial of service attacks. NTP message spoofing can be used to move clocks on client computers and allow a number of attacks based on bypassing of cryptographic key expiration.“
“The Duke and Duchess of Cambridge and the £1.3 trillion hedge fund women
In their elegant ballgowns, they could be among the guests at any charity reception hosted by the Duke and Duchess of Cambridge.
By David Harrison and Claire Duffin
8:00AM BST 23 Oct 2011
In fact, these are some of the most powerful and influential individuals to have gathered at St James’s Palace. All leading figures in finance, they help to control assets totalling £1.3 trillion.
Left-to-right in photograph:
2) Amanda Pullinger. 45: Chief executive of Pullinger Management in New York. Executive director of 100WHF. Studied modern history at Oxford University where she was a contemporary of David Cameron. Originally from Solihull, has lived in New York for 24 years. Fan of Downton Abbey.
3) Effie Datson, 41: Head of foreign exchange and global macro prime brokerage for Deutsche Bank, which has managed assets of £480 billion. Previously worked at IKOS and Goldman Sachs. London Board Chair of 100WHF. Has a degree in social sciences and MBA, both from Harvard. Lives with husband Edwin, a venture capitalist, in a £1 million flat in Battersea, southwest London. Competes in triathlons.
4) Claire Smith, 48: Research analyst and partner with Albourne Partners, independent global advisers whose 200 clients worldwide have an estimated £145 billion invested in hedge funds. Works from home in Geneva.
5) Kathryn Graham, 39: Director of BT Pension Scheme Management in London, BT’s pensions advisory arm, the largest scheme in the UK at £34 billion. Has an MA in economics and mathematics from Edinburgh University. Trustee of hedge fund standards board in London.
6) Roxanne Mosley Sargent, 43: Previously co-head of sales and marketing at Armajaro Asset Management, formerly head of hedge fund capital group for Europe at Deutsche Bank. MBA from Harvard. Married with young children, lives in Notting Hill, west London.
7) Kristen Eshak Weldon, 33: Managing director of Blackstone Group International Partners which has £99 billion of managed assets. 100WHF London board member. Previously worked at JP Morgan. Studied at Georgetown University, Washington DC. Originally from Houston, Texas and now living in London. Likes designer fashion labels including Diane von Furstenberg, Max Mara and Donna Karan.
8) Natasha Sai, 35, a managing director with the banking giant Goldman Sachs, America’s 5th largest bank by revenue, which has £515 billion of managed assets. Lives in Hammersmith, west London. Featured in a 2001 Sky One series called The Real Sex in the City, about the lives of single girls in New York.
9) Sonia Gardner, 49: Moroccan-born president and co-founder, Avenue Capital Group, a global investment firm with £12.5 billion of managed assets. Made a donation to Hillary Clinton’s New York Senate re-election campaign. Mrs Clinton’s daughter Chelsea joined Ms Gardner’s Avenue Capital Group in 2006. [Steering Trump Entertainment Resorts Inc. out of bankruptcy protection; allegedly with the proceeds of online assassination betting!!!]
10) Stephanie Breslow: partner and co-head of the investment management group at Schulte Roth & Zabel, a New York law firm with an office in London. Lives in New York with husband and two stepchildren. Graduate of Columbia University School of Law. Is on the advisory board of the Columbia Law School’s Gender and Sexuality Centre.
11) Mindy Posoff, 51: Founder, Traversent Capital Partners, a consultancy for hedge funds and asset managers. Also managing director of Golden Seeds, dedicated to investing in young companies founded or led by women. Former director of Credit Suisse. Likes Queen Latifah, the American rapper.
12) Carol Kim: managing director, the Blackstone Group, based in Hong Kong. Previously based in New York as a Vice President in the Absolute Return Strategies Group at Lehman Brothers. 100WHF co-founder and board director. Has a BA in Urban and Economic Studies from the University of Toronto.
13) Mimi Drake, 42: President of Permit Capital Advisors, an independent investment advisory firm based in Philadelphia. Previously in magazine publishing. Has an MBA in finance from the University of Pennsylvania. Formerly Mimi Keller, she married Thomas Drake, a doctor, in 1996.
14) Kristin Fox, 47: Former journalist, founder and principal of FoxInspires consultancy. Chicago-based. A former news director of HedgeWorld. Owns 110 pairs of shoes and admits to a penchant for the creations of Mephisto, Icon and Stuart Weitzman.”
“Serco – Procurement and Supply Chain
We apply a consistent procurement process to the selection and use of suppliers. This ensures that we comply with laws and regulations and other requirements applicable to the locations where we operate. It also means that we get maximum value from our spend, whilst meeting customer requirements.
We work collaboratively to deliver sustainable value; maintain the integrity of our procurement process; and drive continuous improvements. To achieve this we apply a consistent procurement process in selecting and using suppliers, so that we:
– manage business and financial risk, derive maximum value from our spend , through appropriate procurement strategies and supplier selection criteria, such as low cost, technically acceptable or best overall value, whilst mitigating risks to business and customer objectives and meeting our customer service requirements
– work collaboratively across all Serco’s Divisions and with suppliers to maximise and deliver sustainable value to Serco, maintain the integrity of our procurement process and drive continuous improvements
– comply with laws and regulations and other requirements applicable to the locations in which we operate our business
– reflect our ethical standards and code of conduct throughout our supply chain and ensure that sourcing initiatives are fair and ethical to both Serco and the participating suppliers consider social and environmental and other factors important to our clients and the communities within which we operate in the supply chain
All procurement activity is governed by the Serco Group plc Delegated Approval Authorities. Each Division has a Divisional Procurement and Supply Chain Lead to support effective sourcing and negotiating strategies.
A Procurement and Supply Chain Executive Board oversees the implementation of Procurement and Supply Chain strategy.
Sustainable procurement is our commitment to achieve value for money on a whole life basis in a way that delivers tangible social, environmental and economic outcomes. We expect our suppliers to meet a set of sustainable procurement standards. These are considered when reviewing the overall suitability and performance of suppliers.
Our commitments and required standards are defined in our policy statement and supporting Group Standard.
A Supplier Code of Conduct is made available for suppliers to ensure that they know what is expected of them.”
We practice Diversity Recruitment and Staffing for IT positions
Base One was founded in 1994 by a women engineer who had made a career in technology research for many years. Base One has been very successful in focusing on diversity recruiting and staffing for IT projects. It has been our experience that the greater the diversity mix, the more creative the solution. As in any field the more diverse the viewpoint the more thorough your analysis. Our engineers can think out of the box.
Because of our affiliations we have access to pools of resources among more diverse groups & individuals. We work with a large pool of minority professionals who specialize in IT skills. We are able to have access to these resources through our status as a D/MWBD firm and our affiliations. These affiliations assist us in working with resources among more diverse groups & individuals.
We are also partnered with firms that are 8A certified as Minority firms, Disabled Veteran firms, Native American firms, Vietnam veteran firms, women owned firms.
Our hub zone location keeps us close to the professional organizations of great diversity. We are active in recruiting from and networking with these community organizations of local IT professionals. This has given us access to a large pool of diversity talent.
Base One’s staff of engineers are a diverse group of professionals. This diverse network of engineers helps us to branch out to other engineers and creates an even larger network of resources for us to work with.
The greater the diversity the more complete & thorough the analysis. The broader the spectrum of points of view the broader the scope of the analysis. We feel that a diverse team gives us a greater advantage in creating cutting edge solutions. To that end we will continue to nurture these relationships to further extend our talent pool.
The greater the diversity mix, the more creative the solution.
The more diverse the viewpoint, the more thorough the analysis.
The more diverse our team, the more our engineers can think out of the box.
This is why Base One Technologies concentrates on diversity recruitment in the belief that a diverse team gives us a greater advantage in creating cutting edge solutions.”
Information Security Planning is the process whereby an organization seeks to protect its operations and assets from data theft or computer hackers that seek to obtain unauthorized information or sabotage business operations.
Key Clients Benefiting From Our Information Security Expertise: Pentagon Renovation Program, FAA, Citigroup, MCI.
Base One technologies
Expertly researches, designs, and develops information security policies that protect your data and manage your firm’s information technology risk at levels acceptable to your business.
Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report.
Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions.”
“The 8(a) Business Development Program assists in the development of small businesses owned and operated by individuals who are socially and economically disadvantaged, such as women and minorities. The following ethnic groups are classified as eligible: Black Americans; Hispanic Americans; Native Americans (American Indians, Eskimos, Aleuts, or Native Hawaiians); Asian Pacific Americans (persons with origins from Burma, Thailand, Malaysia, Indonesia, Singapore, Brunei, Japan, China (including Hong Kong), Taiwan, Laos, Cambodia (Kampuchea), Vietnam, Korea, The Philippines, U.S. Trust Territory of the Pacific Islands (Republic of Palau), Republic of the Marshall Islands, Federated States of Micronesia, the Commonwealth of the Northern Mariana Islands, Guam, Samoa, Macao, Fiji, Tonga, Kiribati, Tuvalu, or Nauru); Subcontinent Asian Americans (persons with origins from India, Pakistan, Bangladesh, Sri Lanka, Bhutan, the Maldives Islands or Nepal). In 2011, the SBA, along with the FBI and the IRS, uncovered a massive scheme to defraud this program. Civilian employees of the U.S. Army Corps of Engineers, working in concert with an employee of Alaska Native Corporation Eyak Technology LLC allegedly submitted fraudulent bills to the program, totaling over 20 million dollars, and kept the money for their own use. It also alleged that the group planned to steer a further 780 million dollars towards their favored contractor.”
“On October 6, 2000, the NMCI contract was awarded to Electronic Data Systems (EDS), now HP Enterprise Services (HP). Secretary of the Navy Gordon England summed up the Navy’s IT Environment prior to the commencement of NMCI: “We basically had 28 separate commands budgeting, developing, licensing, and operating IT autonomously. It was inefficient and from the larger Department perspective, produced results that were far from optimal.”
NMCI consolidated roughly 6,000 networks—some of which could not e-mail, let alone collaborate with each other—into a single integrated and secure IT environment. HP updated more than 100,000 desktop and laptop PCs in 2007. The program also consolidated an ad hoc network of more than 8,000 applications to 500 in four years and 15,003 logistics and readiness systems to 2,759 over a two-year period.
Sub-contractors to HP include:
Harris Corporation (which acquired Multimax formerly known as Netco Government Services and WAM!NET), which provided enterprise network infrastructure design and support until its contract expired in 2014.
Verizon, which provides wide area network (WAN) connectivity.
HP also provides the security services once provided by Raytheon.
“HP also has worked with more than 400 small businesses, with 5 percent for small disadvantaged businesses, 5 percent for women-owned small businesses and 1.5 percent for HUBZone small businesses. Since its inception, NMCI has exceeded the minimum 40% small business objective set for the contract.
The Department of the Navy has shown no desire to scale back or cancel the program. On 24 March 2006 the Navy exercised its three-year, $3 billion option to extend the contract through September 2010.
In April 2006, users began to log on with Common Access Cards (CACs), a smartcard-based logon system called the Cryptographic Log On (CLO). In October 2008, NMCI’s prime contractor HP posted a set of procedures so Apple Mac users can access NMCI’s public-facing Web services, such as the e-mail and calendar functions, using their CAC readers with their Macs. The workaround also works with other Defense Department CAC-enabled networks. Alternatively, NMCI and all other CAC-authenicated DoD websites may be accessed using LPS-Public.”
“Government still paying G4S and Serco millions for tagging despite ban Alan Travis Home affairs editor
Thursday 25 June 2015 00.01 BST
The Ministry of Justice is still paying security firms G4S and Serco millions of pounds every month for supplying electronic tagging equipment, more than a year after both companies were barred from running the contract.
Both companies faced criminal investigations by the Serious Fraud Office over allegations of overcharging that led to them repaying nearly £180m.
The continuing monthly payments to the two companies were uncovered by an analysis of Ministry of Justice (MoJ) data by the Centre for Crime and Justice Studies which shows that G4S was paid a total of £8.7m between March 2014 – when it lost the tagging contract – and February 2015. Serco was paid £4.5m over the same period.
The electronic monitoring tags are used to enforce curfews on more than 100,000 offenders each year. The outsourcing giant Capita took over the contract on an interim basis in April last year.
In July 2014, Capita and three other companies were named as the winners of a £265m six-year contract to supply the next generation of satellite tracking tags, which would allow dangerous and repeat offenders to be monitored around the clock.”