#2429: Serco’s 8(a) Clinton Death-Bet Server – Hedge Funds’ Body-Woman Suites – Benghazi Digital Fires
1. In February 1994, a Serco 8(a) protege company – Base One Technologies – allegedly set up a server for remote assassination betting by the Clinton State Department insiders who apparently used the authority of a treasonous member of the Joint Chiefs of Staff to synchronize the shooting down of the Rwanda president’s plane on April 6, 1994 with the broadcast of propaganda from Hotel Milles Collines and triggered a million deaths during the Rwanda Genocide.
2. In 1994, Clinton insiders outsourced the National Visa Center and the U.S. Justice Prisoner and Alien Transportation System to Serco which allegedly placed 8(a) body-women pimps – often but not exclusively pedophile pimps – in the suites of top hotels to entrap favored women in hedge funds in a Joint Chiefs’ remote assassination betting pool.
3. On 9/11/2012, a Clinton body woman, Huma Abedin, allegedly tracked the late U.S. Ambassador Christopher Stevens from his Benghazi Tibesty hotel to a spot-fixed death by torture while calling in Serco digital fires on a Marine Corps onion router (Tor) to synchronize Hillary Clinton’s “Innocence of Muslims” script and spin.
McConnell will expose the principal actors and their criminal M.O. which resulted in the wrongful death of Christopher Stevens in his e-book “Shaking Hands With the Devil’s Clocks“.
HILLARY TIPPED MURDERED AMBASSADOR’S MOVEMENTS IN EMAILS
Secretary of state was using her unsecured private server
Published: 05/28/2015 at 7:38 PM
In the year prior to the deadly 2012 Benghazi attack, Hillary Clinton used her private email server to correspond about such highly sensitive national security matters as specific threats to the Libya hotel where Ambassador Chris Stevens was staying as well as his decision to remain at the hotel despite the threats.
Read more at http://www.wnd.com/2015/05/hillary-tipped-murdered-ambassadors-movements-in-emails/#EUvukudJZq0eLFMR.99
The emails, released May 22 by the State Department, also contained the exact movements of Stevens while he was stationed in arguably one of the most dangerous zones in the world for any American diplomat, a WND review has found.
On April 24, 2011, Clinton’s senior aide, Huma Abedin, forwarded to Clinton’s personal email an internal State email from that same day written by Timmy Davis and sent to Abedin as well as to the State email addresses of other employees, including Clinton’s then-foreign policy aide, Jacob Sullivan.
The email cited a local report stating hotels in Benghazi were being targeted.
The email, which ran through Clinton’s personal server, stated the interim Libyan government “conducted a raid on a house/storage facility and found and arrested an Egyptian cell reportedly there for the purpose of attacking hotels.”
Despite the threat, the email revealed Stevens “still feels comfortable in the hotel,” meaning the email exposed that the ambassador would continue to stay there.
Find out what really happened, in Aaron Klein’s “The REAL Benghazi Story.”
“They are looking into the idea of moving into a villa, but that is some way off,” the email continued. “Based on discussion with DS yesterday, the hotel remains the safest location.”
Startlingly, the email contained information about Stevens’ exact movements, including that he “will be meeting with MFA in one hour and will make a written request for better security at the hotel and for better security-related coordination.”
On June 10, 2011, Sullivan sent an email to Clinton’s personal address informing that “there is credible threat info against the hotel that our team is using – and the rest of the Intl community is using, for that matter.”
That email divulged: “DS going to evacuate our people to alt locations. Info suggested attack in next 24-48 hours. Will keep you posted.”
Yet another sent to Clinton from Abedin detailed Stevens’ movements regarding his hotel stay.
“The envoy’s delegation is currently doing a phased checkout (paying the hotel bills, moving some [Marine Corps?] comms to the boat, etc.),” wrote Abedin.
“He (Stevens) will monitor the situation to see if it deteriorates further, but no decision has been made on departure. He will wait 2-3 more hours, then revisit the decision on departure.”
“Huma Mahmood Abedin (born July 28, 1976) is an American political staffer. She has been a long-time aide to Hillary Clinton, and was U.S. Secretary of State Clinton’s Deputy Chief of Staff at the State Department, and before that, traveling chief of staff and “body woman” during Clinton’s campaign for the Democratic nomination in the 2008 presidential election. She currently serves as vice chairwoman of Clinton’s 2016 campaign for President. She is married to former Democratic Congressman and2013 New York City mayoral candidate, Anthony Weiner.”
“Digital Fires Instructor Serco – Camp Pendleton, CA Posted 377 days ago
Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”
“Benghazi consulate attackers used military-style tactics, say US officials
Experts still unsure whether assault that killed 4 Americans in Libya could have been prevented
BY MATT APUZZO AND KIMBERLY DOZIER September 22, 2012, 1:44 am
Wanis al-Sharef, who was Libya’s deputy interior minister until he was fired after the attacks, said a small group of lightly armed gunmen were the first to gather outside the compound. They were then joined by a crowd of civilians protesting the film. Finally, a larger group of heavily armed men arrived with gun vehicles and grenade launchers. That final group was responsible for the siege.
Ansar al-Shariah has repeatedly denied being any part of the attack, but eyewitnesses and security officials said the group’s militiamen were among the gunmen who joined the demonstration outside the compound. The group claimed its fighters were only in the Benghazi area providing security at Jalaa Hospital. But that’s more than three miles from the US compound, which lies on the outskirts of the city in a rural area.
One witness said he was detained by Ansar al-Shariah members during the protest because he was taking pictures of one of their leaders.
Whoever they were, the attackers stormed the main building and set it on fire. One US official described the militants striking the front of the building first, distracting security, while a second group struck then from the rear. Many people escaped and fled to an annex to the east.
About an hour after the assault began, American and Libyan forces retook control of the compound and brought everyone to the annex. Rescue teams headed their way.
Intelligence indicates the gunmen broke off into teams to block certain roads away from the compound, officials said. Whether that changed the route or otherwise influenced how the Americans moved through the streets remains unclear, but one US official said the tactic was being looked at as an indication of battlefield strategy and sophistication.
As the Americans waited to be rescued from the annex, that building came under mortar fire. Mortars are short-range bombs that launch in high arcs. Aiming them can be a matter of trial and error. But US officials said mortars were landing directly on the roof of the annex.
That, officials said, indicated an experienced fighter, a well-planned assault or both.
Copyright 2012 The Associated Press.”
April 22, 2015 WASHINGTON–(BUSINESS WIRE)–The American Council for Technology and Industry Advisory Council (ACT-IAC), the premier public-private partnership in the government IT community, today honored Jackie Robinson-Burnette, Associate Administrator of 8(a) Business Development, HQ Small Business Administration (SBA), and Darryl Scott, Director of Partner Relations, Serco, with the annual Small Business Advocacy Award.
Presented at ACT-IAC’s Small Business Conference (SBC) luncheon, the award recognizes Ms. Robinson-Burnette and Mr. Scott for their work in promoting the growth and development of small businesses in the federal marketplace. The Small Business Advocacy Award is an honor ACT-IAC awards to one government and one industry professional who have made substantial contributions to small businesses in the IT community.
Ms. Robinson-Burnette was named the Associate Administrator, SBA in December 2014. Prior to joining the SBA, she served in the Pentagon as a Deputy Director, Office of the Secretary of the Army, Office of Small Business Programs. In this position with over $16 billion in annual contract awards to small firms, Ms. Robinson-Burnette managed the largest federal small business program in the country. During her time with the Army, she provided leadership and guidance to a network of over 200 military and civilian small business specialists.
Mr. Scott has consistently championed the cause of small business within Serco by encouraging executive leadership to make it a priority to meet or exceed all small business commitments. Since Mr. Scott took on the role of Director of Small Business Partner Relations in 2009, Serco has consistently met or exceeded the Government’s small business subcontracting goals in ALL small business categories. Through his 30-year career, he has tirelessly worked towards advancing the interests of the small business community.
Launched in 2007, SBC is the unrivaled forum for new and established small and large businesses to come together to further align with the needs of government agencies.
ACT-IAC is the premier public-private partnership in the government IT community and an example of how government and industry work together. ACT-IAC is a nonprofit educational organization created to advance government through collaboration and education. The organization provides an objective, vendor and technology-neutral and ethical forum where government and industry are working together to develop innovative strategies, effective and efficient solutions and best practices. Headquartered in the Greater Washington, D.C. area, ACT-IAC also has chapters in Pacific region (based in San Diego) and the Rocky Mountain region (based in Denver).”
“Hillary Clinton emails included very secret satellite images
POSTED AT 2:01 PM ON AUGUST 13, 2015 BY TAYLOR MILLARD
Hillary Clinton’s possibly unsecure, possibly secure, private server included emails featuring satellite images and other highly secretive information from the intelligence community. John R. Schindler at The Daily Beast has a rundown of what Inspector General I. Charles McCullough III found:
Most seriously, the Inspector General assessed that Clinton’s emails included information that was highly classified—yet mislabeled as unclassified. Worse, the information in question should have been classified up to the level of “TOP SECRET//SI//TK//NOFORN,” according to the Inspector General’s report…In short: Information at the “TOP SECRET//SI//TK//NOFORN” level is considered exceptionally highly classified and must be handled with great care under penalty of serious consequences for mishandling. Every person who is cleared and “read on” for access to such information signs reams of paperwork and receives detailed training about how it is to be handled, no exceptions—and what the consequences will be if the rules are not followed.
This certainly appears worse than the two “Top Secret” emails found on the server. The State Department and Democrats can spin all they want, but this isn’t good at all. What’s even more troubling is McCullough wanted to see all the emails, but the State Department wouldn’t let him. There’s no word if McCullough will now get access to the emails. Not only that, but the attorney for former Clinton top aide Cheryl Mills told a judge the State Department wanted her to delete her emails.
We ask you to clarify with Judge Sullivan that it was the State Department that asked for the return of all copies of potential federal records in Ms. Mills’ possession and going forward it will be the State Department’s responsibility to secure permission from Judge Sullivan to remove any copies of such emails from Ms. Mills email account.
Wow. That’s a big change from almost a week ago when Mills said she was going to delete her emails after giving them back to the State Department. This may show how serious this situation is being viewed by Mills’ camp. Huma Abedin will also not be deleting her emails. Both Mills and Abedin are considered part of Clinton’s inner circle of allies. It’s doubtful there are cracks showing in Hillaryland, but it’s pretty interesting to see all these moves. It’s possible these are being done to point fingers at people in State as a way for Mills and Abedin to appear “innocent as doves.” If they aren’t just deflecting and are telling the truth, then heads could roll at State. But Clinton’s camp is obviously worried.”
“EXCLUSIVE: Hillary’s email firm was run from a loft apartment with its servers in the BATHROOM, raising new questions over security of sensitive messages she held
Democratic White House front-runner used Platte River Networks of Denver, Colorado, to maintain her controversial ‘home brew’ server
Up to 60 emails with classified material have been found in a sample of those she did not delete – meaning there could be many more
Now Daily Mail Online reveals new questions over security of her emails when Platte River was involved in maintaining server
‘Mom and pop’ firm used converted residential apartment and had its own servers in a bathroom closet
Links between ‘local’ IT company and Clinton remain unclear but its VP of sales and marketing, who was sued for ‘fraud’ is said to be ‘big Democrat’
By HUGO DANIEL IN DENVER, COLORADO, FOR DAILYMAIL.COM
PUBLISHED: 13:12 GMT, 18 August 2015 | UPDATED: 14:17 GMT, 18 August 2015″
“Behind the Sordid World of Online Assassination Betting
I have heard rumors about this website, but I still cannot quite believe that it exists. I am looking at what I think is a hit list.
There are photographs of people I recognize—prominent politicians, mostly—and, next to each, an amount of money. The site’s creator, who uses the pseudonym Kuwabatake Sanjuro, thinks that if you could pay to have someone murdered with no chance—I mean absolutely zero chance—of being caught, you would.
That’s one of the reasons why he has created the Assassination Market.
There are four simple instructions listed on its front page:
Add a name to the list
Add money to the pot in the person’s name
Predict when that person will die
Correct predictions get the pot
The Assassination Market can’t be found with a
Google search. It sits on a hidden, encrypted part of the internet that, until recently, could only be accessed with a browser called The Onion Router, or Tor. Tor began life as a U.S. Naval Research Laboratory project, but today exists as a not-for-profit organization, partly funded by the U.S. government and various civil liberties groups [100 Women in Hedge Funds], allowing millions of people around the world to browse the internet anonymously and securely.
To put it simply, Tor works by repeatedly encrypting computer activity and routing it via several network nodes, or “onion routers,” in so doing concealing the origin, destination, and content of the activity. Users of Tor are untraceable, as are the websites, forums, and blogs that exist as Tor Hidden Services, which use the same traffic encryption system to cloak their location.
The Assassination Market may be hosted on an unfamiliar part of the net, but it’s easy enough to find, if you know how to look. All that’s required is simple (and free) Tor software. Then sign up, follow the instructions, and wait. It is impossible to know the number of people who are doing exactly that, but at the time of writing, if I correctly predict the date of the death of Ben Bernanke, the former chairman of the Federal Reserve, I’d receive approximately $56,000. It may seem like a fairly pointless bet. It’s very difficult to guess when someone is going to die. That’s why the Assassination Market has a fifth instruction:
Making your prediction come true is entirely optional”
“Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. In operation since before 1985, NTP is one of the oldest Internet protocols in current use. NTP was originally designed by David L. Mills of the University of Delaware, who still oversees its development. … While no one doubts the contribution of NTP to network performance, several security concerns have arisen in late 2014. Previously, researchers became aware that NTP servers can be susceptible to man-in-the-middle attacks unless packets are cryptographically signed for authentication. The computational overhead involved can make this impractical on busy servers, particularly during denial of service attacks. NTP message spoofing can be used to move clocks on client computers and allow a number of attacks based on bypassing of cryptographic key expiration.“
“The Duke and Duchess of Cambridge and the £1.3 trillion hedge fund women
In their elegant ballgowns, they could be among the guests at any charity reception hosted by the Duke and Duchess of Cambridge.
By David Harrison and Claire Duffin
8:00AM BST 23 Oct 2011
In fact, these are some of the most powerful and influential individuals to have gathered at St James’s Palace. All leading figures in finance, they help to control assets totalling £1.3 trillion.
Left-to-right in photograph:
2) Amanda Pullinger. 45: Chief executive of Pullinger Management in New York. Executive director of 100WHF. Studied modern history at Oxford University where she was a contemporary of David Cameron. Originally from Solihull, has lived in New York for 24 years. Fan of Downton Abbey.
3) Effie Datson, 41: Head of foreign exchange and global macro prime brokerage for Deutsche Bank, which has managed assets of £480 billion. Previously worked at IKOS and Goldman Sachs. London Board Chair of 100WHF. Has a degree in social sciences and MBA, both from Harvard. Lives with husband Edwin, a venture capitalist, in a £1 million flat in Battersea, southwest London. Competes in triathlons.
4) Claire Smith, 48: Research analyst and partner with Albourne Partners, independent global advisers whose 200 clients worldwide have an estimated £145 billion invested in hedge funds. Works from home in Geneva.
5) Kathryn Graham, 39: Director of BT Pension Scheme Management in London, BT’s pensions advisory arm, the largest scheme in the UK at £34 billion. Has an MA in economics and mathematics from Edinburgh University. Trustee of hedge fund standards board in London.
6) Roxanne Mosley Sargent, 43: Previously co-head of sales and marketing at Armajaro Asset Management, formerly head of hedge fund capital group for Europe at Deutsche Bank. MBA from Harvard. Married with young children, lives in Notting Hill, west London.
7) Kristen Eshak Weldon, 33: Managing director of Blackstone Group International Partners which has £99 billion of managed assets. 100WHF London board member. Previously worked at JP Morgan. Studied at Georgetown University, Washington DC. Originally from Houston, Texas and now living in London. Likes designer fashion labels including Diane von Furstenberg, Max Mara and Donna Karan.
8) Natasha Sai, 35, a managing director with the banking giant Goldman Sachs, America’s 5th largest bank by revenue, which has £515 billion of managed assets. Lives in Hammersmith, west London. Featured in a 2001 Sky One series called The Real Sex in the City, about the lives of single girls in New York.
9) Sonia Gardner, 49: Moroccan-born president and co-founder, Avenue Capital Group, a global investment firm with £12.5 billion of managed assets. Made a donation to Hillary Clinton’s New York Senate re-election campaign. Mrs Clinton’s daughter Chelsea joined Ms Gardner’s Avenue Capital Group in 2006. [Steering Trump Entertainment Resorts Inc. out of bankruptcy protection; allegedly with the proceeds of online assassination betting!!!]
10) Stephanie Breslow: partner and co-head of the investment management group at Schulte Roth & Zabel, a New York law firm with an office in London. Lives in New York with husband and two stepchildren. Graduate of Columbia University School of Law. Is on the advisory board of the Columbia Law School’s Gender and Sexuality Centre.
11) Mindy Posoff, 51: Founder, Traversent Capital Partners, a consultancy for hedge funds and asset managers. Also managing director of Golden Seeds, dedicated to investing in young companies founded or led by women. Former director of Credit Suisse. Likes Queen Latifah, the American rapper.
12) Carol Kim: managing director, the Blackstone Group, based in Hong Kong. Previously based in New York as a Vice President in the Absolute Return Strategies Group at Lehman Brothers. 100WHF co-founder and board director. Has a BA in Urban and Economic Studies from the University of Toronto.
13) Mimi Drake, 42: President of Permit Capital Advisors, an independent investment advisory firm based in Philadelphia. Previously in magazine publishing. Has an MBA in finance from the University of Pennsylvania. Formerly Mimi Keller, she married Thomas Drake, a doctor, in 1996.
14) Kristin Fox, 47: Former journalist, founder and principal of FoxInspires consultancy. Chicago-based. A former news director of HedgeWorld. Owns 110 pairs of shoes and admits to a penchant for the creations of Mephisto, Icon and Stuart Weitzman.”
“Serco – Procurement and Supply Chain
We apply a consistent procurement process to the selection and use of suppliers. This ensures that we comply with laws and regulations and other requirements applicable to the locations where we operate. It also means that we get maximum value from our spend, whilst meeting customer requirements.
We work collaboratively to deliver sustainable value; maintain the integrity of our procurement process; and drive continuous improvements. To achieve this we apply a consistent procurement process in selecting and using suppliers, so that we:
– manage business and financial risk, derive maximum value from our spend , through appropriate procurement strategies and supplier selection criteria, such as low cost, technically acceptable or best overall value, whilst mitigating risks to business and customer objectives and meeting our customer service requirements
– work collaboratively across all Serco’s Divisions and with suppliers to maximise and deliver sustainable value to Serco, maintain the integrity of our procurement process and drive continuous improvements
– comply with laws and regulations and other requirements applicable to the locations in which we operate our business
– reflect our ethical standards and code of conduct throughout our supply chain and ensure that sourcing initiatives are fair and ethical to both Serco and the participating suppliers consider social and environmental and other factors important to our clients and the communities within which we operate in the supply chain
All procurement activity is governed by the Serco Group plc Delegated Approval Authorities. Each Division has a Divisional Procurement and Supply Chain Lead to support effective sourcing and negotiating strategies.
A Procurement and Supply Chain Executive Board oversees the implementation of Procurement and Supply Chain strategy.
Sustainable procurement is our commitment to achieve value for money on a whole life basis in a way that delivers tangible social, environmental and economic outcomes. We expect our suppliers to meet a set of sustainable procurement standards. These are considered when reviewing the overall suitability and performance of suppliers.
Our commitments and required standards are defined in our policy statement and supporting Group Standard.
A Supplier Code of Conduct is made available for suppliers to ensure that they know what is expected of them.”
“Base One Technologies – Corporate Strategy – We are a Government Certified Women-Owned Business
We practice Diversity Recruitment and Staffing for IT positions
Base One was founded in 1994 by a women engineer who had made a career in technology research for many years. Base One has been very successful in focusing on diversity recruiting and staffing for IT projects. It has been our experience that the greater the diversity mix, the more creative the solution. As in any field the more diverse the viewpoint the more thorough your analysis. Our engineers can think out of the box.
Because of our affiliations we have access to pools of resources among more diverse groups & individuals. We work with a large pool of minority professionals who specialize in IT skills. We are able to have access to these resources through our status as a D/MWBD firm and our affiliations. These affiliations assist us in working with resources among more diverse groups & individuals.
We are also partnered with firms that are 8A certified as Minority firms, Disabled Veteran firms, Native American firms, Vietnam veteran firms, women owned firms.
Our hub zone location keeps us close to the professional organizations of great diversity. We are active in recruiting from and networking with these community organizations of local IT professionals. This has given us access to a large pool of diversity talent.
Base One’s staff of engineers are a diverse group of professionals. This diverse network of engineers helps us to branch out to other engineers and creates an even larger network of resources for us to work with.
The greater the diversity the more complete & thorough the analysis. The broader the spectrum of points of view the broader the scope of the analysis. We feel that a diverse team gives us a greater advantage in creating cutting edge solutions. To that end we will continue to nurture these relationships to further extend our talent pool.
The greater the diversity mix, the more creative the solution.
The more diverse the viewpoint, the more thorough the analysis.
The more diverse our team, the more our engineers can think out of the box.
This is why Base One Technologies concentrates on diversity recruitment in the belief that a diverse team gives us a greater advantage in creating cutting edge solutions.”
Information Security Planning is the process whereby an organization seeks to protect its operations and assets from data theft or computer hackers that seek to obtain unauthorized information or sabotage business operations.
Key Clients Benefiting From Our Information Security Expertise: Pentagon Renovation Program, FAA, Citigroup, MCI.
Base One technologies
Expertly researches, designs, and develops information security policies that protect your data and manage your firm’s information technology risk at levels acceptable to your business.
Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report.
Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions.”
“The 8(a) Business Development Program assists in the development of small businesses owned and operated by individuals who are socially and economically disadvantaged, such as women and minorities. The following ethnic groups are classified as eligible: Black Americans; Hispanic Americans; Native Americans (American Indians, Eskimos, Aleuts, or Native Hawaiians); Asian Pacific Americans (persons with origins from Burma, Thailand, Malaysia, Indonesia, Singapore, Brunei, Japan, China (including Hong Kong), Taiwan, Laos, Cambodia (Kampuchea), Vietnam, Korea, The Philippines, U.S. Trust Territory of the Pacific Islands (Republic of Palau), Republic of the Marshall Islands, Federated States of Micronesia, the Commonwealth of the Northern Mariana Islands, Guam, Samoa, Macao, Fiji, Tonga, Kiribati, Tuvalu, or Nauru); Subcontinent Asian Americans (persons with origins from India, Pakistan, Bangladesh, Sri Lanka, Bhutan, the Maldives Islands or Nepal). In 2011, the SBA, along with the FBI and the IRS, uncovered a massive scheme to defraud this program. Civilian employees of the U.S. Army Corps of Engineers, working in concert with an employee of Alaska Native Corporation Eyak Technology LLC allegedly submitted fraudulent bills to the program, totaling over 20 million dollars, and kept the money for their own use. It also alleged that the group planned to steer a further 780 million dollars towards their favored contractor.”
“Government still paying G4S and Serco millions for tagging despite ban Alan Travis Home affairs editor
Thursday 25 June 2015 00.01 BST
The Ministry of Justice is still paying security firms G4S and Serco millions of pounds every month for supplying electronic tagging equipment, more than a year after both companies were barred from running the contract.
Both companies faced criminal investigations by the Serious Fraud Office over allegations of overcharging that led to them repaying nearly £180m.
The continuing monthly payments to the two companies were uncovered by an analysis of Ministry of Justice (MoJ) data by the Centre for Crime and Justice Studies which shows that G4S was paid a total of £8.7m between March 2014 – when it lost the tagging contract – and February 2015. Serco was paid £4.5m over the same period.
The electronic monitoring tags are used to enforce curfews on more than 100,000 offenders each year. The outsourcing giant Capita took over the contract on an interim basis in April last year.
In July 2014, Capita and three other companies were named as the winners of a £265m six-year contract to supply the next generation of satellite tracking tags, which would allow dangerous and repeat offenders to be monitored around the clock.”