#2672: Clinton’s Long Range Fragging Club – Serco 8(a) Zulu Crime Scenes – Pentagon City Dial a Yield Bomb
1. Abel Danger (AD) claims that patent lawyer Hillary Clinton launched a Long Range Fragging Club with the FBI spy Robert Hanssen and the bomb maker Bernardine Dohrn in a May 1978 attack in Chicago with what the FBI would later misrepresent as a Unabomb.
2. AD claims that in 1993, First Lady Clinton gave Serco 8(a) companies access to the White House’s Zulu time signals to synchronize delivery, initiation and clean-up at Fragging Club crime scenes and decoy FBI investigators from the mens rea of a death-bet bookmaker in London.
3. AD claims that Serco equipped the Pentagon City Sheraton Hotel and its sister hotels in Dubai UAE and Queensland, Australia, with Zulu-timing devices so the leaders of the Fraggers Club could dial a yield or spot fix victim deaths during the Pentagon attack of Sep 12 2001 17:37:19.
4. United States Marine Field McConnell invites James Comey – FBI director and former director of Serco banker HSBC – to investigate Clinton’s apparent role in the Fraggers Club Zulu attacks of 9/11.
United States Marine Field McConnell
Plum City Online – (AbelDanger.net)
May 16, 2016
AD claims that in 1993, First Lady Clinton gave Serco 8(a) companies access to the White House’s Zulu time signals to synchronize delivery, initiation and clean-up at Fragging Club crime scenes and decoy FBI investigators from the mens rea of a death-bet bookmaker in London.
Note detonation of what appears to be a dial-a-yield fragmentation bomb at the Pentagon’s US Navy Command Center on 9/11 – NOTE THE CLINTON PATENT SIGNATURE: ZULU SYNCHRONIZATION, NO BIG DEBRIS AND NO AUTOPSIES.
NEW: 9/11 Hotel Video Released of NO PLANE hitting the Pentagon!
Note the Serco 8(a) spoliation crew of socially or economically-disadvantaged black men/women in stolen FBI uniforms.
Fragging Club discs from the FBI’s tainted labs
Serco developed the 8(a) Zulu bomb from the Lewes bomb of WWII
White’s Club death-bet bookmaker services dates back to 1743 and – as Cameron’s friend, Churchill’s grandson and Serco CEO Rupert Soames well knows – only the technology to spot fix the precise time of victim death has changed.
Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! (Mobile Playback Version)
Serco’s National Visa Center
[Serco’s] Defense Ammunition Center
Serco… Would you like to know more?
Note Serco 8(a) protégé Base One Technologies set the Pentagon Zulu honeypot on 9/11
“The term fragging is used to describe the deliberate killing or attempted killing by a soldier of a fellow soldier, usually a superior officer or non-commissioned officer. The word was coined by military personnel of the United States during the Vietnam War, when such killings were most often attempted with a fragmentation grenade, sometimes making it appear as though the killing was accidental or during combat with the enemy. The term fragging is now often used to encompass any means used to deliberately and directly cause the death of military colleagues. The high number of fragging incidents in the latter years of the Vietnam War were symptomatic of the unpopularity of the war with the American public and the breakdown of discipline in the U.S. Armed Forces. Documented and suspected fragging incidents totaled nearly nine hundred from 1969 to 1972. Fragging has not been as frequent since the Vietnam War ended.”
Who was Killed in the 9/11/01 Attack on the Pentagon
Whereas victims of the World Trade Center attack were identified by civilian authorities, victims of the attack on the Pentagon (like those of the crash of Flight 93) were identified by military authorities. The Armed Forces Institute of Pathology issued a report in November of 2001 claiming to have identified 184 of 189 persons killed in the Pentagon attack. 1
Since there were five alleged hijackers of Flight 77, whom authorities did not identify since they lacked DNA samples from the families, that 184 identifications accounts for the 125 people killed inside the Pentagon, and the 54 people other than the hijackers on board the aircraft.
The following map of the locations of victims in the attack was released as part of prosecution exhibits in the trial of Zacarias Moussaoui. 2
An office of the Army that had just re-occupied the Pentagon’s recently renovated Wedge One, named Resource Services Washington, lost 34 of its 45 employees [Fragged by Serco’s 8(a) protégé company Base One Technologies of New Rochelle, Westchester County NY]. Most were civilian accountants, bookkeepers and budget analysts. 3 Defense Secretary Rumsfeld had announced on the eve of the attack that more than $2 trillion was missing from the Pentagon.
More than half of the victims were in the Navy Command Center, a command-and-control facility on the first floor of the Pentagon’s D-Ring.
Many survivors suffered horrible injuries. Kevin Shaeffer was watching coverage of the attack in New York City with co-workers in the Navy Command Center when the plane struck, instantly killing 29 people in the same office. Shaeffer sustained second- and third-degree burns over 40 percent of his body. 4”
“Robert Philip Hanssen (born April 18, 1944) is a former U.S. Federal Bureau of Investigation (FBI) agent who spied for Soviet and Russian intelligence services against the United States for twenty-two years from 1979 to 2001. He is currently serving 15 consecutive life sentences at ADX Florence, a federal supermax prison near Florence, Colorado.
Hanssen was arrested on February 18, 2001 at Foxstone Park near his home in Vienna, Virginia, and was charged with selling U.S. secrets to the Soviet Union and subsequently the Russian Federation for more than US$1.4 million in cash and diamonds over a 22-year period.
On July 6, 2001, he pleaded guilty to 15 counts of espionage in the United States District Court for the Eastern District of Virginia.He was sentenced to 15 life terms without the possibility of parole. His activities have been described by the Department of Justice‘s Commission for the Review of FBI Security Programs as “possibly the worst intelligence disaster in U.S. history”.”
“Bernardine Rae Dohrn (née Ohrnstein; born January 12, 1942) was a leader of the Weather Underground, a group that was responsible for the bombing of the United States Capitol, the Pentagon, and several police stations in New York, as well as the Greenwich Village townhouse explosion that killed three members of the Underground. As a member of the Weather Underground, Dohrn helped to create a “Declaration of a State of War” against the United States government, and was placed on the FBI’s 10 Most Wanted list, where she remained for three years. From 1991 to 2013 she was a Clinical Associate Professor of Law at the Children and Family Justice Center at Northwestern University School of Law. She is married to Bill Ayers, a co-founder of the Weather Underground, who was formerly a tenured professor at the University of Illinois at Chicago.”
“RADICAL INFLUENCES AT YALE LAW SCHOOL
At Yale, Hillary was strongly influenced by the radical theoretician Duncan Kennedy, founder of the academic movement known as critical legal studies, which, drawing on the works of the Frankfurt School, viewed law as a “social construct” that corrupt power structures routinely exploited as an instrument of oppression to protect and promote their own bourgeois values at the expense of the poor and disenfranchised. Advocates of critical legal studies were interested in revolutionary change and the building of a new society founded on Marxist principles.
During her time at Yale, Hillary became a prominent figure in the campus protest movement. She wore a black armband in remembrance of the students killed at Kent State in May 1970; she led demonstrations against the Vietnam War; and she led rallies demanding that tampons be made available in the women’s restrooms on campus.
Hillary served as one of nine editors of the Yale Review of Law and Social Action, where she worked collaboratively with Mickey Kantor (who, more than two decades later, would serve as U.S. Trade Representative and U.S. Commerce Secretary under President Bill Clinton) and Robert Reich (who would serve as Bill Clinton’s Labor Secretary from 1993 to 1997). “For too long,” said the Yale Review, “legal issues have been defined and discussed in terms of academic doctrine rather than strategies for social change.” The publication was replete with articles by or about such radicals as William Kunstler, Charles Reich (author of The Greening of America); Jerry Rubin (who wrote a piece exhorting parents to “get high with our seven-year-olds,” and urging students to “kill our parents”); and Charles Garry (the civil rights attorney who defended Black Panther Party members accused of murder). The Fall and Winter 1970 editions of the Yale Review, on which Hillary worked as associate editor, focused heavily on the trials of Black Panthers who had been charged with murder. Numerous cartoons in those issues depicted police officers as hominid pigs.
One of Hillary’s Yale professors, Thomas Emerson (known as “Tommy the Commie”), introduced her to the aforementioned Charles Garry. Garry helped Hillary get personally involved in the defense of several Black Panthers (including the notorious Bobby Seale) who were then being tried in New Haven, Connecticut for the torture, murder, and mutilation of one of their own members. Though evidence of the defendants’ guilt was overwhelming, Hillary — as part of her coursework for Professor Emerson — attended the Panther trials and arranged for shifts of fellow students to likewise monitor court proceedings and report on any civil-rights abuses allegedly suffered by the defendants. (Those abuses could then be used, if the Panthers were to lose their case, as grounds for appeal.) Striving to neutralize what she considered the pervasive racism of the American legal system, “Hillary was,” as Barbara Olson observed in Hell to Pay, “a budding Leninist.”
In 1970, Hillary chaired a meeting where Yale Law School students voted in favor of joining a national strike against the Vietnam War.”
Kaczynski’s activities came to the attention of the FBI in 1978 with the explosion of his first, primitive homemade bomb. Over the next 17 years, he mailed or hand-delivered a series of increasingly sophisticated explosive devices that killed three people and injured 23 more.
The first mail bomb was sent in May 1978 to materials engineering professor Buckley Crist at Northwestern University. On May 25, the package was found in a parking lot at the University of Illinois at Chicago, with Crist’s return address. The package was “returned” to Crist, but when Crist received the package, he noticed that it was not addressed in his own handwriting. Suspicious of a package he had not sent, he contacted campus police officer Terry Marker, who opened the package, which exploded immediately. Marker required medical assistance at Evanston Hospital for injuries to his left hand.
The bomb was made of metal that could have come from a home workshop. The primary component was a piece of metal pipe, about 1 inch (25 mm) in diameter and 9 inches (230 mm) long. The bomb contained smokeless explosive powders, and the box and the plugs that sealed the pipe ends were handcrafted from wood. In comparison, most pipe bombs usually use threaded metal ends sold in many hardware stores. Wooden ends lack the strength to allow significant pressure to build within the pipe, explaining why the bomb did not cause severe damage. The primitive trigger device that the bomb employed was a nail, tensioned by rubber bands designed to slam into six common match heads when the box was opened. The match heads would burst into flame and ignite the explosive powders. When the trigger hit the match heads, only three ignited. A more efficient technique, later employed by Kaczynski, was to use batteries and heat filament wire to ignite the explosives faster and more effectively.
The initial 1978 bombing was followed by bombs sent to airline officials, and in 1979 a bomb was placed in the cargo hold of American Airlines Flight 444, a Boeing 727 flying from Chicago to Washington, D.C. The bomb began smoking, forcing the pilot to make an emergency landing. Some passengers were treated for smoke inhalation. Only a faulty timing mechanism prevented the bomb from exploding. Authorities said it had enough power to “obliterate the plane”.
As bombing an airliner is a federal crime in the United States, the FBI became involved after this incident and derived the code name UNABOM (UNiversity and Airline BOMber).U.S. Postal Inspectors, who initially had the case, labeled the suspect the “Junkyard Bomber” because of the material used to make the mail bombs. In 1979, an FBI-led task force that included the ATF and U.S. Postal Inspection Service was formed to investigate the case. The task force grew to more than 150 full-time investigators, analysts, and others. This team made every possible forensic examination of recovered components of the explosives and studied the lives of victims in minute detail. These efforts proved of little use in identifying the suspect, who built his bombs essentially from “scrap” materials available almost anywhere. The victims, investigators later learned, were chosen irregularly from library research.
In 1980, chief agent John Douglas, working with agents in the FBI’s Behavioral Sciences Unit, issued a psychological profile of the unidentified bomber which described the offender as a man with above-average intelligence with connections to academia. This profile was later refined to characterize the offender as a neo-Luddite holding an academic degree in the hard sciences, but this psychologically based profile was discarded in 1983 in favor of an alternative theory developed by FBI analysts concentrating on the physical evidence in recovered bomb fragments. In this rival profile, the bomber suspect was characterized as a blue-collar airplane mechanic. A 1-800 hotline was set up by the UNABOM Task Force to take any calls related to the Unabomber investigation, with a $1 million reward for anyone who could provide information leading to the Unabomber’s capture.”
“SUNDAY, JANUARY 31, 2010
QRS-11—Quartz Rate Sensor
The QRS-11 GyroChip sensor is used on commercial aircraft to rotate the antenna to receive signals from satellites for the in-flight entertainment system, radar tracking and flight controls. If the aircraft is equipped with an uninterruptable autopilot, signals can be received from a satellite to remotely fly the aircraft.
The sensor provides stabilization, flight control, and guidance. It also is used in missiles, Unmanned Aerial Vehicles (UAV ) and other military as well as space and industrial applications. Because of the sensitive nature of its military applications, the export of the technology is regulated.
We allege that the QRS-11 can be used as part of a package of technology to guide aircraft equipped with uninterruptable autopilots turning them into weapons.
We believe that the patent for the device was originally obtained by the Rose Law Firm of Little Rock, AR, specifically by patent lawyer Hillary Clinton, for BEI Technologies, Inc. headquartered at that time in Arkansas.
BEI has diversified many times since then and the QRS-11 is now Manufactured by CST Systron Donner Inertial.”
“Controlled fragmentation of multi-walled warheads
US 3566794 A
2 Mar 1971
26 Nov 1958
6 Nov 1958
CONTROLLED FRAGMENTATION 01F MULTI-WALLED WARI’IEADS The invention herein described may be manufactured and used by or for the Government of the United States of America for governmental purposes without the payment of any royalties thereon or therefor.
This invention relates to explosive warheads; more specifically it relates to fragmentation warheads for antipersonnel use.
This application is similar to application Ser. No. 582,896, filed 4 May 1956, but goes beyond the scope of said application in applying the teachings thereof to multiwalled warhead casings.
Prior attempts at fragmentation control in impulsively loaded bodies such as warheads have generally involved the cutting of grooves on the surfaces, both inner and outer, of such bodies or the placing of plastic liners of predetermined shape between the inner surfaces of such bodies and the explosives contained therein. Such practices produced local regions of high stress which initiated points of fracture, but complete fragmentation control did not result therefrom.
As pointed out in the aforementioned application fragmentation is a function of wall thickness as well as the groove pattern.
Applicants have discovered that further control of fragmentation may be attained by utilizing a plurality of walls in the warhead casing, by cutting grooves on the inner surface of each such wall, and by the orientation of the groove patterns so cut on the walls.
Accordingly, it is an object of this invention to provide a method for closer control of the fragmentation of impulsively loaded bodies than the methods of the prior art.
Another object is to produce a greater number of lethal fragments from a given mass of metal through the elimination of very large fragments and very fine ones. Applicants believe that fragments ranging from one-half to 4 grams are the most lethal against personnel and light military equipment.”
“Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”
“The Lewes bomb was a blast-incendiary field expedient explosive device, manufactured by mixing diesel oil and Nobel 808 plastic explosive. It was created by Lieutenant Jock Lewes, one of the original members of L Detachment SAS in 1941 [and introduced to the Bilderberg in 1954 by Sir Colin Gubbins, who had headed the Special Operations Executive (SOL) during the war]. The SAS needed a combined incendiary and explosive device light enough to be carried by a small group of commandos yet powerful enough to destroy and set fire to aircraft on an enemy airfield. Weighing approximately 1 pound (0.45 kg), the Lewes Bomb could be carried in quantity by an individual.
The only available bomb at the time was too cumbersome to be carried by a paratrooper. Lewes experimented with various types of incendiary and explosive materials, using trial and error. The final design used a pound of plastic explosive, mixed with a quarter pound of thermite and a small amount of diesel oil. Inside the mass was inserted a 2 ounce dry guncotton booster, plus a detonator attached to a thirty-second fuse. Alternatively, Lewes bombs could be triggered by pencil detonators or booby-trap firing devices such as pressure release switches.”
“Serco do a bunch more that didn’t even make our story: As well as thanking God for his success, CEO Chris Hyman is a Pentecostal Christian who has released a gospel album in America and fasts every Tuesday. Amazingly, he was also in the World Trade Centre on 9/11, on the 47th floor addressing shareholders. Serco run navy patrol boats for the ADF, as well as search and salvage operations through their partnership with P&O which form Defence Maritime Services. Serco run two Australian jails already, Acacia in WA and Borallon in Queensland. They’re one of the biggest companies In the UK for running electronic tagging of offenders under house arrest or parole.”
“Origins of the Bilderberg meetings .. The immediate chain of events leading to the setting up of the first conference was as follows. Prince Bernhard set off for the USA in 1952 to visit his old friend Walter Bedell Smith, director of the newly-formed CIA. Smith put the organisation of the American end into the hands of Charles D. Jackson (special assistant for psychological warfare to the US President), who appointed John S. Coleman (president of the Burroughs Corporation. and a member of the Committee for a National Trade Policy), who in turn briefly became US chair of Bilderberg.
It was thus a European initiative, and its aim was, in official bland language, to ‘strengthen links’ between Western Europe and the USA. A selected list of people to be invited to the first conference was drawn up by Retinger, with Prince Bernhard and Rijkens, from the European countries of NATO plus Sweden. The resulting group consisted of the Belgian and Italian prime ministers, Paul van Zeeland and Alcide de Gasperi (CDU), from France both the right wing prime minister Antoine Pinay and the Socialist leader Guy Mollet; diplomats like Pietro Quaroni of Italy and Panavotis Pipinelis of Greece; top German corporate lawyer Rudolf Miller and the industrialist Otto Wolff von Amerongen and the Danish foreign minister Ole Bjorn Kraft (publisher of Denmark’s top daily newspaper); and from England came Denis Healey and Hugh Gaitskell from the Labour Party, Robert Boothby from the Conservative Party, Sir Oliver Franks from the British state, and Sir Colin Gubbins, who had headed the Special Operations Executive (SOL) during the war [and allegedly introduced the 8(a) Zulu fragmentation bomb to the Bilderberg] “
“Serco farewell to NPL after 19 years of innovation 8 January 2015 Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco’s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry. Some of the key achievements during that time have been: … It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade….NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading in the City through NPLTime”
“Support Services for Starwood Hotels Group Starwood Hotels Group, owner of some of the world’s most prestigious hotels, has appointed Serco as preferred bidder for a £7m contract to provide a range of support services to the Sheraton Grand in Edinburgh, the Westin in Dublin and the 5 star Turnberry resort on Scotland’s west coast. The contract, which has a 5 year term, is an extension to services already provided to other [Innholders] hotels in the Starwood Group and includes buildings maintenance and security, engineering support and [WiFi] help desk services.”
Jan 31, 2001
SBA modernizes to help feed its growing programs [Field McConnell’s sister Kristine Marcy introduced the 8(a) electronic accelerated loan guarantee program at SBA to ensure funding for the Serco protégés’ participating in the 9/11 carbon cap]
BY PATRICIA DAUKANTAS | GCN STAFF
Under a five-year plan for overhauling its information technology systems, the Small Business Administration recently acquired new software for financial and other administrative tasks.
By the time SBA celebrates its 50th anniversary in 2003, agency officials want all their programs up and running around the clock, chief financial officer Joseph Loddo said.
In the first phase of the modernization, the agency has upgraded systems for managing its extensive portfolio of guaranteed loans, chief operating officer Kristine Marcy said.
SBA processed its first electronic loan last November through its Sacramento, Calif., office and plans to add more private lenders during fiscal 2001.
The agency’s staffing level has dropped 22 percent over the past eight years, which is another reason to improve IT, Marcy said. Over the past decade, SBA’s portfolio of loans to small and disadvantaged businesses has more than doubled to $50 billion.
‘We’re a small agency with a huge portfolio,’ Marcy said. SBA supplies more than half of the U.S. venture capital available each year.
Seventy percent to 80 percent of the loans are booked through a preferred lender program [structured by Serco], which involves nearly 7,000 banks, Marcy said. SBA guarantees the loans, just as the government backs student and housing loans.
‘The financial and IT businesses were changing so rapidly, we had to make some changes to stay current with the private sector,’ Marcy said. Banks had been asking SBA to make faster decisions on loan guarantees. The agency decided to aim for a turnaround time of one hour.”
“BASE ONE CERTIFICATIONS Base One [a Serco protégé company] is NO longer an 8(a), or HubZone certified company. Base One is a Small Business and a Women Owned Small Disadvantaged Business. Base One previously held certifications by the SBA. Please disregard any references to Base One being currently certified as an 8(a) or HubZone firm by the SBA. Base One Technologies Expertly researches, designs, and develops information security policies that protect your data and manage your firm’s information technology risk at levels acceptable to your business. Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report.
Develops and implements multi-layer Information Security Solutions, practices and procedures. We deploy Intrusion Detection Systems (IDS) and IP Security with VPN solutions using Cisco routers, Frame Relay, firewalls, address and port translation, obscurity standards and authentication technologies (AAA, 3DES, TACACS, etcŠ), to enhance and meet the level of Data Security required for global organizations.
Conducts IT Security and Risk Assessment in Federal government as well as security testing, implementing security for multiple platforms and operating systems around the world.
Ability to conduct business process analysis to provide technical security countermeasures, risk management and data communications security planning for large organizations.
Provides computer security integration for web server and traditional client-server based applications. We secure environments up to as many layers as required by our clients’ policies, industry practices, and regulating bodies – including the desktop and user experience as required. Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions.”
“Preparing the 8(a) application package .. Definition of Socially and Economically Disadvantaged Individuals
Socially disadvantaged individuals are those who have been subjected to racial or ethnic prejudice or cultural bias because of their identities as members of groups without regard to their individual qualities. The social disadvantage must stem from circumstances beyond their control. In the absence of evidence to the contrary, the following individuals are presumed to be socially disadvantaged:
Black Americans; Hispanic Americans (persons with origins from Latin America, South America, Portugal and Spain); Native Americans (American Indians, Eskimos, Aleuts, and Native Hawaiians); Asian Pacific Americans (persons with origins from Japan, China, the Philippines, Vietnam, Korea, Samoa, Guam, U.S. Trust Territory of the Pacific Islands [Republic of Palau], Commonwealth of the Northern Mariana Islands, Laos, Cambodia [Kampuchea], Taiwan, Burma, Thailand, Malaysia, Indonesia, Singapore, Brunei, Republic of the Marshall Islands, Federated States of Micronesia, Macao, Hong Kong, Fiji, Tonga, Kiribati, Tuvalu, or Nauru); Subcontinent Asian Americans (persons with origins from India, Pakistan, Bangladesh, Sri Lanka, Bhutan, the Maldives Islands or Nepal); And members of other groups designated from time to time by the SBA.
In addition, an individual who is not a member of one of the above-named groups may apply for 8(a) certification. However, the applicant must establish social disadvantage on the basis of clear and convincing evidence.
Economically disadvantaged individuals are socially disadvantaged individuals whose ability to compete in the free enterprise system has been impaired due to diminished capital and credit opportunities, as compared to others in the same or similar line of business and competitive market area who are not socially disadvantaged. For purposes of program entry, an individual whose personal net worth (excluding the equity in their personal residence and business) exceeds $250,000 will not be considered economically disadvantaged.
Woman-Owned Businesses [Obama’s structural feminists]
A woman-owned business may be recognized as a “socially disadvantaged firm” if the owner is a member of one of the groups for which social disadvantage is presumed. If the woman is not a member of one of the groups for which social disadvantage is presumed, she must establish her individual disadvantage on the basis of clear and convincing evidence that she has suffered discriminatory treatment because of her gender and that this treatment has impeded her entry into or advancement in the business world. SBA will consider any pertinent evidence but will give particular attention to evidence of discriminatory practices suffered in the areas of education, employment and the business world.”
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation