#2671: Clinton’s 8(a) Fraggers Club – Serco Visas for Travelgate Murder – Red Switch Zulu Black Hawk Down
United States Marine Field McConnell
Plum City Online – (AbelDanger.net)
May 15, 2016
1. Abel Danger (AD) claims that former First Lady patent lawyer Hillary Clinton has run a Fraggers Club with the White House press corps since 1993 and is hiring 8(a) companies to sabotage U.S. military missions with a patent pool of fragmentation, delivery and trigger devices.
2. AD claims that Serco procured visas for 8(a) operatives’ hired to murder Vincent Foster after he discovered the role of the Fraggers Club in the World Trade Center bombing on February 26, 1993 and its use of the White House press corps in a Wag the Dog cover up.
3. AD claims that Serco – formerly RCA GB 1929 – provided Clinton aides with Zulu time signals on the Defense Red Switch Network to synchronize the fragging of U.S. military missions in Somalia in 1993 and develop a script for the movie Black Hawk Down.
4. United States Marine Field McConnell invites James Comey – FBI director and former director of Serco banker HSBC – to investigate Clinton’s apparent use of 8(a) companies to murder Vincent Foster and a White House Fraggers Club to sabotage the 1993 mission in Somalia (https://abeldanger.blogspot.com/2010/01/field-mcconnell-bio.html).
Note detonation of what appears to be a dial-a-yield fragmentation bomb at the Pentagon’s US Navy Command Center on 9/11 – NOTE THE CLINTON PATENT SIGNATURE: ZULU SYNCHRONIZATION, NO BIG DEBRIS AND NO AUTOPSIES.
Unabomb FC plates – FBI patsies say the initials stand for Freedom Club – Abel Danger researchers says they stand for Fraggers’ Club with a pedigree extending back to the Vietnam war.
Black Hawk Down Trailer
Who Was Vince Foster and Was He Killed? Cover-Up, Hillary Clinton (1997)
TravelGate: The Most Contemptible Act
NAVY SEALS – THEIR UNTOLD STORY | “Battle of Mogadishu” | PBS
Serco developed the 8(a) Zulu bomb from the Lewes bomb of WWII
White’s Club death-bet bookmaker services dates back to 1743 and – as Cameron’s friend, Churchill’s grandson and Serco CEO Rupert Soames well knows – only the technology to spot fix the precise time of death has changed.
Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders!
(Mobile Playback Version)
[Serco‘s] Defense Ammunition Center
Serco… Would you like to know more?
“The term fragging is used to describe the deliberate killing or attempted killing by a soldier of a fellow soldier, usually a superior officer or non-commissioned officer. The word was coined by military personnel of the United States during the Vietnam War, when such killings were most often attempted with a fragmentation grenade, sometimes making it appear as though the killing was accidental or during combat with the enemy. The term fragging is now often used to encompass any means used to deliberately and directly cause the death of military colleagues. The high number of fragging incidents in the latter years of the Vietnam War were symptomatic of the unpopularity of the war with the American public and the breakdown of discipline in the U.S. Armed Forces. Documented and suspected fragging incidents totaled nearly nine hundred from 1969 to 1972. Fragging has not been as frequent since the Vietnam War ended.”
Theodore John “Ted” Kaczynski (/kəˈzɪnski/; born May 22, 1942), also known as the “Unabomber”, is an American anarchist, mathematical prodigy, and domestic terrorist. Between 1978 and 1995, Kaczynski engaged in a nationwide bombing campaign against people involved with modern technology, planting or mailing numerous homemade bombs, ultimately killing a total of three people and injuring 23 others. He is also known for his wide-ranging social critiques, which opposed industrialization and modern technology while advancing a nature-centered form of anarchism. … In all, 16 bombs—which injured 23 people and killed three—were attributed to Kaczynski. While the devices varied widely through the years, all but the first few contained the initials “FC.” Inside his bombs, certain parts carried the inscription “FC,” which Kaczynski later asserted stood for “Freedom Club.” Latent fingerprints on some of the devices did not match the fingerprints found on letters attributed to Kaczynski. As stated in the “Additional Findings” section of the FBI affidavit (where a balanced listing of other uncorrelated evidence and contrary determinations also appeared):
203. Latent fingerprints attributable to devices mailed and/or placed by the UNABOM subject were compared to those found on the letters attributed to Theodore Kaczynski. According to the FBI Laboratory no forensic correlation exists between those samples. One of Kaczynski’s tactics was leaving false clues in every bomb. He would make them hard to find deliberately to mislead investigators into thinking they had a clue. The first clue was a metal plate stamped with the initials “FC” hidden somewhere (usually in the pipe end cap) in every bomb. One false clue he left was a note in a bomb that did not detonate which reads “Wu—It works! I told you it would—RV”. A more obvious clue was the Eugene O’Neill $1 stamps used to send his boxes. One of his bombs was sent embedded in a copy of Sloan Wilson’s novel Ice Brothers.”
“The man who knew too much? The truth about the death of Hillary Clinton’s close friend Vince Foster
By SALLY BEDELL SMITH
Last updated at 00:23 15 January 2008 …
In the end, though, it was the firing of seven staff – following pressure from the imperious First Lady – that “drove Vince batty,” according to White House counsel Bernie Nussbaum.
Hillary had become convinced that the staff in the travel office that served the White House press corps were guilty of “financial mismanagement and waste.” Foster was asked to help get rid of them.
In a meeting with him on May 13, 1993, Hillary asked him if he was “on top of” the travel office situation. He assured her that his team was working on it.
Afterwards, Foster noted that Hillary’s mood was “general impatience … general frustration.”
Other White House aides later confirmed that she wanted her own “people” in the office, and that everyone felt “there would be hell to pay” if her wishes were defied.
On May 19, the travel office’s seven employees were fired – and there was immediate uproar. Allegations of cronyism hit the headlines when it emerged that a distant cousin of Bill was to be put in charge of the office, while a friend of a friend was being promoted to take over some of the White House’s air-charter business.
Worse still, none of the charges against the original travel office employees stood up, and their precipitous dismissals became a damaging test of Hillary’s honesty.
She now insisted that the firings were not her fault. Others had misconstrued an “off-hand comment”: she had meant only to suggest that the staff should “look into” questions about mismanagement.
Hillary also insisted she didn’t know the “origin of the decision” to remove the employees, and that she “did not direct that any action be taken.”
An official report issued seven years later concluded that her statements had been “factually false.”
At the time, Vince Foster felt deeply responsible for the imbroglio and was worried that Congress might investigate. White House aide David Watkins remembers Foster saying to him “My God, what have we done?” and expressing concern that Hillary’s role in the firings would come to light.
He urged Watkins to protect “the client” at all costs.
Foster knew that in shielding Hillary, he might have to mislead congressional investigators under oath – a grim prospect for a man who took pride in being a straight arrow.
By mid-July, he had lost more than a stone in weight and seemed unusually subdued. He twice told his wife that he felt under pressure and was thinking of returning to Arkansas.
Talking to a colleague about his dealings with Hillary, he said: “It’s not the same.” On one matter after another, he confided, she would bark “Fix it, Vince!” or “Handle it, Vince!” and leave him to pick up the pieces.
On July 16, Foster and his wife drove to an inn in Maryland for the weekend. At dinner that night, Foster cried when Lisa asked him “if he felt trapped.” Three days later, he called his doctor, who gave him a prescription for the antidepressant Desyrel.
The following night, July 20, he was found dead.
Hillary burst into tears when she was told. But her behaviour, as well as that of staff and associates, in the days following Foster’s death was to haunt the administration for years, raising questions about what the Clintons had to hide – about Whitewater, “Travelgate,” the failed Arkansas bank and more besides.
The night after the tragedy, White House staff – including Hillary’s Chief of Staff – searched Foster’s office for a suicide note. Under the noses of the police and FBI, they took away a number of sensitive files.
Later, it was alleged but never proved that the Clintons had combed through these files during the five days before they were handed over.
Other key papers – records for Hillary’s legal work on the failed Arkansas bank – appear to have gone missing, too. Although later the subject of a subpoena, the records were not retrieved for more than two years.
Whatever the truth behind all the activity that followed Foster’s death, the appearance of concealment was enough to trigger five separate federal inquiries.
There were also three official investigations into Foster’s death, all of which concluded that he had committed suicide.
After Foster’s funeral in Arkansas, Hillary had difficulty getting out of bed for several days. Her friend’s death had “ripped a hole” through her, according to Ann McCoy, a friend from Arkansas.
On the day she returned to her office, a torn-up note on yellow paper was found at the bottom of Foster’s briefcase. It was a list of grievances and concerns about life in the White House that he had jotted down in the days before his death.
Nussbaum went to Hillary’s office to tell her he’d “found something Vince wrote that may help explain why he did what he did.”
Hillary “looked startled,” Nussbaum recalled. She glanced at the note, said “I can’t deal with this,” and abruptly left the room.
The contents of Foster’s note were tantalising. At one point, the man who knew so many of the First Couple’s secrets had written: “The public will never believe the innocence of the Clintons and their loyal staff.”
It was a comment that can be interpreted to mean that he believed the Clintons were blameless – or that he was worried about some unspecified information that could destroy Bill and Hillary’s reputation.
“The 1993 World Trade Center bombing was the first terrorist attack on the World Trade Center, carried out on February 26, 1993, when a truck bomb was detonated below the North Tower of the World Trade Center in New York City. The 1,336 pounds (606 kg) urea nitrate–hydrogen gas enhanced device was intended to send the North Tower (Tower 1) crashing into the South Tower (Tower 2), bringing both towers down and killing tens of thousands of people. It failed to do so but killed six people and injured more than a thousand.
The attack was planned by a group of terrorists including Ramzi Yousef, Mahmud Abouhalima, Mohammad Salameh, Nidal A. Ayyad, Abdul Rahman Yasin and Ahmed Ajaj. They received financing from Khaled Sheikh Mohammed, Yousef’s uncle. In March 1994, four men were convicted of carrying out the bombing: Abouhalima, Ajaj, Ayyad and Salameh. The charges included conspiracy, explosive destruction of property, and interstate transportation of explosives. In November 1997, two more were convicted: Ramzi Yousef, the mastermind behind the bombings, and Eyad Ismoil, who drove the truck carrying the bomb.”
“A federalist government based on 18 autonomous regions was agreed upon by the leaders of Somalia’s various armed factions. It was the objective of UNOSOM II to support this new system and initiate nation-building in Somalia. This included disarming the various factions, restoring law and order, helping the people to set up a representative government, and restoring infrastructure.
UNOSOM II had a strength of 28,000 personnel, including 22,000 troops and 8,000 logistic and civilian staff from Australia, Austria, Bangladesh, Belgium, Botswana, Canada, Egypt, Fiji, Finland, France, Germany, Greece, India, Indonesia, Ireland, Italy, Kuwait, Jordan, Malaysia, Morocco, Nepal, New Zealand, Nigeria, Norway, Pakistan, Spain, South Korea, Romania, Saudi Arabia, Sweden, Tunisia, Turkey, the United Arab Emirates, the United Kingdom, the USA and Zimbabwe. The US also provided 1,167 troops for a Quick Reaction Force under US operational control that would be stationed on US Navy ships off the coast of Somalia (see Carrier Strike Group 6). This force would respond to emergency threats to UNOSOM II but only if US Central Command in Florida approved.
On 5 June, a Pakistani force was sent to investigate an arms depot belonging to a Somali warload vying for the Presidency, Mohamed Farrah Aidid. When the Pakistani force arrived, they were greeted by angry Somali protesters. Twenty-four Pakistani soldiers inspecting weapons as part of the expanded UN mandate were killed when “forces believed to be associated with Aidid allegedly launched a fatal attack on peacekeeping forces.”
The UN responded the next day with Resolution 837, reaffirming that the secretary-general was authorized to “take all necessary measures against those responsible for the armed attacks and to establish the effective authority of UNOSOM II throughout Somalia.” This was essentially equivalent to declaring war on Aidid and his army, a declaration that would lead to numerous confrontations between UNOSOM II personnel and Aidid‘s militia. UNOSOM II had much fewer war-fighting resources than UNITAF, but it was much more ambitious and aggressive.
On 12 June 1993 U.S. troops started attacking targets in Mogadishu in hopes of finding Aidid, a campaign which lasted until 16 June. On 17 June, a $25,000 warrant was issued by Admiral Jonathan Howe for information leading to the arrest of Aidid, but he was never captured. Howe also requested a counter-terrorist rescue force after the killings of the Pakistani troops.
The hunt for Aidid characterised much of the UNOSOM II intervention. The increasing tempo of military operations carried out in Mogadishu began to cause civilian casualties and affected the relationship between the foreign troops and the Somali people. The UN troops were portrayed as foreign interlopers, particularly after incidents of civilian casualties caused by wholesale firing into crowds. On July 12, a house where clan leaders were meeting was attacked by US AH-1 Cobra helicopters. Several buildings were destroyed and many Somalians died. When four western journalists went to investigate the scene, they were beaten to death by a Somalian mob. The journalists were Hansi Krauss of Associated Press and Dan Eldon, Hos Maina and Anthony Macharia, all of Reuters.
Somalis that had been disappointed by the failure of the UN to disarm the warlords in Mogadishu actually began to support those same warlords in an “us versus them” mentality. The spectre of Islamic fundamentalism also began to rise, as militia leaders sought to use religion as a rallying point for anti-UN sentiment. As the Americans became more insular, the warlords began to reassert control of many Mogadishu districts. With each failure to apprehend Aidid, the militias grew more bold. Serious rifts between nations contributing to UNOSOM II also began to develop, with Italy in particular being a major critic of the American methods.
Somali militias began targeting peacekeepers, causing further casualties. On 8 August, Aidid’s militia detonated a remote controlled bomb against an American military vehicle, first killed four American soldiers and then, two weeks later, injured seven more. In response, President Bill Clinton approved the proposal to deploy a special task force composed of 400 US Army Rangers and Delta-force Commandos. This unit, named Task Force Ranger, consisted of 160 elite US troops. They flew to Mogadishu and began a manhunt for Aidid in what became known as Operation Gothic Serpent. On October 3, 1993, Task Force Ranger raided a hotel in Mogadishu in which Aidid was thought to be hiding. What ensued was the longest, bloodiest and deadliest battle for US troops in Somalia. In what later became known as the Battle of Mogadishu, eighteen US soldiers were killed. Images of their dead bodies being dragged through the streets were broadcast on television stations all over the world, horrifying and infuriating the American public.”
“SUNDAY, JANUARY 31, 2010
QRS-11—Quartz Rate Sensor
The QRS-11 GyroChip sensor is used on commercial aircraft to rotate the antenna to receive signals from satellites for the in-flight entertainment system, radar tracking and flight controls. If the aircraft is equipped with an uninterruptable autopilot, signals can be received from a satellite to remotely fly the aircraft.
The sensor provides stabilization, flight control, and guidance. It also is used in missiles, Unmanned Aerial Vehicles (UAV ) and other military as well as space and industrial applications. Because of the sensitive nature of its military applications, the export of the technology is regulated.
We allege that the QRS-11 can be used as part of a package of technology to guide aircraft equipped with uninterruptable autopilots turning them into weapons.
We believe that the patent for the device was originally obtained by the Rose Law Firm of Little Rock, AR, specifically by patent lawyer Hillary Clinton, for BEI Technologies, Inc. headquartered at that time in Arkansas.
BEI has diversified many times since then and the QRS-11 is now Manufactured by CST Systron Donner Inertial.”
“Controlled fragmentation of multi-walled warheads
US 3566794 A
Publication number: US3566794 A
Publication type: Grant
Publication date：2 Mar 1971
Filing date: 26 Nov 1958
Priority date: 26 Nov 1958
Original Assignee: US Navy
Export Citation: BiBTeX, EndNote, RefMan
CONTROLLED FRAGMENTATION 01F MULTI-WALLED WARI’IEADS
The invention herein described may be manufactured and used by or for the Government of the United States of America for governmental purposes without the payment of any royalties thereon or therefor. This invention relates to explosive warheads; more specifically it relates to fragmentation warheads for antipersonnel use. This application is similar to application Ser. No. 582,896, filed 4 May 1956, but goes beyond the scope of said application in applying the teachings thereof to multiwalled warhead casings.
Prior attempts at fragmentation control in impulsively loaded bodies such as warheads have generally involved the cutting of grooves on the surfaces, both inner and outer, of such bodies or the placing of plastic liners of predetermined shape between the inner surfaces of such bodies and the explosives contained therein. Such practices produced local regions of high stress which initiated points of fracture, but complete fragmentation control did not result therefrom.
As pointed out in the aforementioned application fragmentation is a function of wall thickness as well as the groove pattern. Applicants have discovered that further control of fragmentation may be attained by utilizing a plurality of walls in the warhead casing, by cutting grooves on the inner surface of each such wall, and by the orientation of the groove patterns so cut on the walls.
Accordingly, it is an object of this invention to provide a method for closer control of the fragmentation of impulsively loaded bodies than the methods of the prior art.
Another object is to produce a greater number of lethal fragments from a given mass of metal through the elimination of very large fragments and very fine ones. Applicants believe that fragments ranging from one-half to 4 grams are the most lethal against personnel and light military equipment.”
“Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”
“The Lewes bomb was a blast-incendiary field expedient explosive device, manufactured by mixing diesel oil and Nobel 808 plastic explosive. It was created by Lieutenant Jock Lewes, one of the original members of L Detachment SAS in 1941. The SAS needed a combined incendiary and explosive device light enough to be carried by a small group of commandos yet powerful enough to destroy and set fire to aircraft on an enemy airfield. Weighing approximately 1 pound (0.45 kg), the Lewes Bomb could be carried in quantity by an individual.
The only available bomb at the time was too cumbersome to be carried by a paratrooper. Lewes experimented with various types of incendiary and explosive materials, using trial and error. The final design used a pound of plastic explosive, mixed with a quarter pound of thermite and a small amount of diesel oil. Inside the mass was inserted a 2 ounce dry gun cotton booster, plus a detonator attached to a thirty-second fuse. Alternatively, Lewes bombs could be triggered by pencil detonators or booby-trap firing devices such as pressure release switches.”
“Serco do a bunch more that didn’t even make our story: As well as thanking God for his success, CEO Chris Hyman is a Pentecostal Christian who has released a gospel album in America and fasts every Tuesday. Amazingly, he was also in the World Trade Centre on 9/11, on the 47th floor addressing shareholders [including Bilderberg bankers such as HSBC and the Rockefeller-controlled JP Morgan Chase] Serco run navy patrol boats for the ADF, as well as search and salvage operations through their partnership with P&O which form Defence Maritime Services. Serco run two Australian jails already, Acacia in WA and Borallon in Queensland. They’re one of the biggest companies In the UK for running electronic tagging of offenders under house arrest or parole.”
“Origins of the Bilderberg meetings .. The immediate chain of events leading to the setting up of the first conference was as follows. Prince Bernhard set off for the USA in 1952 to visit his old friend Walter Bedell Smith, director of the newly-formed CIA. Smith put the organisation of the American end into the hands of Charles D. Jackson (special assistant for psychological warfare to the US President), who appointed John S. Coleman (president of the Burroughs Corporation. and a member of the Committee for a National Trade Policy), who in turn briefly became US chair of Bilderberg.
Charles Jackson was president of the Committee for a Free Europe (forerunner of the Congress for Cultural Freedom (CCF) whose extensive operations financing and organising anti-Communist social democratic political intellectuals has only recently been fully documented (see Coleman 1989); and ran the CIA-financed Radio Free Europe in Germany. Earlier he had been publisher of Fortune magazine and managing director of Time/Life, and during the war was deputy head of psychological warfare for Eisenhower. At the time of Bernhard’s visit he was working with a committee of businessmen on both sides of the Atlantic which approved the European Payments Union.
It was thus a European initiative, and its aim was, in official bland language, to ‘strengthen links’ between Western Europe and the USA. A selected list of people to be invited to the first conference was drawn up by Retinger, with Prince Bernhard and Rijkens, from the European countries of NATO plus Sweden. The resulting group consisted of the Belgian and Italian prime ministers, Paul van Zeeland and Alcide de Gasperi (CDU), from France both the right wing prime minister Antoine Pinay and the Socialist leader Guy Mollet; diplomats like Pietro Quaroni of Italy and Panavotis Pipinelis of Greece; top German corporate lawyer Rudolf Miller and the industrialist Otto Wolff von Amerongen and the Danish foreign minister Ole Bjorn Kraft (publisher of Denmark’s top daily newspaper); and from England came Denis Healey and Hugh Gaitskell from the Labour Party, Robert Boothby from the Conservative Party, Sir Oliver Franks from the British state, and Sir Colin Gubbins, who had headed the Special Operations Executive (SOL) during the war [and introduced the 8(a) Zulu bomb to the Billderberg]“
“Serco farewell to NPL after 19 years of innovation
8 January 2015
Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco‘s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade….
NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading in the City through NPLTime”
“Support Services for Starwood Hotels Group Starwood Hotels Group, owner of some of the [Innholders] world’s most prestigious hotels, has appointed Serco as preferred bidder for a £7m contract to provide a range of support services to the Sheraton Grand in Edinburgh, the Westin in Dublin and the 5 star Turnberry resort on Scotland’s west coast. The contract, which has a 5 year term, is an extension to services already provided to other [Innholders] hotels in the Starwood Group and includes buildings maintenance and security, engineering support and [WiFi] help desk services.”
Jan 31, 2001
SBA modernizes to help feed its growing programs [Field McConnell’s sister Kristine Marcy introduced the 8(a) electronic accelerated loan guarantee program at SBA to ensure funding for the Serco protégés’ participating in the 9/11 carbon cap] BY PATRICIA DAUKANTAS | GCN STAFF Under a five-year plan for overhauling its information technology systems, the Small Business Administration recently acquired new software for financial and other administrative tasks.
By the time SBA celebrates its 50th anniversary in 2003, agency officials want all their programs up and running around the clock, chief financial officer Joseph Loddo said.
In the first phase of the modernization, the agency has upgraded systems for managing its extensive portfolio of guaranteed loans, chief operating officer Kristine Marcy said.
SBA processed its first electronic loan last November through its Sacramento, Calif., office and plans to add more private lenders during fiscal 2001.
The agency’s staffing level has dropped 22 percent over the past eight years, which is another reason to improve IT, Marcy said. Over the past decade, SBA’s portfolio of loans to small and disadvantaged businesses has more than doubled to $50 billion.
‘We’re a small agency with a huge portfolio,’ Marcy said. SBA supplies more than half of the U.S. venture capital available each year.
Seventy percent to 80 percent of the loans are booked through a preferred lender program [structured by Serco], which involves nearly 7,000 banks, Marcy said. SBA guarantees the loans, just as the government backs student and housing loans.
‘The financial and IT businesses were changing so rapidly, we had to make some changes to stay current with the private sector,’ Marcy said. Banks had been asking SBA to make faster decisions on loan guarantees. The agency decided to aim for a turnaround time of one hour.”
“BASE ONE CERTIFICATIONS Base One [a Serco protégé company] is NO longer an 8(a), or HubZone certified company. Base One is a Small Business and a Women Owned Small Disadvantaged Business. Base One previously held certifications by the SBA. Please disregard any references to Base One being currently certified as an 8(a) or HubZone firm by the SBA.
Base One Technologies
Expertly researches, designs, and develops information security policies that protect your data and manage your firm’s information technology risk at levels acceptable to your business.
Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report.
Develops and implements multi-layer Information Security Solutions, practices and procedures. We deploy Intrusion Detection Systems (IDS) and IP Security with VPN solutions using Cisco routers, Frame Relay, firewalls, address and port translation, obscurity standards and authentication technologies (AAA, 3DES, TACACS, etcŠ), to enhance and meet the level of Data Security required for global organizations.
Conducts IT Security and Risk Assessment in Federal government as well as security testing, implementing security for multiple platforms and operating systems around the world.
Ability to conduct business process analysis to provide technical security countermeasures, risk management and data communications security planning for large organizations.
Provides computer security integration for web server and traditional client-server based applications. We secure environments up to as many layers as required by our clients’ policies, industry practices, and regulating bodies – including the desktop and user experience as required. Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions.”
“Preparing the 8(a) application package
You do not need to pay anyone to prepare your 8(a) application. SBA designed the application forms so the applicant can complete the application. However, a consultant can assist in completing the application. Please be advised that no one can guarantee that an application for 8(a) program participation will be approved. The application process is intended to assure that each applicant receives a fair, unbiased review, free from favoritism and influence. Any irregularities in the application review process should be immediately referred to the SBA Inspector General.
Definition of Socially and Economically Disadvantaged Individuals
Socially disadvantaged individuals are those who have been subjected to racial or ethnic prejudice or cultural bias because of their identities as members of groups without regard to their individual qualities. The social disadvantage must stem from circumstances beyond their control. In the absence of evidence to the contrary, the following individuals are presumed to be socially disadvantaged:
Black Americans; Hispanic Americans (persons with origins from Latin America, South America, Portugal and Spain); Native Americans (American Indians, Eskimos, Aleuts, and Native Hawaiians); Asian Pacific Americans (persons with origins from Japan, China, the Philippines, Vietnam, Korea, Samoa, Guam, U.S. Trust Territory of the Pacific Islands [Republic of Palau], Commonwealth of the Northern Mariana Islands, Laos, Cambodia [Kampuchea], Taiwan, Burma, Thailand, Malaysia, Indonesia, Singapore, Brunei, Republic of the Marshall Islands, Federated States of Micronesia, Macao, Hong Kong, Fiji, Tonga, Kiribati, Tuvalu, or Nauru); Subcontinent Asian Americans (persons with origins from India, Pakistan, Bangladesh, Sri Lanka, Bhutan, the Maldives Islands or Nepal); And members of other groups designated from time to time by the SBA.
In addition, an individual who is not a member of one of the above-named groups may apply for 8(a) certification. However, the applicant must establish social disadvantage on the basis of clear and convincing evidence.
Economically disadvantaged individuals are socially disadvantaged individuals whose ability to compete in the free enterprise system has been impaired due to diminished capital and credit opportunities, as compared to others in the same or similar line of business and competitive market area who are not socially disadvantaged. For purposes of program entry, an individual whose personal net worth (excluding the equity in their personal residence and business) exceeds $250,000 will not be considered economically disadvantaged.
Woman-Owned Businesses [Obama’s structural feminists]
A woman-owned business may be recognized as a “socially disadvantaged firm” if the owner is a member of one of the groups for which social disadvantage is presumed. If the woman is not a member of one of the groups for which social disadvantage is presumed, she must establish her individual disadvantage on the basis of clear and convincing evidence that she has suffered discriminatory treatment because of her gender and that this treatment has impeded her entry into or advancement in the business world. SBA will consider any pertinent evidence but will give particular attention to evidence of discriminatory practices suffered in the areas of education, employment and the business world.”
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation