#2449: Serco Long-Range Death Bets On JFK – Marines’ 8(a) Spot-Fixing Clocks – Cameron’s Refugee Herders Use Clinton Servers
1. IT IS ASSERTED THAT SERCO – FORMERLY RCA GB 1929 – equipped a long-range death-betting group with Telstar communications timing signals used to synchronize shots fired by assassins in the sniper team which killed President John F. Kennedy on November 22, 1963.
2. IT IS ASSERTED THAT FORMER MARINE CORPS GENERAL JAMES JONES has equipped Serco 8(a) companies with Coordinated Universal Time (UTC) clocks to spot-fix mass-casualty events through an ‘Arc of Instability’ (cf. Columbia University’s Cloward-Piven Strategy).
3. IT IS ASSERTED THAT PAY TO PLAY ASSOCIATES OF DAVID CAMERON in the Clinton Foundation use Navy/Marine Corps Intranet servers to synchronize long-range attacks and hire Serco 8(a) security teams to herd panicked refugees and overwhelm EU member states.
United States Marine Field McConnell (https://abeldanger.blogspot.com/2010/01/field-mcconnell-bio.html) is writing an e-book “Shaking Hands With the Devil’s Clocks“.
McConnell invites readers to e-mail him images (examples below) and develop a proof by contradiction that Serco’s long-range groups used Telstar to spot fix the time of JFK’s death in 1963 and are currently using UTC clocks to synchronize mass-casualty events in the Marine Corps’ Arc of Instability and 8(a) companies to herd refugees in order to destabilize or even overwhelm EU member states.
“The Special Air Service was a unit of the British Army during the Second World War, formed in July 1941 by David Stirling and originally called “L” Detachment, Special Air Service Brigade—the “L” designation and Air Service name being a tie-in to a British disinformation campaign, trying to deceive the Axis into thinking there was a paratrooper regiment with numerous units operating in the area (the real SAS would ‘prove’ to the Axis that the fake one existed). It was conceived as a commando force to operate behind enemy lines in the North African Campaign and initially consisted of five officers and 60 other ranks. Its first mission, in November 1941, was a parachute drop in support of the Operation Crusader offensive. Due to German resistance and adverse weather conditions, the mission was a disaster: 22 men, a third of the unit, were killed or captured. Its second mission was a success: transported by the Long Range Desert Group, it attacked three airfields in Libya, destroying 60 aircraft with the loss of 2 men and 3 Willys MB. In September 1942 it was renamed 1st SAS, consisting at that time of four British squadrons, one Free French, one Greek, and the Folboat Section. ….
The special projects team is the official name for the Special Air Service anti–hijacking counter–terrorism team.It is trained in Close Quarter Battle (CQB) and sniper techniques and specialises in hostage rescue in buildings or on public transport. The team was formed in the early 1970s after Prime Minister Edward Heath asked the Ministry of Defence to prepare for any possible terrorist attack similar to the massacre at the 1972 Summer Olympics and ordered that the SAS Counter Revolutionary Warfare (CRW) wing be raised.
Once the wing had been established, each squadron rotated on a continual basis through counter–terrorist training including hostage rescue, siege breaking, and live firing exercises—it has been reported that during CRW training each soldier expends as many as 100,000 pistol rounds. Squadrons refresh their training every 16 months, on average. The CRW’s first deployment was during the Balcombe Street Siege. The Metropolitan Police had trapped a PIRA unit; it surrendered when it heard on the BBC that the SAS were being sent in.
The first documented action abroad by the CRW wing was assisting the West German counter-terrorism groupGSG 9 at Mogadishu. In 1980 the SAS were involved in a hostage rescue during the Iranian Embassy Siege.”
“James Earl Files (born January 24, 1942), also known as James Sutton,[a] is an American prisoner at the Danville Correctional Center in Danville, Illinois who stated in a 1994 interview that he was the “grassy knoll shooter” in the assassination of United States President John F. Kennedy. Files has subsequently been interviewed by others and discussed in various books pertaining to the assassination and related theories.
In 2010, Playboy magazine published an article by Hillel Levin in which Files also implicated Charles Nicoletti and John Roselli in the assassination of Kennedy.
Files, who changed his name from Jimmy Sutton, was born in Alabama 24 January, 1942, and after his tour of duty in the United States Army became a hired assassin jointly managed by the Chicago underworld and the CIA.
Between the 1963 JFK assassination and his 1991 arrest, not much is known. Files is said to have relocated from Alabama to California with his family. Shortly thereafter, then to an Italian neighborhood in Chicago. Files was convicted in the attempted murder of two police officers during a roadside shootout in 1991, and sentenced to fifty years.
In the early 1990s an “anonymous FBI source,” later identified as Zack Shelton, was reported by researchers as having told Joe West, a private investigator in Houston, about an inmate in an Illinois penitentiary having peculiar information about the Kennedy assassination. On August 17, 1992, West interviewed Files at Stateville Correctional Center in Crest Hill, Illinois. Two decades after the JFK assassination, Files told West he would confess to Kennedy’s killing conditional to immunity from prosecution. Negotiating on Files’ behalf, West died in 1993. After his death, West’s family requested a friend, Houston television producer Bob Vernon, assume control over records concerning the Files revelations.
Notable Warren Report stalwart Dr. John C. McAdams, who describes himself “a debunker by temperament,” complains Files changed his story. Yet another Warren Report stalwart, Vincent Bugliosi, author of Reclaiming History: The Assassination of President John F. Kennedy characterized Files as the “Rodney Dangerfield of Kennedy assassins” and discounted his testimony as a fabrication. As per Bugliosi, few amongst those who believe the Warren Report to be defective respect him.
In the aftermath of Barry Katz‘s 2014 blockbuster documentary “I Killed JFK” which delved into Files’ shadowy world as an asset jointly managed and operated by CIA analysts and Chicago underworld organized crime handlers, an ever increasing number of scholars and researchers argue otherwise: that Files’ testimony never wavered; that his account has proven more credible and tenable than the far-fetched version bolstered by the FBI and the Warren Commission. In the aforementioned documentary Files adamantly insists he was the shooter, that he fired an exploding round from the grassy knoll, that the gun he used to kill President Kennedy was an experimental bolt action .221 Remington Fireball specifically designed to “kill varmints at distances hand-gunners never thought possible,” that he deliberately left forensic evidence, biting down upon the spent shell casing which killed the President, before departing setting it upon the fence from where he fired, that Lee Harvey Oswald was not as assassin, but actually a CIA provocateur encharged the planting of false evidence who was assigned to the CIA’s abort team for the JFK assassination, that Oswald never fired a shot, that the rifle identified in the Warren Report as the weapon used by Oswald was wholly inappropriate in that it was not a high velocity rifle sufficient for the intricacies of so complex an assassination, and that Oswald was hand chosen as the individual mutually agreed upon by Chicago underworld figures and high ranking defense-intelligence officials, to be the designated fall guy for the JFK assassination.
Associate Professor Emeritus from Santa Clara University, Dr. Jerome Kroth attributes Files as “surprisingly credible,” contending his to be “the most believable and persuasive” testimonial on the JFK assassination, to date. In 1987, a man and his son discovered a casing of the same caliber behind the fence exactly where Files claimed he was positioned, on the grassy knoll. 24 years buried four inches underground, dental forensics experts confirmed an indentation on the casing was indeed made, by human teeth.”
“Telstar is the name of various communications satellites. The first two Telstar satellites were experimental and nearly identical. Telstar 1 launched on top of a Thor-Delta rocket on July 10, 1962. It successfully relayed through space the first television pictures, telephone calls, and fax images, and provided the first live transatlantic television feed. Telstar 2 launched May 7, 1963. Telstar 1 and 2—though no longer functional—still orbit the Earth. …
That evening, Telstar 1 also relayed the first telephone call transmitted through space, and it successfully transmitted faxes, data, and both live and taped television, including the first live transmission of television across an ocean from Andover, Maine, US to Goonhilly Downs, England and Pleumeur-Bodou, France.[clarification needed] (An experimental passive satellite, Echo 1, had been used to reflect and redirect communications signals two years earlier, in 1960.) In August 1962, Telstar 1 became the first satellite used to synchronize time between two continents, bringing the United Kingdom and the United States to within 1 microsecond of each other (previous efforts were only accurate to 2,000 microseconds).”
“Will Serco run an online assassination betting shop for a Catherine Ashton SOE to keep UK in EU?
Serco awarded new European External Action Service IT contract
Serco has secured a new service contract to deliver a central management service for IT classified systems. The services will be delivered in Brussels with all staff executing the service holding security clearance up to ‘Secret UE’ level to access the classified zones. The duration of the contract is 4 years and it is valued at 9,000,000 EUR.
The European External Action Service is the European Union’s diplomatic corps. It supports the EU foreign affairs chief (High Representative for Foreign Affairs and Security Policy, Catherine Ashton) in conducting the common foreign and security policy. It has Delegations around the world working on behalf of the people of Europe and representing the EU as a whole. The EEAS manages the EU’s response to crises, has intelligence capabilities and cooperates with the European Commission in areas which it shares competence with.”
“Clintons personally paid State Department staffer to maintain server
What we know about Hillary Clinton’s e-mail server
The FBI is investigating the security of Hillary Clinton’s private e-mail server.
Here’s what we know about the server, who kept it secure and how that’s changed.
(Gillian Brockell/The Washington Post)
By Rosalind S. Helderman and Carol D. Leonnig
Hillary Rodham Clinton and her family personally paid a State Department staffer to maintain the private e-mail server she used while heading the agency, according to an official from Clinton’s presidential campaign.
The unusual arrangement helped Clinton retain personal control over the system that she used for her public and private duties and that has emerged as an issue for her campaign. But, according to the campaign official, it also ensured that taxpayer dollars were not spent on a private server that was shared by Clinton, her husband and their daughter as well as aides to the former president.
That State Department staffer, Bryan Pagliano, told a congressional committee this week that he would invoke his Fifth Amendment rights against self-incrimination instead of testifying about the setup.
The private employment of Pagliano provides a new example of the ways that Clinton — who occupied a unique role as a Cabinet secretary who was also a former and potentially future presidential candidate — hired staff to work simultaneously for her in public and private capacities.
Cheryl Mills, Clinton’s chief of staff, and Huma Abedin, a close confidant [body woman] who served as deputy chief of staff, both spent time working for the State Department, the Clinton Foundation or the Clintons personally.
Pagliano’s employment by the Clintons was confirmed by a campaign official in response to questions from The Washington Post. The official spoke on the condition of anonymity because of the sensitivity of the matter. A campaign spokesman declined to provide a statement.
Pagliano had served as the IT director of Clinton’s 2008 presidential campaign and then worked for her political action committee.
The Clintons paid Pagliano $5,000 for “computer services” prior to his joining the State Department, according to a financial disclosure form he filed in April 2009.
But even after arriving at State in May 2009, Pagliano continued to be paid by the Clintons to maintain the server, which was in their Chappaqua, N.Y., home, according to the campaign official and another person familiar with the arrangement. That person spoke on the condition of anonymity because the matter is under investigation.
The private pay arrangement has not previously been reported. The State Department has declined to answer questions about whether the private system was widely known within the agency or officially approved.
Takeaways from Hillary Clinton’s e-mails
Clinton has come under fire for using a private e-mail address during her time as secretary of state. The e-mails are being screened and released in batches. Here are some things we’ve learned from them.
Asked in early August about whether Pagliano had been paid privately to maintain the server, a State Department official said that the agency had “found no evidence that he ever informed the department that he had outside income.”
This week, a different State Department official said he could not clarify Pagliano’s pay situation, citing “ongoing reviews and investigations” of Clinton’s e-mail setup.
Pagliano did not list the outside income in the required personal financial disclosures he filed each year. The State Department has said Pagliano concluded his full-time service in February 2013, which coincides with Clinton’s departure as secretary. He remains a State Department contractor doing work on “mobile and remote computing functions,” according to a State Department spokesman.
Pagliano’s attorney, Mark MacDougall, declined to comment.
MacDougall sent a letter Monday to the House Select Committee on Benghazi, which had subpoenaed Pagliano, informing the panel that his client would invoke his constitutional rights not to answer questions.
There are multiple congressional inquiries into Clinton’s e-mail use, and the FBI is looking into the security of the setup.
A spokeswoman for the Senate Judiciary Committee, which was inquiring about Pagliano’s outside employment, said that Pagliano’s lawyer informed the committee that his client would invoke his Fifth Amendment rights.
Lawmakers interested in hearing Pagliano’s account of the server’s setup and security protocols are considering whether to offer him immunity in exchange for his testimony. If they take the step, Pagliano would be compelled to appear.
State Department officials have declined to explain which agency officials knew about Clinton’s server and whether any had raised questions or concerns about how it was being handled.
“My unsatisfactory but necessary answer to that is, again, that’s not our role in this process to really answer that question publicly; that there are reviews and investigations underway that will look at possibly some of these issues is for other entities to speak to,” State Department spokesman Mark Toner told reporters this week.
Asked by NBC’s Andrea Mitchell on Friday whether anyone in her inner circle ever expressed concern about the setup, Clinton responded, “I was not thinking a lot when I got in.”
“There was so much work to be done,” Clinton continued. “We had so many problems around the world. I didn’t really stop and think — what — what kind of e-mail system will there be?”
E-mails released this week show that members of the State Department IT department’s help desk were unaware of the setup and sought information about why a correspondent was getting a “fatal error” when sending messages to Clinton’s address. The tech support team “didn’t know it was you,” an aide e-mailed Clinton.
Federal regulations allow employees at Pagliano’s level to have outside employment but require that the extra income not exceed 15 percent of their government salary. Employees must also ensure that their outside work not create a conflict of interest with their government job.
By early 2013, as Clinton was preparing to conclude her time as secretary of state, she was looking to upgrade the system’s security and durability, people briefed on the server have said. The system had crashed for days during Hurricane Sandy in October 2012, disrupting her e-mail abilities.
To find a company to take over for Pagliano, the Clintons turned to Tania Neild, a technology broker [and partner of Serco 8(a) protégée company Base One Technologies – an alleged front for honey traps built with State Department insiders since before the Rwanda Genocide] whose company, InfoGrate, is in Bronxville, N.Y., about 20 miles from their home.
In January 2013, weeks before Clinton’s departure from Foggy Bottom, Neild alerted a small Denver-based technology firm, Platte River Networks, to a possible contract, according to Andy Boian, a spokesman for the tech firm.
Boian said Neild’s notice included no reference to the Clintons and the company submitted a proposal for the work without knowing the identity of the famous potential client.
Boian said the company learned that it might be working for the former president and former secretary of state in mid-February of 2013, when executives were told that they were finalists for the work. The Clintons hired Platte River that June. The company has said it moved the Clintons’ server at that time from the couple’s home to a data storage facility in New Jersey, where it sat until it was turned over to the FBI last month.
Neild said in an interview with The Post that she could not confirm that she worked for the Clintons because all of her clients have nondisclosure agreements about their work.
But she said her business is helping wealthy families manage private servers and e-mail systems, and she confirmed that she works regularly with Platte River Networks.
“They are a company with the utmost integrity,” Neild said.
This story has been updated.
Tom Hamburger, Karen Tumulty and Alice Crites contributed to this report.”
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation