#2430: Expert Witness for MitM USNO – Serco Crime Time – Clinton Remote Assassination Betting

From United States Marine Field McConnell 
Plum City Online – (AbelDanger.net) 
August 19, 2015

1. Field McConnell is offering his support as an expert witness to class-action plaintiffs who choose to sue for wrongful deaths which can be attributed to man in the middle (MitM) attacks on the United States Naval Observatory’s (USNO) positioning, navigation and timing services to the Navy and Department of Defense.

2. In 1994, various USNO positioning, navigation and timing services to the Navy’s mission-critical operations, were outsourced to Serco whose 8(a) companies are allegedly pre-deployed to crime scenes build the bogus timelines needed to conceal murder-for-hire at mass-casualty events up to and including the Rwanda Genocide.

3. In 1994, Clinton insiders allegedly began using USNO servers installed by Serco’s 8(a) protégé company, Base One Technologies, to support remote assassination betting on the times of wrongful deaths at mass-casualty events (cf. USS Cole, AA Flight 77, Benghazi Digital Fires and GermanWings Flight 9525)

McConnell is offering his expert-witness services to plaintiffs in wrongful-death lawsuits while he and Abel Danger Research continue to expose Serco and its alleged MitM attacks on the United States Naval Observatory in his e-book “Shaking Hands With the Devil’s Clocks“. (See https://abeldanger.blogspot.com/2010/01/field-mcconnell-bio.html )

 Democratic presidential nominee Al Gore – makes a statement to the media from his Man in the Middle residence at the Naval Observatory November 17, 2000 in Washington.

US Criminal Regime: Expert 9/11 Witness, Danny Jowenko, Ordered Murdered 

“How much time do we have Hillary?”

Bill Clinton’s betting date in Queensland hotel, Osama bin Laden’s betting time in UAE hotel for the Serco 8(a) MitM attack on the Pentagon’s U.S. Navy Command Center at 9:37:19 on 9/11!

“Gore Planned To Tap Every Phone In The US
 By Curt  3
Jan, 19th, 2006
Interesting how Al
Gore was recently screaming about Bush authorizing a wiretap program where we
intercept calls made from across the ocean into the states by Al-Qaeda members,
without a warrant.? But he didn’t bother to bring up his Clipper
 program did he?
There are times when
Al Gore should sit down and shut up. Former Vice President Al Gore called for
an independent investigation into President Bush’s domestic spying program,
insisting that the president “repeatedly and insistently” broke the law by
eavesdropping on Americans without court approval.
What Al Gore forgot to
tell his audience was that he not only supported eavesdropping on Americans
without court approval ? he also chaired a project designed to execute just
that in total secrecy. In short, Al Gore wanted to bug every phone, computer
and fax in America.
In 1993 Al Gore was
charged by then President Bill Clinton to run the “Clipper” project. Clipper
was a special chip designed by the National Security Agency (NSA) to be built
into all phones, computers and fax machines. Not only would Clipper provide
scrambled security, it also contained a special “exploitable feature” enabling
the NSA to monitor all phone calls without a court order.
In 1993, VP Al Gore
went to work with a top secret group of Clinton advisers, called the IWG or
Interagency Working Group, and delivered a report on the Clipper project.
“Simply stated, the
nexus of the long term problem is how can the government sustain its technical
ability to accomplish electronic surveillance in an advanced telecommunications
environment,” states the TOP SECRET report prepared by Gore’s Interagency
Working Group.
“The solution to the
access problem for future telecommunications requires that the
vendor/manufacturing community translate the government’s requirements into a
fundamental system design criteria,” noted the Gore report.
“The basic issue for
resolution is a choice between accomplishing this objective by mandatory (i.e.,
statutory/regulatory) or voluntary means.”
The documented truth
is that America was to be given no choice but to be monitored by Big Brother
Al. This awful conclusion is backed by several other documents. One such
document released by the Justice Department is a March 1993 memo from Stephen
Colgate, Assistant Attorney General for Administration.
According to the
Colgate memo, Vice President Al Gore chaired a meeting with Hillary Clinton
crony Webster Hubbell, Janet Reno, Commerce Secretary Ron Brown and Leon
Panetta in March 1993. The topic of the meeting was the “AT&T Telephone
Security Device.”
According to Colgate,
AT&T had developed secure telephones the U.S. government could not tap. The
Clinton-Gore administration secretly contracted with AT&T to keep the
phones off the market. Colgate’s memo noted that the administration was
determined to prevent the American public from having private phone
“AT&T has
developed a Data Encryption Standard (DES) product for use on telephones to
provide security for sensitive conversations,” wrote Colgate.
“The FBI, NSA and NSC
want to purchase the first production run of these devices to prevent their
proliferation. They are difficult to decipher and are a deterrent to wiretaps.”
Buried in the Colgate
memo is the first reference to government-developed monitoring devices that
would be required for all Americans.
According to the March
1993 Colgate memo to Hubbell, “FBI, NSA and NSC want to push legislation which
would require all government agencies and eventually everyone in the U.S. to
use a new public-key based cryptography method.”
Al Gore quickly
embraced the Clipper chip and the concept of monitoring America at all costs.
In 1994, Gore wrote a glowing letter supporting the Clipper chip and the
government-approved wiretap design.
“As we have done with
the Clipper Chip, future key escrow schemes must contain safeguards to provide
for key disclosures only under legal authorization and should have audit
procedures to ensure the integrity of the system. We also want to assure users
of key escrow encryption products that they will not be subject to unauthorized
electronic surveillance,” wrote Gore in his July 20, 1994 letter to
Representative Maria Cantwell.
However, Gore lied. In
1994, federal officials were keenly aware that the Clipper chip design did not
have safeguards against unauthorized surveillance. In fact, NASA turned down
the Clipper project because the space agency knew of the flawed design.
In 1993, Benita A.
Cooper, NASA Associate Administrator for Management Systems and Facilities,
wrote: “There is no way to prevent the NSA from routinely monitoring all
[Clipper] encrypted traffic. Moreover, compromise of the NSA keys, such as in
the Walker case, could compromise the entire [Clipper] system.”
Ms. Cooper referred to
Soviet spy John Walker, who is serving life in prison for disclosing U.S. Navy
secret codes. In 1993 Ms. Cooper did not know of Clinton Chinagate scandals,
the Lippo Group, John Huang or Webster Hubbell, but her prophetic prediction
was not so remarkable in retrospect.
Yet, Al Gore pressed
ahead, continuing to support a flawed design despite warnings that the design
could “compromise” every computer in the U.S.
A 1996 secret memo on
a secret meeting of CIA Directer John Deutch, FBI Director Louis Freeh and
Attorney General Janet Reno states, “Last summer, the Vice President agreed to
explore public acceptance of a key escrow policy but did not rule out other
approaches, although none seem viable at this point.”
The article then goes
on to detail how the Gore team decided they would attempt to steer the Clipper
chip into foreign markets.? Funny how Gore said Bush’s surveillance is “a
threat to the very structure of our government” but his own plans were FAR more
intrusive.? Guess he has a short memory.”
The United States Naval Observatory (USNO) is one of the
oldest scientific agencies in the United
, with a primary mission[1] to
produce Positioning, Navigation and Timing (PNT)[2] for
the U.S.
 and the U.S. Department of Defense.
in Northwest Washington,
 at the Northwestern end of Embassy
, it is one of the pre-1900 astronomical observatories located in
an urban area; at the time of its construction, it was far from the light
thrown off by the (then-smaller) city center. The USNO operates
the “Master Clock“,[3] which
provides precise time to the GPS
 constellation run by the U.S.
Air Force
. The USNO performs radio VLBI-based positions
of quasars
with numerous global collaborators, in order to produce Earth
Orientation parameters
Aside from its scientific
mission, since 1974, the official residence of the Vice President of the United States has
been Number One Observatory Circle, a
house on the grounds of the Naval Observatory. [Alleged base for MitM attacks
on USNO and wrongful deaths of thousands of American citizens since Al Gore
moved in in 1993
Secretary of state was
using her unsecured private server
Published: 05/28/2015
at 7:38 PM
In the year prior to
the deadly 2012 Benghazi attack, Hillary Clinton used her private email server
to correspond about such highly sensitive national security matters as specific
threats to the Libya hotel where Ambassador Chris Stevens was staying as well
as his decision to remain at the hotel despite the threats.

emails, released May 22 by the State Department, also contained the exact
movements of Stevens while he was stationed in arguably one of the most
dangerous zones in the world for any American diplomat, a WND review has found.
On April 24, 2011,
Clinton’s senior aide, Huma Abedin, forwarded to Clinton’s personal email an
internal State email from that same day written by Timmy Davis and sent to
Abedin as well as to the State email addresses of other employees, including
Clinton’s then-foreign policy aide, Jacob Sullivan.
The email cited a local report stating hotels in Benghazi were being
The email, which ran
through Clinton’s personal server, stated the interim Libyan government “conducted a raid on a house/storage
facility and found and arrested an Egyptian cell reportedly there for the purpose of attacking hotels
Despite the threat,
the email revealed Stevens “still feels comfortable in the hotel,” meaning the
email exposed that the ambassador would continue to stay there.
“They are looking into
the idea of moving into a villa, but that is some way off,” the email
continued. “Based on discussion with DS yesterday, the hotel remains the safest
Startlingly, the email
contained information about Stevens’ exact movements, including that he “will be meeting with MFA in one hour and
will make a written request for better security at the hotel and for better
security-related coordination
On June 10, 2011, Sullivan
sent an email to Clinton’s personal address informing that “there is credible
threat info against the hotel that our team is using – and the rest of the
Intl community is using, for that matter.”
That email divulged:
“DS going to evacuate our people to alt locations. Info suggested attack in
next 24-48 hours. Will keep you posted.”
Yet another sent to
Clinton from Abedin detailed Stevens’ movements regarding his hotel stay
The envoy’s delegation is currently doing a phased checkout (paying the
hotel bills, moving some [Marine Corps?] comms to the
boat, etc.),” wrote Abedin.
“He (Stevens) will monitor the situation
to see if it deteriorates further, but no decision has been made on departure.
He will wait 2-3 more hours, then revisit the decision on departure.”
Digital Fires Instructor Serco –
Camp Pendleton, CA Posted 377 days ago
Uses information derived from
all military disciplines (e.g., aviation, ground combat, command and control,
combat service support, intelligence, and opposing forces) to determine changes
in enemy capabilities, vulnerabilities, and probable courses of action.”
Serco Wins Position on $199 Million Air Traffic Control Engineering and
Technical Support Services Multiple Award Contract
August 18, 2015
August 18, 2015 – Serco Inc., a provider of professional, technology, and
management services, announced today that the Company has received one of three
awards on a new Multiple Award Contract (MAC) supporting SPAWAR Systems Center
(SSC) Atlantic with Air Traffic Control (ATC) engineering and technical support
services for Navy and Marine Corps ATC Systems. This MAC has a ceiling value of
$199 million over a one-year base period and four one-year options periods, if
all options are exercised.
Serco will bid on task
orders to provide ATC engineering and technical support services to support
SPAWAR Systems Center Atlantic. The company will deliver specialized ATC
technical and integration support, configuration data management, and systems
maintenance for a broad range of complex ATC, Meteorology and Oceanography
(METOC) and Aviation Command, Control, Communications, Computers, Combat,
Intelligence Surveillance, and Reconnaissance (C5ISR) Systems. Work under the
contract will be performed at a Serco facility in Charleston, SC; and at Navy
and Marine Corps shore facilities worldwide including Antarctica and Southwest
“Serco takes pride in
the work and solutions we deliver to our customers and we are proud to continue
our support of SSC Atlantic Air Traffic Control operations,” said Kent Brown,
Vice President of Serco’s C4ISR Business unit. “We are honored to have been
awarded this contract and look forward to delivering shore-based Air Traffic
Control systems for the U.S. Navy and U.S. Marine Corps.”
About Serco Inc.: Serco
Inc. is a leading provider of professional, technology, and management
services. We advise, design, integrate, and deliver solutions that transform
how clients achieve their missions. Our customer-first approach, robust
portfolio of services, and global experience enable us to respond with
solutions that achieve outcomes with value. Headquartered in Reston, Virginia,
Serco Inc. has approximately 10,000 employees and annual revenue of $1.2
billion. Serco Inc. is a wholly-owned subsidiary of Serco Group plc, a $5.9
billion international business that helps transform government and public
services around the world. More information about Serco Inc. can be found
at www.serco-na.com.”
July 22, 2011
A Dutch building
demolition expert who went on record as saying he believed that World Trade
Center building Seven was brought down in a controlled demolition, has been
reported killed in a car accident.
Bloggers in the Netherlands have reported that Danny
Jowenko was killed instantly on Saturday when his car veered off the road and
collided head on into a tree. The reports state that Jowenko’s dog was found
alive in the car.
Jowenko was said to
have been driving home from church. It is not clear at this time what caused
the car to leave the road, according to the reports.
Jowenko is best known
in the 9/11 truth community for appearing in a video that first surfaced in
2006 on a Dutch television news program called, Zembla investigates 9/11
After being shown the
footage of WTC 7 collapsing Jowenko stated “This is a controlled demolition
carried out by a team of experts.”
At the time Jowenko
did not know that he was watching footage from September 11th 2001 and
responded in disbelief when the reporters explained what the footage was.
In 2007 reports began
to circulate that Jowenko had retracted his stance on the footage of WTC7,
however, he reaffirmed his previous opinion in a phone call with blogger Jeff
Hill, noting “When the FEMA makes a report that it came down by fire, and you
have to earn your money in the States as a controlled demolition company and
you say, ‘No, it was a controlled demolition’, you’re gone. You know?”
The original interview
with Danny Jowenko appears below, along with the 2007 phone call:
Telephone interview
with Jeff Hill 2/22/07:
Jeff Hill: I was just
wondering real quickly, I know you had commented on World Trade Center Building
7 before.
Danny Jowenko: Yes,
that’s right.
Jeff Hill: And I’ve
come to my conclusions, too, that it couldn’t have came down by fire.
Danny Jowenko: No, it
— absolutely not.
Jeff Hill: Are you
still sticking by your comments where you say it must have been a controlled
Danny Jowenko:
Jeff Hill: Yes? So,
you as being a controlled demolitions expert, you’ve looked at the building,
you’ve looked at the video and you’ve determined with your expertise that –
Danny Jowenko: I
looked at the drawings, the construction and it couldn’t be done by fire. So,
no, absolutely not.
Jeff Hill: OK, ’cause
I was reading on the Internet, people were asking about you and they said, I
wonder — I heard something that Danny Jowenko retracted his statement of what
he said earlier about World Trade Center 7 now saying that it came down by
fire. I said, “There’s no way that’s true.”
Danny Jowenko: No, no,
no, absolutely not.
Jeff Hill: ‘Cause if
anybody was — Like when I called Controlled Demolition here in North America,
they tell me that , “Oh, it’s possible it came down from fire” and this and
that and stuff like that –.
Danny Jowenko: When
the FEMA makes a report that it came down by fire, and you have to earn your
money in the States as a controlled demolition company and you say, “No, it was
a controlled demolition”, you’re gone. You know?
Jeff Hill: Yeah,
exactly, you’ll be in a lot of trouble if you say that, right?
Danny Jowenko: Of
course, of course. That’s the end of your — the end of the story.
Jeff Hill: Yeah,
’cause I was calling demolitions companies just to ask them if they used the
term, “Pull it” in demolition terms and even Controlled Demolitions,
Incorporated said they did. But the other people wouldn’t — didn’t want to talk
to me about Building 7 really because obviously ’cause they knew what happened
and they didn’t want to say it.”
Benghazi consulate attackers used military-style tactics, say US
Experts still unsure
whether assault that killed 4 Americans in Libya could have been prevented
BY MATT APUZZO AND KIMBERLY DOZIER September 22, 2012, 1:44 am 
… Wanis al-Sharef, who
was Libya’s deputy interior minister until he was fired after the attacks, said
a small group of lightly armed gunmen were the first to gather outside the compound.
They were then joined by a crowd of civilians protesting the film. Finally, a
larger group of heavily armed men arrived with gun vehicles and grenade
launchers. That final group was responsible for the siege.
Ansar al-Shariah has
repeatedly denied being any part of the attack, but eyewitnesses and security
officials said the group’s militiamen were among the gunmen who joined the
demonstration outside the compound. The group claimed its fighters were only in
the Benghazi area providing security at Jalaa Hospital. But that’s more than
three miles from the US compound, which lies on the outskirts of the city in a
rural area.
One witness said he
was detained by Ansar al-Shariah members during the protest because he was
taking pictures of one of their leaders.
Whoever they were, the
attackers stormed the main building and set it on fire. One US official
described the militants striking the front of the building first, distracting
security, while a second group struck then from the rear. Many people escaped
and fled to an annex to the east.
About an hour after
the assault began, American and Libyan forces retook control of the compound
and brought everyone to the annex. Rescue teams headed their way.
Intelligence indicates
the gunmen broke off into teams to block certain roads away from the compound,
officials said. Whether that changed the route or otherwise influenced how the
Americans moved through the streets remains unclear, but one US official said
the tactic was being looked at as an indication of battlefield strategy and
As the Americans
waited to be rescued from the annex, that building came under mortar fire.
Mortars are short-range bombs that launch in high arcs. Aiming them can be a
matter of trial and error. But US officials said mortars were landing directly
on the roof of the annex.
That, officials said,
indicated an experienced fighter, a well-planned assault or both.
Copyright 2012 The
Associated Press.”
22, 2015 WASHINGTON–(BUSINESS WIRE)–The American Council for Technology and
Industry Advisory Council (ACT-IAC), the premier public-private partnership in
the government IT community, today honored Jackie Robinson-Burnette, Associate
Administrator of 8(a) Business Development, HQ Small Business Administration (SBA),
and Darryl Scott, Director of Partner Relations, Serco, with the annual Small
Business Advocacy Award.

Presented at ACT-IAC’s Small Business Conference (SBC) luncheon, the award
recognizes Ms. Robinson-Burnette and Mr. Scott for their work in promoting the
growth and development of small businesses in the federal marketplace. The
Small Business Advocacy Award is an honor ACT-IAC awards to one government and
one industry professional who have made substantial contributions to small
businesses in the IT community.

Ms. Robinson-Burnette was named the Associate Administrator, SBA in December
2014. Prior to joining the SBA, she served in the Pentagon as a Deputy
Director, Office of the Secretary of the Army, Office of Small Business
Programs. In this position with over $16 billion in annual contract awards to
small firms, Ms. Robinson-Burnette managed the largest federal small business
program in the country. During her time with the Army, she provided leadership
and guidance to a network of over 200 military and civilian small business

Mr. Scott has consistently championed the cause of small business within Serco
by encouraging executive leadership to make it a priority to meet or exceed all
small business commitments. Since Mr. Scott took on the role of Director of
Small Business Partner Relations in 2009, Serco has consistently met or
exceeded the Government’s small business subcontracting goals in ALL small
business categories. Through his 30-year career, he has tirelessly worked towards
advancing the interests of the small business community.

Launched in 2007, SBC is the unrivaled forum for new and established small and
large businesses to come together to further align with the needs of government

ACT-IAC is the premier public-private partnership in the government IT
community and an example of how government and industry work together. ACT-IAC
is a nonprofit educational organization created to advance government through
collaboration and education. The organization provides an objective, vendor and
technology-neutral and ethical forum where government and industry are working
together to develop innovative strategies, effective and efficient solutions
and best practices. Headquartered in the Greater Washington, D.C. area, ACT-IAC
also has chapters in Pacific region (based in San Diego) and the Rocky Mountain
region (based in Denver).”

EXCLUSIVE: Hillary’s email firm was run from a loft apartment with its
servers in the BATHROOM, raising new questions over security of sensitive
messages she held
Democratic White House
front-runner used Platte River Networks of Denver, Colorado, to maintain her
controversial ‘home brew’ server
Up to 60 emails with
classified material have been found in a sample of those she did not delete – meaning
there could be many more
Now Daily Mail Online
reveals new questions over security of her emails when Platte River was
involved in maintaining server
‘Mom and pop’ firm
used converted residential apartment and had its own servers in a bathroom closet 
Links between ‘local’
IT company and Clinton remain unclear but its VP of sales and marketing, who
was sued for ‘fraud’ is said to be ‘big Democrat’
GMT, 18 August 2015 | UPDATED: 14:17 GMT, 18 August 2015”
Jamie Bartlett
I have heard rumors
about this website, but I still cannot quite believe that it exists. I am
looking at what I think is a hit list.
There are photographs
of people I recognize—prominent politicians, mostly—and, next to each, an
amount of money. The site’s creator, who uses the pseudonym Kuwabatake Sanjuro,
thinks that if you could pay to have someone murdered with no chance—I mean
absolutely zero chance—of being caught, you would.
That’s one of the
reasons why he has created the Assassination Market.
There are four simple
instructions listed on its front page:
Add a name to the list
Add money to the pot
in the person’s name
Predict when that
person will die
Correct predictions
get the pot
The Assassination
Market can’t be found with a Google search. It sits on a hidden, encrypted part
of the internet that, until recently, could only be accessed with a browser
called The Onion Router, or Tor. Tor
began life as a U.S. Naval Research Laboratory project, but today exists as a
not-for-profit organization, partly funded by the U.S. government and various
civil liberties groups [100 Women in Hedge Funds], allowing millions of people
around the world to browse the internet anonymously and securely.

To put it simply, Tor
works by repeatedly encrypting computer activity and routing it via several
network nodes, or “onion routers,” in so doing concealing the origin,
destination, and content of the activity. Users of Tor are untraceable, as are
the websites, forums, and blogs that exist as Tor Hidden Services, which use
the same traffic encryption system to cloak their location.
The Assassination
Market may be hosted on an unfamiliar part of the net, but it’s easy enough to
find, if you know how to look. All that’s required is simple (and free) Tor
software. Then sign up, follow the instructions, and wait. It is impossible to
know the number of people who are doing exactly that, but at the time of
writing, if I correctly predict the date of the death of Ben Bernanke, the
former chairman of the Federal Reserve, I’d receive approximately $56,000. It
may seem like a fairly pointless bet. It’s very difficult to guess when someone
is going to die. That’s why the Assassination Market has a fifth instruction:
Making your prediction
come true is entirely optional”
Time Protocol (NTP) is a networking protocol for 
clock synchronization between
computer systems over 
latency data networks. In operation since before 1985, NTP is one
of the oldest 
 in current use.
NTP was originally designed by 
David L. Mills of the University
of Delaware
, who still oversees
its development.  … While no one doubts
the contribution of NTP to network performance, several security concerns have
arisen in late 2014. Previously, researchers became aware that NTP servers can
be susceptible to 
 unless packets are
cryptographically signed for authentication.
[27] The computational overhead involved can make this impractical on
busy servers, particularly during
denial of service attacks.[28] NTP message spoofing can
be used to move clocks on client computers and allow a number of attacks based
on bypassing of cryptographic key expiration.
The Duke and Duchess of Cambridge and the £1.3 trillion hedge fund
In their elegant
ballgowns, they could be among the guests at any charity reception hosted by
the Duke and Duchess of Cambridge.
 By David Harrison and Claire Duffin
8:00AM BST 23 Oct 2011
In fact, these are
some of the most powerful and influential individuals to have gathered at St
James’s Palace. All leading figures in finance, they help to control assets
totalling £1.3 trillion.
The 14 women posed
with the royal couple at a gala evening this month which raised £675,000 for
charity. Now their identities and the extraordinary wealth for which they are
responsible can be revealed.
They range from the
senior executive at one of the world’s biggest banks who competes in triathlons
in her spare time, to the investment consultant who admits to owning 110 pairs
of shoes.
The event marked a
rare foray into the public arena for the women. Several are heads of hedge
funds, the secretive investment vehicles which put money into complex financial
schemes and can profit in a downturn by effectively betting on markets falling.
Others are executives
at banks or asset management companies. Among them are chief executives,
presidents, directors, and consultants. Members cover a range of nationalities,
reflecting the cosmopolitan nature of the industry.
All are senior figures
in 100 Women in Hedge Funds, a philanthropic organisation. The duke became a
patron last year, and 100WHF will raise money for charities he is associated
with; this month’s gala supported the Child Bereavement Charity.
The link-up suggests
that the Duke and Duchess are following the lead of the Prince of Wales in
ensuring that their charitable initiatives win support from wealthy and
influential figures.
100WHF, which has
branches around the world, has raised millions of pounds for causes including
women’s health, education and mentoring.
Anne Popkin, chair of
the organisation’s global board, flew over from San Francisco for the London
event. She said: “It is wonderful to raise such an amount. The reason we
work so well with His Royal Highness is our aims and his aims are the
In a letter to 100WHF,
the Duke wrote: “It is a privilege for me to be Patron of this exciting
Left-to-right in
1) Anne Popkin, 46:
President of San Francisco-based Symphony Asset Management, founded in 1994,
which manages assets of £5.65 billion. Lives in San Francisco and chairs
100WHF’s global board. Previously a managing director at Lehman Brothers.
Studied maths and economics at Harvard, has an MBA from Northwestern University
and studied for a diploma in art history at Oxford University in 1991.
2) Amanda Pullinger.
45: Chief executive of Pullinger Management in New York. Executive director of
100WHF. Studied modern history at Oxford University where she was a
contemporary of David Cameron. Originally from Solihull, has lived in New York
for 24 years. Fan of Downton Abbey.
3) Effie Datson, 41:
Head of foreign exchange and global macro prime brokerage for Deutsche Bank,
which has managed assets of £480 billion. Previously worked at IKOS and Goldman
Sachs. London Board Chair of 100WHF. Has a degree in social sciences and MBA,
both from Harvard. Lives with husband Edwin, a venture capitalist, in a £1
million flat in Battersea, southwest London. Competes in triathlons.
4) Claire Smith, 48:
Research analyst and partner with Albourne Partners, independent global
advisers whose 200 clients worldwide have an estimated £145 billion invested in
hedge funds. Works from home in Geneva.
5) Kathryn Graham, 39:
Director of BT Pension Scheme Management in London, BT’s pensions advisory arm,
the largest scheme in the UK at £34 billion. Has an MA in economics and
mathematics from Edinburgh University. Trustee of hedge fund standards board in
6) Roxanne Mosley
Sargent, 43: Previously co-head of sales and marketing at Armajaro Asset
Management, formerly head of hedge fund capital group for Europe at Deutsche
Bank. MBA from Harvard. Married with young children, lives in Notting Hill,
west London.
7) Kristen Eshak
Weldon, 33: Managing director of Blackstone Group International Partners which
has £99 billion of managed assets. 100WHF London board member. Previously
worked at JP Morgan. Studied at Georgetown University, Washington DC.
Originally from Houston, Texas and now living in London. Likes designer fashion
labels including Diane von Furstenberg, Max Mara and Donna Karan.
8) Natasha Sai, 35, a
managing director with the banking giant Goldman Sachs, America’s 5th largest
bank by revenue, which has £515 billion of managed assets. Lives in
Hammersmith, west London. Featured in a 2001 Sky One series called The Real Sex
in the City, about the lives of single girls in New York.
9) Sonia Gardner, 49: Moroccan-born president and co-founder,
Avenue Capital Group, a global investment firm with £12.5 billion of managed
assets. Made a donation to Hillary Clinton’s New York Senate re-election
campaign. Mrs Clinton’s daughter Chelsea joined Ms Gardner’s Avenue Capital
Group in 2006. [Steering Trump Entertainment Resorts Inc. out of bankruptcy
protection; allegedly with the proceeds of online assassination betting!!!]
10) Stephanie Breslow:
partner and co-head of the investment management group at Schulte Roth &
Zabel, a New York law firm with an office in London. Lives in New York with
husband and two stepchildren. Graduate of Columbia University School of Law. Is
on the advisory board of the Columbia
Law School’s Gender and Sexuality Centre
11) Mindy Posoff, 51:
Founder, Traversent Capital Partners, a consultancy for hedge funds and asset
managers. Also managing director of Golden Seeds, dedicated to investing in
young companies founded or led by women. Former director of Credit Suisse.
Likes Queen Latifah, the American rapper.
12) Carol Kim:
managing director, the Blackstone Group, based in Hong Kong. Previously based
in New York as a Vice President in the Absolute Return Strategies Group at
Lehman Brothers. 100WHF co-founder and board director. Has a BA in Urban and
Economic Studies from the University of Toronto.”
Serco’s Office of Partner Relations (OPR)
helps facilitate our aggressive small business utilization and growth
 Through the OPR, Serco mentors four local small
businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base
One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth
sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were
awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring

Base One Technologies – Corporate
Strategy – We are a Government Certified Women-Owned Business
We practice Diversity
Recruitment and Staffing for IT positions

Base One was founded in 1994 by a women engineer who had made a career in
technology research for many years. Base One has been very successful in
focusing on diversity recruiting and staffing for IT projects. It has been our
experience that the greater the diversity mix, the more creative the solution.
As in any field the more diverse the viewpoint the more thorough your analysis.
Our engineers can think out of the box. 

Because of our affiliations we have access to pools of resources among more
diverse groups & individuals. We work with a large pool of minority
professionals who specialize in IT skills. We are able to have access to these
resources through our status as a D/MWBD firm and our affiliations. These
affiliations assist us in working with resources among more diverse groups
& individuals.

We are also partnered with firms that are 8A certified as Minority firms,
Disabled Veteran firms, Native American firms, Vietnam veteran firms, women
owned firms.

Key Clients Benefiting
From Our Information Security Expertise: Pentagon Renovation Program,
 Citigroup, MCI.

Base One technologies

Expertly researches, designs, and develops information security policies that
protect your data and manage your firm’s information technology risk at levels
acceptable to your business. 

Performs architectural assessments and conducts both internal and external
penetration testing. The results of these efforts culminate in an extensive
risk analysis and vulnerabilities report. 

Develops, implements and supports Information Security Counter measures
such as honey-pots and
evidence logging and incident documentation processes and solutions.”

“The 8(a) Business Development Program assists in the development of small businesses owned and operated by individuals who are socially and economically disadvantaged, such as women and minorities. The following ethnic groups are classified as eligible: Black Americans; Hispanic Americans; Native Americans (American Indians, Eskimos, Aleuts, or Native Hawaiians); Asian Pacific Americans (persons with origins from Burma, Thailand, Malaysia, Indonesia, Singapore, Brunei, Japan, China (including Hong Kong), Taiwan, Laos, Cambodia (Kampuchea), Vietnam, Korea, The Philippines, U.S. Trust Territory of the Pacific Islands (Republic of Palau), Republic of the Marshall Islands, Federated States of Micronesia, the Commonwealth of the Northern Mariana Islands, Guam, Samoa, Macao, Fiji, Tonga, Kiribati, Tuvalu, or Nauru); Subcontinent Asian Americans (persons with origins from India, Pakistan, Bangladesh, Sri Lanka, Bhutan, the Maldives Islands or Nepal). In 2011, the SBA, along with the FBI and the IRS, uncovered a massive scheme to defraud this program. Civilian employees of the U.S. Army Corps of Engineers, working in concert with an employee of Alaska Native Corporation Eyak Technology LLC allegedly submitted fraudulent bills to the program, totaling over 20 million dollars, and kept the money for their own use.[26] It also alleged that the group planned to steer a further 780 million dollars towards their favored contractor.[27]”

“On October 6, 2000, the NMCI contract was awarded to Electronic Data Systems (EDS), now HP Enterprise Services (HP).[11] Secretary of the Navy Gordon England summed up the Navy’s IT Environment prior to the commencement of NMCI: “We basically had 28 separate commands budgeting, developing, licensing, and operating IT autonomously. It was inefficient and from the larger Department perspective, produced results that were far from optimal.”[12]


NMCI consolidated roughly 6,000 networks—some of which could not e-mail, let alone collaborate with each other—into a single integrated and secure IT environment. HP updated more than 100,000 desktop and laptop PCs in 2007.[13] The program also consolidated an ad hoc network of more than 8,000 applications to 500 in four years and 15,003 logistics and readiness systems to 2,759 over a two-year period.[14

Sub-contractors to HP include:

Harris Corporation (which acquired Multimax formerly known as Netco Government Services and WAM!NET), which provided enterprise network infrastructure design and support until its contract expired in 2014.[16]

Verizon, which provides wide area network (WAN) connectivity. 

HP also provides the security services once provided by Raytheon.


“HP also has worked with more than 400 small businesses, with 5 percent for small disadvantaged businesses, 5 percent for women-owned small businesses and 1.5 percent for HUBZone small businesses. Since its inception, NMCI has exceeded the minimum 40% small business objective set for the contract.[17]


The Department of the Navy has shown no desire to scale back or cancel the program. On 24 March 2006 the Navy exercised its three-year, $3 billion option to extend the contract through September 2010.[1]

In April 2006, users began to log on with Common Access Cards (CACs), a smartcard-based logon system called the Cryptographic Log On (CLO). In October 2008, NMCI’s prime contractor HP posted a set of procedures so Apple Mac users can access NMCI’s public-facing Web services, such as the e-mail and calendar functions, using their CAC readers with their Macs. The workaround also works with other Defense Department CAC-enabled networks.[27] Alternatively, NMCI and all other CAC-authenicated DoD websites may be accessed using LPS-Public.” 

“Government still paying G4S and Serco millions for tagging despite ban Alan Travis Home affairs editor 

Thursday 25 June 2015 00.01 BST 

The Ministry of Justice is still paying security firms G4S and Serco millions of pounds every month for supplying electronic tagging equipment, more than a year after both companies were barred from running the contract.

Both companies faced criminal investigations by the Serious Fraud Office over allegations of overcharging that led to them repaying nearly £180m. 

The continuing monthly payments to the two companies were uncovered by an analysis of Ministry of Justice (MoJ) data by the Centre for Crime and Justice Studies which shows that G4S was paid a total of £8.7m between March 2014 – when it lost the tagging contract – and February 2015. Serco was paid £4.5m over the same period.

The electronic monitoring tags are used to enforce curfews on more than 100,000 offenders each year. The outsourcing giant Capita took over the contract on an interim basis in April last year. 

In July 2014, Capita and three other companies were named as the winners of a £265m six-year contract to supply the next generation of satellite tracking tags, which would allow dangerous and repeat offenders to be monitored around the clock.”

Serco… Would you like to know more?

SWISSLEAKS – “HSBC developed dangerous clients: arms merchants, drug dealers, terrorism financers”

Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! (Mobile Playback Version) [HSBC is Serco’s drug-hub Silk Road banker and a major shareholder with the 9/11 8(a) lenders including Her Majesty’s Government and JPMorgan]


Yours sincerely,
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation

448 Total Views 1 Views Today
Please follow and like us:

Related Post

One comment