#2479: Serco’s 8(a) Death Pool Dynasties – Clinton First Strike Carbon Footprints –Trudeau VIP planes in Mineta 9/11
1. AD ASSERTS THAT SERCO AND ITS 8(A) PROTÉGÉES ARE OPERATING DEATH POOL SERVICES FOR THE DYNASTIC FAMILIES which extort concessions from governments to maintain their inter-generational wealth, power and degenerate life styles.
2. AD ASSERTS THAT THE CLINTON FOUNDATION DEATH POOLS USE SERCO TO THREATEN 5-EYES COUNTRIES WITH FIRST CBRN-STRIKE ATTACKS UNLESS THEIR ALLIES REDUCE THEIR CARBON FOOTPRINT.
3. AD ASSERTS THAT THE LATE PIERRE TRUDEAU’S VIP AIRCRAFT WERE FITTED WITH E/W CLOCKS TO FIX TIMELINES DURING THE NORMAN MINETA WAR GAME OF 9/11 where Serco 8(a) agents allegedly removed evidence of death-pool murder for hire.
United States Marine Field McConnell (http://www.abeldanger.net/2010/01/field-mcconnell-bio.html) is writing an e-book “Shaking Hands With the Devil’s Clocks” and invites readers to e-mail him images (examples below) for a proof by contradiction of the three assertions above.
As we made our way to the van waiting to take us to the airport, we learned from our deputy minister in Ottawa, Margaret Bloodworth, that a second plane had hit the other tower. Before too long there would be confirmation of two more crashes, at the Pentagon and a field in eastern Pennsylvania. Departmental contacts in Washington said all airports may be closed. We knew this was a crisis and agreed to head back to Ottawa, about a two-hour drive.
This was unprecedented, and I had a sinking feeling. Should we follow the American lead? What should we do about the flights in international air space that were now approaching Canada? It was a logistical nightmare: Mineta’s order was issued at 9.45 Eastern Daylight Time—”rush hour” over the Atlantic. More than 500 planes with an estimated 75,000 people on board were en route to North America.
Just before 1 p.m. I went back to my office. My executive assistant, Sue Ronald, said I should watch the news. As the first crash appeared on the screen, my chest tightened at the sight of the impact, followed by the unbelievable belching up of fire and smoke. Then the second tower was hit, followed by the image of both towers crumbling in one last gasp to the ground. I looked out the window of my office toward the Parliament Buildings and the majestic Peace Tower and tears welled up. I abruptly switched the television off. It would be wrong to be caught up in the emotion. I needed to make dispassionate, reasoned judgments. There would be time to grieve later.
At Transport Canada, we were being inundated with calls from media outlets. We argued with the communications people in the Prime Minister’s Office that someone needed to give a detailed response not only to the media but to families of stranded travellers. There was considerable push back. By 6 p.m., we had received more than 225 requests, and we needed to get answers out. Finally, we told them we were going ahead and sent out a news release in time for evening newscasts and morning newspapers.
The expected result is an immediate irreversible escalation of hostilities resulting in both combatants’ mutual, total and assured destruction. The doctrine requires that neither side construct shelters on a massive scale, such as there are in Switzerland. If the US were to construct a similar system of shelters, it would violate the MAD doctrine and destabilize the situation, because it would not need to fear the consequences of a Soviet second strike. The same principle is invoked against missile defense.
The doctrine further assumes that neither side will dare to launch a first strike because the other side will launch on warning (also called fail-deadly) or with surviving forces (a second strike), resulting in unacceptable losses for both parties. The payoff of the MAD doctrine was and still is expected to be a tense but stable global peace.
The primary application of this doctrine started during the Cold War (1940s to 1991) in which MAD was seen as helping to prevent any direct full-scale conflicts between the United States and the Soviet Union while they engaged in smaller proxy wars around the world. It was also responsible for the arms race, as both nations struggled to keep nuclear parity, or at least retain second-strike capability. Although the Cold War ended in the early 1990s, the MAD doctrine continues to be applied.
Proponents of MAD as part of U.S. and USSR strategic doctrine believed that nuclear war could best be prevented if neither side could expect to survive a full-scale nuclear exchange as a functioning state. Since the credibility of the threat is critical to such assurance, each side had to invest substantial capital in their nuclear arsenals even if they were not intended for use. In addition, neither side could be expected or allowed to adequately defend itself against the other’s nuclear missiles. This led both to the hardening and diversification of nuclear delivery systems (such as nuclear missile silos, ballistic missile submarines, and nuclear bombers kept at fail-safe points) and to the Anti-Ballistic Missile Treaty.
This MAD scenario is often referred to as nuclear deterrence. The term “deterrence” was first used in this context after World War II; prior to that time, its use was limited to legal terminology.”
“Super Serco bulldozes ahead
UPDATED: 23:00 GMT, 1 September 2004
Today its £10.3bn order book is bigger than many countries’ defence budgets. It is bidding for a further £8bn worth of contracts and sees £16bn of ‘opportunities’.
Profit growth is less ballistic. The first-half pre-tax surplus rose 4% to £28.1m, net profits just 1% to £18m. Stripping out goodwill, the rise was 17%, with dividends up 12.5% to 0.81p.
Serco runs the Docklands Light Railway, five UK prisons, airport radar and forest bulldozers in Florida.
Chairman Kevin Beeston said: ‘We have virtually no debt and more than 600 contracts.’
The shares, 672p four years ago, rose 8 1/4p to 207 1/4p, valuing Serco at £880m or nearly 17 times earnings.
Michael Morris, at broker Arbuthnot, says they are ‘a play on UK government spend’ which is rising fast.”
“The Small Business Office at the Air Force Nuclear Weapons Center, Kirtland Air Force Base, is responsible for implementing DOD and Air Force small business policies, programs and procedures.
Specific programs include:
* Small Business
– American Native Corporation
– Alaska Native Corporation
– Hawaiian Native Corporation
The Small Business Office performs the overall contractor relations function for Kirtland AFB and also serves as the liaison with the Small Business Administration at the local and national levels.
The office works to enhance acquisition opportunities for small businesses in support of the Air Force mission.
The Small Business Office is the initial point of contact for businesses seeking contracting opportunities within the installation.
Every second Tuesday of the month, Small Business Office Director Scott Cook meets with local business associates providing them information about contracting with the base.
On August 23, 2012 Cook will co-host a small-business seminar, sponsored by the Albuquerque Hispano Chamber of Commerce. The Air Force, along with other New Mexico-based government agencies, will be on hand. This daylong event will begin with a morning session to inform interested small business operators on the needs of the agencies, followed by one-on-one breakouts, allowing individuals to meet directly with agency representatives.
AWE has become the target of a campaign, Action AWE of protest specifically aimed curtailing its production at the next UK elections.
AWE plc is responsible for the day-to-day operations of AWE, and is owned by a consortium of Jacobs Engineering Group, Lockheed Martin UK, and Serco through AWE Management Ltd who hold a 25‑year contract (until March 2025) to operate AWE. All AWE sites remain owned by theUK government who also hold a golden share in AWE plc.
“Snowden leaks: Five Eyes alliance, Australian involvement detailed
Working with the US, UK, Canada and New Zealand as part of the not-so-secret ‘Five Eyes,’ the group has even bugged UN leaders Kofi Annan and weapons inspector Hans Blix.
New leaks published by Spiegel, using information leaked from Edward Snowden, show how wars will be fought in cyberspace.
And we’re not talking about a few stolen files or leaked movies, it will be the full take down of power plants, phone networks and transport systems.
Five Eyes was originally an alliance between the US and the UK at the end of WW2 — an agreement to share intelligence.
Australia, Canada and New Zealand joined the alliance in 1955, and since then intelligence data and facilities (such as Pine Gap in central Australia) have been shared between the nations.
In the 1970s the group was involved in the CIAs orchestration to overthrow Chile’s President Salvador Allende — something documents show Australia was heavily involved in.
Since the September 11 attacks the capabilities of Five Eyes have been significantly increased, with the group spying on everyone from world leaders, to students on their Facebook accounts.
A spokesperson from ASIO told news.com.au that the alliance was crucial in providing protection to Australia.
“Responding effectively to the transnational nature of security threats demands international cooperation between security and intelligence agencies,” they said.
Adding, “Effective liaison relationships with international partners have proved to be vital in protecting Australia from the threat posed by foreign fighters returning from conflicts in the Middle East.”
From the eyes of the military, mass digital surveillance of the internet is just “phase 0”. This mass surveillance includes anything from private Facebook messages, to internet browsing history and even what has been purchased online. The surveillance will apparently be used to detect vulnerabilities in enemy computer systems, to then infiltrate and gain permanent access.
Once that is done, words like “dominate,” “control” and “destroy” get thrown around to describe what Five Eyes will do after a successful phase 0.
“The next major conflict will start in cyberspace”
One of the leaked NSA presentations claims that our next major war will be fought digitally. Because of that, the US government is arming itself for network warfare. Almost every part of modern life is vulnerable — from hospitals needing power to the computerised cars we all drive. The leaked documents eloquently word it as “the ability to control/destroy critical systems and networks at will through pre-positioned accesses (laid in Phase 0).”
The documents show there is little differentiation between targets and civilians, with any internet user a possible victim. It’s through certain viruses that are injected in everyday internet tools like Facebook chat that the group can intercept content on your computer and take complete control of it.
Let’s not forget what the US was able to do with Israel back in 2010 when it caused physical damage to Iran’s nuclear capabilities by deploying a virus that destroyed much of the country’s ability to enrich uranium. That was 2010, now the NSA and Five Eyes are even deadlier.
And they will use their tools against anyone who isn’t a part of the Five Eyes alliance.
“I drink your milkshake”
One of the major revelations in the new documents is the Five Eyes’ ability to exploit the methods used by its enemies, to “steal their tools, trade craft, targets, and take.”
This is what the NSA calls “fourth party collection,” and is something that appears so successful that agents of the NSA and England’s GCHQ security agency have a whole set of jokes written about it, including a reference to Daniel Day-Lewis’s infamous “I drink your milkshake” speech in There Will Be Blood.
One GCHQ presentation on fourth party collection reveals how the UK used a tool called “BADASS” to steal personal information sent between users’ devices, mobile networks and analytic firms. That’s the same metadata which George Brandis says does not contain personally identifiable information.
The GCHQ then go on and joke about their tools, including one slide that boasts: “We know how bad you are at Angry Birds.”
As it stands now, any country who isn’t a part of the Five Eyes can be a target, even those that have traditionally been allies. In a new age of digital warfare, it appears that the Five Eyes won’t be taking a risk with anyone.”
The real scandal surrounding Democratic presidential hopeful Hillary Clinton’s private email system may be that she was running, in concert with a private consulting firm tied closely to George Soros, an outsourced and parallel State Department answerable only to her and not President Obama, the Congress, or the American people.
The media has tried to separate two dubious operations of Mrs. Clinton while she was at the State Department. The first is the private email server located in her Chappaqua, New York residence. The second is the fact that her government-paid State Department personal assistant, Huma Abedin, wife of disgraced New York “sexting” congressman Anthony Weiner, was simultaneously on the payroll of Teneo, a corporate intelligence firm that also hired former President Bill Clinton and former British Prime Minister Tony Blair as advisers. Abedin has been linked to the Muslim Brotherhood, which has recently buried the hatchet with longtime rival Saudi Arabia and common cause against the Assad government in Syria, the Houthi rebels in Yemen, and Iran.
It is clear that Mrs. Clinton used her private email system to seek advice on major foreign policy issues, from her friend and paid Clinton Foundation adviser Sidney Blumenthal providing private intelligence on Libya’s post-Qaddafi government and possible business ventures to Clinton friend Lanny Davis seeking favors from Mrs. Clinton. It should be noted that Davis was a paid lobbyist for the military junta of Honduras that overthrew democratically-elected President Manuel Zelaya in 2009. It also should be noted that Mrs. Clinton voiced her personal dislike for the late Libyan leader Muammar Qaddafi, when, after he was assassinated by U.S.-armed jihadist rebels, boasted, “We came, we saw, he died!”
It was highly unusual for Abedin to receive a U.S. government paycheck while also receiving a consultant’s salary from Teneo. Teneo was founded in 2011 by Doug Band, a former counselor to Bill Clinton. Teneo, which is as much a private intelligence firm as it is an investment company and “governance” consultancy, has its headquarters in New York and branches in Washington DC, Brussels, São Paulo, London, Dublin, Dubai, Hong Kong, Beijing, and Melbourne. With the exception of its investment arm, Teneo closely resembles the former CIA-connected firm where Barack Obama worked after he graduated from Columbia, Business International Corporation (BIC). Teneo’s marketing claims match those made by BIC during its heyday: Teneo works “exclusively with the CEOs and senior leaders of many of the world’s largest and most complex companies and organizations.”
Teneo has staked a position in the international news media with its recent purchase of the London-based firm Blue Rubicon, formed in part by the former home news editor for Channel 4 News in the United Kingdom. Teneo also recently acquired London’s Stockwell Group, which provides consultancy services to the National Bank of Greece and Pireaus Bank. It appears that Mrs. Clinton’s friends are cashing in on the global banking austerity being levied against Greece.
The head of Teneo Intelligence is Jim Shinn, a former assistant secretary for Asia for the Defense Department. What is troubling is that Teneo has been offering statements to the media designed to heighten tensions between NATO and Turkey on one side and Russia on the other over Russia’s military attacks on the Islamic State in Syria. Shinn’s intelligence chief in Teneo’s London office, Wolfgango Piccoli, who has worked for the Soros-linked Eurasia Group consultancy, told CNN that Russia’s “reinforcement of the Assad regime and the consolidation of separate areas of control is more likely to prolong the conflict by forcing a stalemate.” The Teneo statement came in a CNN report that suggests members of the Bashar al Assad government in Syria and Russian President Vladimir Putin and his government could be charged by international or “national” tribunals for war crimes in a manner similar to those convened on members of the Yugoslavian and Serbian governments.
The entire International Criminal Court (ICC) in The Hague and in Africa has fallen under the control of George Soros and his operatives. Soros has made no secret of his support for overthrowing Assad and Putin and he has resorted to a “weapon of mass migration” of Syrian, Iraqi, and other refugees into Europe in order to destabilize the entire continent and endanger its Christian culture and social democratic traditions. Mrs. Clinton and Soros extensively used Mrs. Clinton’s private email system to exchange, among other things, information on the political situation in Albania, a country where Soros’s operatives are plentiful and powerful. Soros is a major donor to the Clinton Foundation and Mrs. Clinton’s presidential campaign.
Soros also pressed Mrs. Clinton for State Department support for his American University of Central Asia, which, as seen with Soros’s Central European University in Budapest and its graduate ranks of pro-U.S. leaders throughout central and eastern Europe, is designed to manufacture a new generation of pro-U.S. leaders in the Central Asian states of the former Soviet Union.
The “wiping” of Mrs. Clinton’s email systems’ hard drives appear to be part of a classic case of an intelligence operation destroying data after being exposed.
The Clinton outsourcing of U.S. foreign policy not only involves Teneo but also the Clinton Foundation, for which Mrs. Clinton solicited donations from foreign sources while she served as Secretary of State. Moreover, in a classic example of racketeering, Bill Clinton was paid by Teneo as an adviser while his Clinton Foundation hired Teneo as as a consultant. The Clinton Foundation is directed by Bill and Hillary Clinton, along with their daughter Chelsea Clinton Mezvinsky. Mrs. Clinton’s private email use also extended to Clinton Foundation chief financial officer Andrew Kessel and longtime Bill Clinton friend Bruce Lindsey.
One of the emails sent via Mrs. Clinton’s private system was from her State Department counsel Cheryl Mills to Amitabh Desai, the head of foreign policy for the Clinton Foundation. Mills wanted Desai to arrange a meeting between Rwandan dictator Paul Kagame with the Democratic Republic of Congo strongman Joseph Kabila during Kagame’s visit to Kinshasa in 2012. This effort was conducted outside the State Department with the sole exception that Assistant Secretary of State for African Affairs Johnnie Carson, a close friend of Mrs. Clinton, was involved in the email exchange with Mills and Desai.
Other private email use involved Hollywood magnate Haim Saban, Loews heir Andrew Tisch, and Lynn de Rothschild, all of whom were peddling Israel’s interests to Hillary and Bill Clinton in return for sizable donations to the Clinton Foundation and Mrs. Clinton’s presidential campaign.
Under the Clinton Giustra Enterprise Partnership, the Clinton Foundation received generous financial support totaling some $31 million from Frank Giustra, a Canadian uranium mining magnate. Giustra relied on the Clintons to use their influence to open up lucrative uranium exploitation opportunities in places like Kazakhstan and Africa.
Senator Chuck Grassley (R-IA) has been stonewalled in his attempt to obtain more information about Teneo’s relationship with Mrs. Clinton, the Clinton Foundation, and Bill Clinton.
Wayne Madsen is an investigative journalist who consistently exposes cover-ups from deep within the government. Want to be the first to learn the latest scandal? Go to WayneMadsenReport.com subscribe today!”
Founder Of New Bitcoin Assassination Market Wants It To Destroy ‘All Governments, Everywhere’
Well, that’s the idea behind Assassination Market, a Bitcoin-fueled crowd-funding website that will let users anonymously donate to see the heads of political leaders roll. Basically, Assassination Market is like a deranged Kickstarter or IndieGoGo for political murder.
Forbes reporter Andy Greenber talked to Kuwabatake Sanjuro, crypto-anarchist and founder of Assassination Market (not his real name, naturally), who believes that the site will change the world for the better by destroying “all governments, everywhere.”
Sanjuro’s idea is that once a few politicians get killed, the “war on privacy” that they are apparently waging will end.
So far, there are six leaders up for assassination on the site, including chairman of the Federal Reserve Ben Bernanke and Barack Obama. Bernanke’s got the most money in his “dead pool” right now, with a listing of 124.14 Bitcoin, or about $71,000 at current exchange rates.
To collect the money after a kill, a would-be assassin must prove that they are responsible for the death by predicting the date of killing ahead of time and embedding it in a donation of one bitcoin or more. Sanjuro will collect 1% of the payout for himself as a commission fee.
Although Bitcoin is meant to be untraceable, the FBI seized the popular drug market Silk Road earlier this year along with its Bitcoin stash.
Forbes contacted the FBI and Secret Service for the piece, but both declined to comment.”
This explains the name Greenwich Mean Time (GMT), a time scale in which the mean position of the sun at noon, averaged over the year, is above the Greenwich meridian (longitude zero).
Over the centuries the accuracy of time measurement has steadily improved and it was realised that there were irregularities in the Earth’s rate of rotation. In effect, the length of the seconds of Universal Time (UT1, as GMT is now officially known) varies slightly to keep in step with the changes in the Earth’s rotation. In 1955 the first atomic clock that was much more regular than the Earth itself, or indeed any other type of clock then in existence, was brought into operation at the National Physical Laboratory. Constructed by Louis Essen and Jack Parry, it was based on measurements of a particular vibration of the caesium-133 atom. Over the next few years the frequency (or rate) of the NPL caesium clock was compared with the astronomical second calculated by the United States Naval Observatory (USNO), and as a result of this work in 1967, by international agreement, the second was defined in the International System of units of measurement (SI) as the duration of 9,192,631,770 periods of the chosen vibration of the caesium-133 atom.
The SI second, which is believed to be of constant duration under fixed conditions, is used to make a time scale called International Atomic Time (TAI), which is a simple count of SI seconds labelled conventionally using minutes, hours and days. As TAI is not linked to the Earth’s rotation, a clock and calendar based on TAI gradually become more and more out of step with UT1. So TAI is of little use to anyone who wishes their clock to keep in step with the heavens. Traditional navigation, using observation of the sun, moon and stars, is one application that requires knowledge of UT1 to within a few seconds. Another is the use of UT1 by astronomers as a measure of the Earth’s rotation angle, allowing them to point their telescopes at any desired object.
The solution adopted was to construct a second atomic time scale called Coordinated Universal Time, which is abbreviated in all languages as UTC, as the basis of international timekeeping. It combines all the regularity of atomic time with most of the convenience of UT1 (or GMT), and many countries have adopted it as the legal basis for time. UTC is adjusted regularly by small amounts to keep it close to UT1. From 1 January 1972, the seconds of UTC have been exactly the same length as those of TAI, and they occur at the same instants. UTC is kept always within 0.9 seconds of UT1 by the insertion of extra seconds as necessary (known as positive leap seconds). It could happen that seconds would need to be removed (negative leap seconds), but so far all leap seconds have been positive.
When a leap second is inserted, it is done in the last minute of either December or June, or exceptionally March or September, immediately prior to midnight or 00:00:00 hours UTC. The decision as to whether a leap second is required is taken by the Earth Orientation Center of the International Earth Rotation and Reference Systems Service (IERS), approximately 6 months in advance.
There are 61 seconds in a minute containing a positive leap second. A leap second occurs at the same instant throughout the world, when the familiar ‘six pips’ radio time signal gains an extra pip before the long pip marking the hour, to become a ‘seven pip’ signal. A mid-year leap second falls during summer time in the UK, one hour ahead of UTC, so the extra second is inserted at 01:00 BST on 1 July.
A cumulative record of leap seconds since the offset (TAI-UTC) was set to exactly 10 seconds on 1972-01-01 is given below. Each date listed is the UTC day immediately after the leap second, and the figure after the date is the number of seconds difference between TAI and UTC during the period from that date until the subsequent leap second, in the sense (TAI-UTC). The positive difference means that TAI is ‘ahead’ of UTC. Last Updated: 6 Jan 2015
Created: 19 May 2011″
“[Freescale patented and embedded clock devices] QorIQ Qonverge BSC9131 Device Features
“Since then, the ‘White’s Club S**t’ has entered club slang to mean the worst sort of nasty, selfish, pompous show-off [and death-pool gamblers per Randolph Churchill].
Still, in its 300-year history, the club has played host to some illustrious members and a glittering array of politicians.
Among its old members are the Duke of Wellington, the Regency dandy Beau Brummell, George IV, William IV, Edward VII and Winston Churchill’s son, Randolph. Prince Charles is a member and held his Bollinger champagne-fuelled stag night at the club before his wedding to Lady Diana Spencer.
Prince William is said to be a member.
The club has also attracted its fair share of rogues.
White’s was implicated in the great ‘Cambridge Spies’ scandal. Some have claimed that the recruitment and subsequent movements of Guy Burgess, Donald Duart Maclean, Kim Philby and Anthony Blunt were orchestrated from the club’s bar.
Meanwhile, in his novels Evelyn Waugh used the club as the model for ‘Bellamy’s,’ the home of ‘grandee and card sharper, duellist and statesman.’
Certainly, gambling has always been part of the fabric of White’s. In William Hogarth’s 1733 series of cautionary paintings – The Rake’s Progress – the rake is driven mad by losing his fortune at the gaming tables of White’s.”
In the UK and Europe:
Serco manages the UK Atomic Weapons Establishment (AWE) as part of a consortium with Lockheed Martin and Jacobs. AWE is one of the most advanced research, design and production facilities in the world, developing the sophisticated materials, quantum physics and computer modelling vital to the safe and effective maintenance of the UK’s nuclear deterrent. AWE experts also play a leading role in nuclear non-proliferation and international nuclear security.
We enable the Royal Navy to move in and out of port at HM Naval Bases Faslane, Portsmouth and Devonport for operational deployment and training exercises. Managing a fleet of over 100 vessels, we operate tugs and pilot boats, provide stores, liquid and munitions transportation and provide passenger transfer services to and from ships for officers and crew.
We provide facilities and information systems support to the MoD’s Defence Science and Technology Laboratory (Dstl), the UK government’s leading defence research establishment, including a £400m programme to rationalise the Dstl estate. We also provide facilities management services to the Defence Estates in support of the UK military presence in Gibraltar.
Serco provides extensive engineering and maintenance support to UK military aviation, including to the Fleet Air Arm and Royal Air Force, working on over 16 military aircraft types, in addition to the logistical support services at RAF bases across the country, including Brize Norton, Lyneham and High Wycombe, the Headquarters of Air Command.
Our space and security specialists provide spacecraft operation and in-theatre support to the Skynet 5 secure military satellite communications network; we maintain the UK’s anti-ballistic missile warning system at RAF Fylingdales and support the UK Air Surveillance and Control System (ASACS); Serco also supports the intelligence mission of the MoD and US Department of Defence at RAF Menwith Hill.
Serco enables the training of national security personnel through its services at the Defence Academy of the United Kingdom, the MoD’s world class institute responsible for educating the military leaders of tomorrow; we train all of the RAF’s helicopter pilots at the advanced training facility at RAF Benson; and we manage the Cabinet Office’s Emergency Planning College, the government’s training centre for crisis management and emergency planning.
In the UK, we also developed an approach that combines the introduction of windfarm friendly radar technology at RRH Trimingham, Staxton Wold and Brizlee Wood that has enabled >5GW windfarm development projects, which are equally important to the Department of Energy and Climate Change to meet its commitments to reduce greenhouse gas emissions and the Ministry of Defence”
The 8(a) Business Development Program assists in the development of small businesses owned and operated by individuals who are socially and economically disadvantaged, such as women and minorities. The following ethnic groups are classified as eligible: Black Americans; Hispanic Americans; Native Americans (American Indians, Eskimos, Aleuts, or Native Hawaiians); Asian Pacific Americans (persons with origins from Burma, Thailand, Malaysia, Indonesia, Singapore, Brunei, Japan, China (including Hong Kong), Taiwan, Laos, Cambodia (Kampuchea), Vietnam, Korea, The Philippines, U.S. Trust Territory of the Pacific Islands (Republic of Palau), Republic of the Marshall Islands, Federated States of Micronesia, the Commonwealth of the Northern Mariana Islands, Guam, Samoa, Macao, Fiji, Tonga, Kiribati, Tuvalu, or Nauru); Subcontinent Asian Americans (persons with origins from India, Pakistan, Bangladesh, Sri Lanka, Bhutan, the Maldives Islands or Nepal). In 2011, the SBA, along with the FBI and the IRS, uncovered a massive scheme to defraud this program. Civilian employees of the U.S. Army Corps of Engineers, working in concert with an employee of Alaska Native Corporation Eyak Technology LLC allegedly submitted fraudulent bills to the program, totaling over 20 million dollars, and kept the money for their own use. It also alleged that the group planned to steer a further 780 million dollars towards their favored contractor.”