#2428: Cameron-Clinton Rendition Visas – Serco’s 8(a) Body Woman Clock – Benghazi Torture Navy Tor
1. Apparently using a bogus Star Chamber authority, the associates and members of the Cameron and Clinton families are allegedly providing rendition visas to the passengers of “Con Air”, the U.S. Justice Prisoner and Alien Transportation System, launched in 1994 by Field McConnell’s sister and founder of the Senior Executive Service, Kristine Marcy.
2. In 1994, the U.K. and U.S. governments outsourced the operation of USNO and NPL clocks to Serco’s 8(a) protégé companies which allegedly provided timing signals for use in remote-assassination betting by “body women” such as Humaa Abedin and various hedge-fund clients.
3. On 9/11/2012, Serco’s 8(a) body women and their clients allegedly used the U.S. Navy onion router (Tor) to track the late U.S. Ambassador to Libya Christopher Stevens into the U.S. mission in Benghazi and then his rendition to a place of torture where bets were placed on his predicted time of death.
McConnell will expose the principal actors and their criminal – but nearly-perfectly synchronized – M.O. which allegedly resulted in the wrongful death of Christopher Stevens in his e-book “Shaking Hands With the Devil’s Clocks“.
“Written by a cousin of Ambassador Stevens, a US Navy Chaplain, Senior Pastor Ret’d
Here is my story. A week out the Embassy in Tripoli began receiving multiple tips about an Al Queda cell in the area planning an attack on 9/11 in response to the killing of Bin Laden. For the next several days, the state dept and WH were asked for a security force and were denied at least six times. Ambassador Stevens and his team were given the all clear that the Consulate in Benghazi was safe and there was no need for a security force other than his 3 personal guards (one being my cousin) and a few Libyans who were not armed. Then the attack and murders occurred.
Immediately the WH claimed it was a protest gone bad over a you tube video. Obama made a quick speech in the Rose Garden on Sept.12 before catching a plane to Vegas to campaign. He made a generic statement at the end of his speech after placing the blame on an overheated protest over the video. He said “No act of terror will shake the resolve of America. Later that day and over the next 2 days, the liberal media began saying Ambassador Stevens and the other 3 men died of smoke inhalation. This was not the case.
Out of respect for my cousin, I’m not going to be specific about his murder. However Ambassador Stevens was brutally murdered. His genitals were cut off, he was sodomized and beaten and cut and stabbed and burned. He was drug thru the streets and left for dead. This is eyewitness testimony of a local Dr. who found the Ambassador in a ditch and tried to save his life. He had no idea who he was. The other 3 men, including my cousin, met similar fates. And deaths due to smoke inhalation is a 100% fabricated LIE. The next week I drove my aunt and Uncle and 2 others to DC to receive his body. We met with Hillary, Panetta, and Susan Rice. ALL of whom apologized and said it was a protest gone bad over a video and exited the area. Next, Obama entered with the same story and didn’t apologize and wasn’t sympathetic. My aunt cried to this man and all he did was hand her flowers and walk away. I tried to get his attention, but didn’t. I got upset and yelled liar to him, he kept walking. Then a secret service agent grabbed my arm and led me to a room where I was held till the proceedings were over.
America, I saw firsthand how cold this man is. What kind of liar he is. Most of you haven’t a clue about this tyrant and yet you support him. And act like every word he says is Gospel. These murders and the fast and furious cover ups make Watergate look like a kid who told his bff’s secret to the class.
Dr. Charles R. Roots Senior Pastor
Former Staff Sergeant, USMC Captain,
U. S. Navy Chaplain Corps (Ret.)
Read more at http://www.snopes.com/politics/military/stevens.asp#hVzCidHFOOi0vSAT.99”
“Huma Mahmood Abedin (born July 28, 1976) is an American political staffer. She has been a long-time aide to Hillary Clinton, and was U.S. Secretary of State Clinton’s Deputy Chief of Staff at the State Department, and before that, traveling chief of staff and “body woman” during Clinton’s campaign for the Democratic nomination in the 2008 presidential election. She currently serves as vice chairwoman of Clinton’s 2016 campaign for President. She is married to former Democratic Congressman and2013 New York City mayoral candidate, Anthony Weiner.”
HILLARY TIPPED MURDERED AMBASSADOR’S MOVEMENTS IN EMAILS
Secretary of state was using her unsecured private server
Published: 05/28/2015 at 7:38 PM
In the year prior to the deadly 2012 Benghazi attack, Hillary Clinton used her private email server to correspond about such highly sensitive national security matters as specific threats to the Libya hotel where Ambassador Chris Stevens was staying as well as his decision to remain at the hotel despite the threats.
Read more at http://www.wnd.com/2015/05/hillary-tipped-murdered-ambassadors-movements-in-emails/#EUvukudJZq0eLFMR.99
The emails, released May 22 by the State Department, also contained the exact movements of Stevens while he was stationed in arguably one of the most dangerous zones in the world for any American diplomat, a WND review has found.
On April 24, 2011, Clinton’s senior aide, Huma Abedin, forwarded to Clinton’s personal email an internal State email from that same day written by Timmy Davis and sent to Abedin as well as to the State email addresses of other employees, including Clinton’s then-foreign policy aide, Jacob Sullivan.
The email cited a local report stating hotels in Benghazi were being targeted.
The email, which ran through Clinton’s personal server, stated the interim Libyan government “conducted a raid on a house/storage facility and found and arrested an Egyptian cell reportedly there for the purpose of attacking hotels.”
Despite the threat, the email revealed Stevens “still feels comfortable in the hotel,” meaning the email exposed that the ambassador would continue to stay there.
Find out what really happened, in Aaron Klein’s “The REAL Benghazi Story.”
“They are looking into the idea of moving into a villa, but that is some way off,” the email continued. “Based on discussion with DS yesterday, the hotel remains the safest location.”
Startlingly, the email contained information about Stevens’ exact movements, including that he “will be meeting with MFA in one hour and will make a written request for better security at the hotel and for better security-related coordination.”
On June 10, 2011, Sullivan sent an email to Clinton’s personal address informing that “there is credible threat info against the hotel that our team is using – and the rest of the Intl community is using, for that matter.”
That email divulged: “DS going to evacuate our people to alt locations. Info suggested attack in next 24-48 hours. Will keep you posted.”
Yet another sent to Clinton from Abedin detailed Stevens’ movements regarding his hotel stay
“The envoy’s delegation is currently doing a phased checkout (paying the hotel bills, moving some comms to the boat, etc.),” wrote Abedin. “He (Stevens) will monitor the situation to see if it deteriorates further, but no decision has been made on departure. He will wait 2-3 more hours, then revisit the decision on departure.”
The Star Chamber (Latin: Camera stellata) was an English court of law who sat at the royal Palace of Westminster, from the late 15th century to the mid-17th century (ca. 1641), and was composed of Privy Councillors and common-law judges, to supplement the judicial activities of the common-law and equity courts in civil and criminal matters. The Star Chamber was established to ensure the fair enforcement of laws against socially and politically prominent people so powerful that ordinary courts would likely hesitate to convict them of their crimes.
Court sessions were held in public, although witnesses and defendants were examined in secret. Defendants were given prior notice of the charges against them, and had the right to be represented by an attorney. Evidence was presented in writing. Over time, the Star Chamber evolved into a political weapon, a symbol of the misuse and abuse of power by the English monarchy and its courts.
In modern usage, legal or administrative bodies with strict, arbitrary rulings and secretive proceedings are sometimes called, metaphorically or poetically, star chambers. This is a pejorative term and intended to cast doubt on the legitimacy of the proceedings. ‘Star Chamber’ can also be used in its original meaning, for instance when a politician uses parliamentary privilege to attack a powerful organisation or person.The inherent lack of objectivity of politically-motivated charges has led to substantial reforms in English law in most jurisdictions since the 17th century.”
“Hillary Clinton emails included very secret satellite images
POSTED AT 2:01 PM ON AUGUST 13, 2015
BY TAYLOR MILLARD
Hillary Clinton’s possibly unsecure, possibly secure, private server included emails featuring satellite images and other highly secretive information from the intelligence community. John R. Schindler at The Daily Beast has a rundown of what Inspector General I. Charles McCullough III found:
Most seriously, the Inspector General assessed that Clinton’s emails included information that was highly classified—yet mislabeled as unclassified. Worse, the information in question should have been classified up to the level of “TOP SECRET//SI//TK//NOFORN,” according to the Inspector General’s report…In short: Information at the “TOP SECRET//SI//TK//NOFORN” level is considered exceptionally highly classified and must be handled with great care under penalty of serious consequences for mishandling. Every person who is cleared and “read on” for access to such information signs reams of paperwork and receives detailed training about how it is to be handled, no exceptions—and what the consequences will be if the rules are not followed.
This certainly appears worse than the two “Top Secret” emails found on the server. The State Department and Democrats can spin all they want, but this isn’t good at all. What’s even more troubling is McCullough wanted to see all the emails, but the State Department wouldn’t let him. There’s no word if McCullough will now get access to the emails. Not only that, but the attorney for former Clinton top aide Cheryl Mills told a judge the State Department wanted her to delete her emails.
We ask you to clarify with Judge Sullivan that it was the State Department that asked for the return of all copies of potential federal records in Ms. Mills’ possession and going forward it will be the State Department’s responsibility to secure permission from Judge Sullivan to remove any copies of such emails from Ms. Mills email account.
Wow. That’s a big change from almost a week ago when Mills said she was going to delete her emails after giving them back to the State Department. This may show how serious this situation is being viewed by Mills’ camp. Huma Abedin will also not be deleting her emails. Both Mills and Abedin are considered part of Clinton’s inner circle of allies. It’s doubtful there are cracks showing in Hillaryland, but it’s pretty interesting to see all these moves. It’s possible these are being done to point fingers at people in State as a way for Mills and Abedin to appear “innocent as doves.” If they aren’t just deflecting and are telling the truth, then heads could roll at State. But Clinton’s camp is obviously worried.”
“Hillary Clinton needs a miracle to save her
By Michael Goodwin
August 15, 2015 | 10:19pm
There is a final irony in her predicament. Clinton set up the private server to have total control over her communications, and she succeeded, temporarily.
But now the bill must be paid, and she has almost no control over the price. She forgot the warning to be careful what you wish for — and that the devil always takes his due.”
“Serco farewell to NPL after 19 years of innovation 8 January 2015 .. During that period under Serco’s management and leadership.. .. NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency [White’s Club Death-Bet] trading in the City through NPLTime.”
“Behind the Sordid World of Online Assassination Betting
I have heard rumors about this website, but I still cannot quite believe that it exists. I am looking at what I think is a hit list.
There are photographs of people I recognize—prominent politicians, mostly—and, next to each, an amount of money. The site’s creator, who uses the pseudonym Kuwabatake Sanjuro, thinks that if you could pay to have someone murdered with no chance—I mean absolutely zero chance—of being caught, you would.
That’s one of the reasons why he has created the Assassination Market.
There are four simple instructions listed on its front page:
Add a name to the list
Add money to the pot in the person’s name
Predict when that person will die
Correct predictions get the pot
The Assassination Market can’t be found with a
Google search. It sits on a hidden, encrypted part of the internet that, until recently, could only be accessed with a browser called The Onion Router, or Tor. Tor began life as a U.S. Naval Research Laboratory project, but today exists as a not-for-profit organization, partly funded by the U.S. government and various civil liberties groups [100 Women in Hedge Funds], allowing millions of people around the world to browse the internet anonymously and securely.
To put it simply, Tor works by repeatedly encrypting computer activity and routing it via several network nodes, or “onion routers,” in so doing concealing the origin, destination, and content of the activity. Users of Tor are untraceable, as are the websites, forums, and blogs that exist as Tor Hidden Services, which use the same traffic encryption system to cloak their location.
The Assassination Market may be hosted on an unfamiliar part of the net, but it’s easy enough to find, if you know how to look. All that’s required is simple (and free) Tor software. Then sign up, follow the instructions, and wait. It is impossible to know the number of people who are doing exactly that, but at the time of writing, if I correctly predict the date of the death of Ben Bernanke, the former chairman of the Federal Reserve, I’d receive approximately $56,000. It may seem like a fairly pointless bet. It’s very difficult to guess when someone is going to die. That’s why the Assassination Market has a fifth instruction:
Making your prediction come true is entirely optional”
“Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. In operation since before 1985, NTP is one of the oldest Internet protocols in current use. NTP was originally designed by David L. Mills of the University of Delaware, who still oversees its development. … While no one doubts the contribution of NTP to network performance, several security concerns have arisen in late 2014. Previously, researchers became aware that NTP servers can be susceptible to man-in-the-middle attacks unless packets are cryptographically signed for authentication. The computational overhead involved can make this impractical on busy servers, particularly during denial of service attacks. NTP message spoofing can be used to move clocks on client computers and allow a number of attacks based on bypassing of cryptographic key expiration.“
“The Duke and Duchess of Cambridge and the £1.3 trillion hedge fund women
In their elegant ballgowns, they could be among the guests at any charity reception hosted by the Duke and Duchess of Cambridge.
By David Harrison and Claire Duffin
8:00AM BST 23 Oct 2011
In fact, these are some of the most powerful and influential individuals to have gathered at St James’s Palace. All leading figures in finance, they help to control assets totalling £1.3 trillion.
Left-to-right in photograph:
2) Amanda Pullinger. 45: Chief executive of Pullinger Management in New York. Executive director of 100WHF. Studied modern history at Oxford University where she was a contemporary of David Cameron. Originally from Solihull, has lived in New York for 24 years. Fan of Downton Abbey.
3) Effie Datson, 41: Head of foreign exchange and global macro prime brokerage for Deutsche Bank, which has managed assets of £480 billion. Previously worked at IKOS and Goldman Sachs. London Board Chair of 100WHF. Has a degree in social sciences and MBA, both from Harvard. Lives with husband Edwin, a venture capitalist, in a £1 million flat in Battersea, southwest London. Competes in triathlons.
4) Claire Smith, 48: Research analyst and partner with Albourne Partners, independent global advisers whose 200 clients worldwide have an estimated £145 billion invested in hedge funds. Works from home in Geneva.
5) Kathryn Graham, 39: Director of BT Pension Scheme Management in London, BT’s pensions advisory arm, the largest scheme in the UK at £34 billion. Has an MA in economics and mathematics from Edinburgh University. Trustee of hedge fund standards board in London.
6) Roxanne Mosley Sargent, 43: Previously co-head of sales and marketing at Armajaro Asset Management, formerly head of hedge fund capital group for Europe at Deutsche Bank. MBA from Harvard. Married with young children, lives in Notting Hill, west London.
7) Kristen Eshak Weldon, 33: Managing director of Blackstone Group International Partners which has £99 billion of managed assets. 100WHF London board member. Previously worked at JP Morgan. Studied at Georgetown University, Washington DC. Originally from Houston, Texas and now living in London. Likes designer fashion labels including Diane von Furstenberg, Max Mara and Donna Karan.
8) Natasha Sai, 35, a managing director with the banking giant Goldman Sachs, America’s 5th largest bank by revenue, which has £515 billion of managed assets. Lives in Hammersmith, west London. Featured in a 2001 Sky One series called The Real Sex in the City, about the lives of single girls in New York.
9) Sonia Gardner, 49: Moroccan-born president and co-founder, Avenue Capital Group, a global investment firm with £12.5 billion of managed assets. Made a donation to Hillary Clinton’s New York Senate re-election campaign. Mrs Clinton’s daughter Chelsea joined Ms Gardner’s Avenue Capital Group in 2006. [Steering Trump Entertainment Resorts Inc. out of bankruptcy protection; allegedly with the proceeds of online assassination betting!!!]
10) Stephanie Breslow: partner and co-head of the investment management group at Schulte Roth & Zabel, a New York law firm with an office in London. Lives in New York with husband and two stepchildren. Graduate of Columbia University School of Law. Is on the advisory board of the Columbia Law School’s Gender and Sexuality Centre.
11) Mindy Posoff, 51: Founder, Traversent Capital Partners, a consultancy for hedge funds and asset managers. Also managing director of Golden Seeds, dedicated to investing in young companies founded or led by women. Former director of Credit Suisse. Likes Queen Latifah, the American rapper.
12) Carol Kim: managing director, the Blackstone Group, based in Hong Kong. Previously based in New York as a Vice President in the Absolute Return Strategies Group at Lehman Brothers. 100WHF co-founder and board director. Has a BA in Urban and Economic Studies from the University of Toronto.
13) Mimi Drake, 42: President of Permit Capital Advisors, an independent investment advisory firm based in Philadelphia. Previously in magazine publishing. Has an MBA in finance from the University of Pennsylvania. Formerly Mimi Keller, she married Thomas Drake, a doctor, in 1996.
14) Kristin Fox, 47: Former journalist, founder and principal of FoxInspires consultancy. Chicago-based. A former news director of HedgeWorld. Owns 110 pairs of shoes and admits to a penchant for the creations of Mephisto, Icon and Stuart Weitzman.”
“Serco – Procurement and Supply Chain
We apply a consistent procurement process to the selection and use of suppliers. This ensures that we comply with laws and regulations and other requirements applicable to the locations where we operate. It also means that we get maximum value from our spend, whilst meeting customer requirements.
We work collaboratively to deliver sustainable value; maintain the integrity of our procurement process; and drive continuous improvements. To achieve this we apply a consistent procurement process in selecting and using suppliers, so that we:
– manage business and financial risk, derive maximum value from our spend , through appropriate procurement strategies and supplier selection criteria, such as low cost, technically acceptable or best overall value, whilst mitigating risks to business and customer objectives and meeting our customer service requirements
– work collaboratively across all Serco’s Divisions and with suppliers to maximise and deliver sustainable value to Serco, maintain the integrity of our procurement process and drive continuous improvements
– comply with laws and regulations and other requirements applicable to the locations in which we operate our business
– reflect our ethical standards and code of conduct throughout our supply chain and ensure that sourcing initiatives are fair and ethical to both Serco and the participating suppliers consider social and environmental and other factors important to our clients and the communities within which we operate in the supply chain
All procurement activity is governed by the Serco Group plc Delegated Approval Authorities. Each Division has a Divisional Procurement and Supply Chain Lead to support effective sourcing and negotiating strategies.
A Procurement and Supply Chain Executive Board oversees the implementation of Procurement and Supply Chain strategy.
Sustainable procurement is our commitment to achieve value for money on a whole life basis in a way that delivers tangible social, environmental and economic outcomes. We expect our suppliers to meet a set of sustainable procurement standards. These are considered when reviewing the overall suitability and performance of suppliers.
Our commitments and required standards are defined in our policy statement and supporting Group Standard.
A Supplier Code of Conduct is made available for suppliers to ensure that they know what is expected of them.”
We practice Diversity Recruitment and Staffing for IT positions
Base One was founded in 1994 by a women engineer who had made a career in technology research for many years. Base One has been very successful in focusing on diversity recruiting and staffing for IT projects. It has been our experience that the greater the diversity mix, the more creative the solution. As in any field the more diverse the viewpoint the more thorough your analysis. Our engineers can think out of the box.
Because of our affiliations we have access to pools of resources among more diverse groups & individuals. We work with a large pool of minority professionals who specialize in IT skills. We are able to have access to these resources through our status as a D/MWBD firm and our affiliations. These affiliations assist us in working with resources among more diverse groups & individuals.
We are also partnered with firms that are 8A certified as Minority firms, Disabled Veteran firms, Native American firms, Vietnam veteran firms, women owned firms.
Our hub zone location keeps us close to the professional organizations of great diversity. We are active in recruiting from and networking with these community organizations of local IT professionals. This has given us access to a large pool of diversity talent.
Base One’s staff of engineers are a diverse group of professionals. This diverse network of engineers helps us to branch out to other engineers and creates an even larger network of resources for us to work with.
The greater the diversity the more complete & thorough the analysis. The broader the spectrum of points of view the broader the scope of the analysis. We feel that a diverse team gives us a greater advantage in creating cutting edge solutions. To that end we will continue to nurture these relationships to further extend our talent pool.
The greater the diversity mix, the more creative the solution.
The more diverse the viewpoint, the more thorough the analysis.
The more diverse our team, the more our engineers can think out of the box.
This is why Base One Technologies concentrates on diversity recruitment in the belief that a diverse team gives us a greater advantage in creating cutting edge solutions.”
Information Security Planning is the process whereby an organization seeks to protect its operations and assets from data theft or computer hackers that seek to obtain unauthorized information or sabotage business operations.
Key Clients Benefiting From Our Information Security Expertise: Pentagon Renovation Program, FAA, Citigroup, MCI.
Base One technologies
Expertly researches, designs, and develops information security policies that protect your data and manage your firm’s information technology risk at levels acceptable to your business.
Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report.
Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions.”
“The 8(a) Business Development Program assists in the development of small businesses owned and operated by individuals who are socially and economically disadvantaged, such as women and minorities. The following ethnic groups are classified as eligible: Black Americans; Hispanic Americans; Native Americans (American Indians, Eskimos, Aleuts, or Native Hawaiians); Asian Pacific Americans (persons with origins from Burma, Thailand, Malaysia, Indonesia, Singapore, Brunei, Japan, China (including Hong Kong), Taiwan, Laos, Cambodia (Kampuchea), Vietnam, Korea, The Philippines, U.S. Trust Territory of the Pacific Islands (Republic of Palau), Republic of the Marshall Islands, Federated States of Micronesia, the Commonwealth of the Northern Mariana Islands, Guam, Samoa, Macao, Fiji, Tonga, Kiribati, Tuvalu, or Nauru); Subcontinent Asian Americans (persons with origins from India, Pakistan, Bangladesh, Sri Lanka, Bhutan, the Maldives Islands or Nepal). In 2011, the SBA, along with the FBI and the IRS, uncovered a massive scheme to defraud this program. Civilian employees of the U.S. Army Corps of Engineers, working in concert with an employee of Alaska Native Corporation Eyak Technology LLC allegedly submitted fraudulent bills to the program, totaling over 20 million dollars, and kept the money for their own use. It also alleged that the group planned to steer a further 780 million dollars towards their favored contractor.”
“On October 6, 2000, the NMCI contract was awarded to Electronic Data Systems (EDS), now HP Enterprise Services (HP). Secretary of the Navy Gordon England summed up the Navy’s IT Environment prior to the commencement of NMCI: “We basically had 28 separate commands budgeting, developing, licensing, and operating IT autonomously. It was inefficient and from the larger Department perspective, produced results that were far from optimal.”
NMCI consolidated roughly 6,000 networks—some of which could not e-mail, let alone collaborate with each other—into a single integrated and secure IT environment. HP updated more than 100,000 desktop and laptop PCs in 2007. The program also consolidated an ad hoc network of more than 8,000 applications to 500 in four years and 15,003 logistics and readiness systems to 2,759 over a two-year period.
Sub-contractors to HP include:
Harris Corporation (which acquired Multimax formerly known as Netco Government Services and WAM!NET), which provided enterprise network infrastructure design and support until its contract expired in 2014.
Verizon, which provides wide area network (WAN) connectivity.
HP also provides the security services once provided by Raytheon.
“HP also has worked with more than 400 small businesses, with 5 percent for small disadvantaged businesses, 5 percent for women-owned small businesses and 1.5 percent for HUBZone small businesses. Since its inception, NMCI has exceeded the minimum 40% small business objective set for the contract.
The Department of the Navy has shown no desire to scale back or cancel the program. On 24 March 2006 the Navy exercised its three-year, $3 billion option to extend the contract through September 2010.
In April 2006, users began to log on with Common Access Cards (CACs), a smartcard-based logon system called the Cryptographic Log On (CLO). In October 2008, NMCI’s prime contractor HP posted a set of procedures so Apple Mac users can access NMCI’s public-facing Web services, such as the e-mail and calendar functions, using their CAC readers with their Macs. The workaround also works with other Defense Department CAC-enabled networks. Alternatively, NMCI and all other CAC-authenicated DoD websites may be accessed using LPS-Public.”
“Government still paying G4S and Serco millions for tagging despite ban Alan Travis Home affairs editor
Thursday 25 June 2015 00.01 BST
The Ministry of Justice is still paying security firms G4S and Serco millions of pounds every month for supplying electronic tagging equipment, more than a year after both companies were barred from running the contract.
Both companies faced criminal investigations by the Serious Fraud Office over allegations of overcharging that led to them repaying nearly £180m.
The continuing monthly payments to the two companies were uncovered by an analysis of Ministry of Justice (MoJ) data by the Centre for Crime and Justice Studies which shows that G4S was paid a total of £8.7m between March 2014 – when it lost the tagging contract – and February 2015. Serco was paid £4.5m over the same period.
The electronic monitoring tags are used to enforce curfews on more than 100,000 offenders each year. The outsourcing giant Capita took over the contract on an interim basis in April last year.
In July 2014, Capita and three other companies were named as the winners of a £265m six-year contract to supply the next generation of satellite tracking tags, which would allow dangerous and repeat offenders to be monitored around the clock.”