#2718: May’s Death-Bet Pedophile Cabinet – Serco Clinton 8(a) Server – Zulu Dallas Money Shots
United States Marine Field McConnell
Plum City Online – (AbelDanger.net)
July 12, 2016
1. Abel Danger (AD) claims that Theresa May – a former senior advisor in International Affairs at the Association for Payment Clearing Services – has equipped the UK Cabinet Office with death-betting networks for use by blackmailed pedophiles to time victim deaths.
2. AD claims that May’s cabinet colleagues ordered a Serco 8(a) protégé company Base One Technologies, to equip the Clinton Foundation with servers so pay-to-play insiders could bet on the time of death of Hillary Clinton’s rivals and enemies and whistle-blowers.
3. AD claims that May’s death-betting cabinet used Zulu timing signals from a Serco cesium clock to procure the money shot time for the death of alleged sniper Micah Johnson – blown up in Dallas by a robot bomb allegedly designed by DOJ Pride’s ATF agents.
4. United States Marine Field McConnell asks James Comey – a former director of Serco‘s banker HSBC and the current FBI director – to hand over any evidence of the hostile actors (Gary McKinnon 9/11?) who, Comey said, may have exploited Clinton’s extreme carelessness in the use of 8(a) servers to the families of police killed in Dallas so they can develop class-action suits for the wrongful death of their relatives (https://abeldanger.blogspot.com/2010/01/field-mcconnell-bio.html).
Spies, Lords & Predators: “Murders by Westminster Paedophile Ring”
Police Use Unprecedented Robot Bomb Tactic To Kill Dallas Cop Killer
Dallas shooting witness: I heard about 20 gunshots
Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders!
(Mobile Playback Version)
White’s Club death-bet bookmaker services dates back to 1743 and – as Cameron’s friend, Churchill’s grandson and Serco CEO Rupert Soames well knows – only the technology to spot fix the Zulu time of victim death has changed.
Serco… Would you like to know more?
Defense Ammunition Center [Outsourced to Serco]
“Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”
“Theresa Mary May (née Brasier; born 1 October 1956) is a British politician who is Prime Minister-in-waiting and Leader of the Conservative Party since 11 July 2016, the Home Secretary since 2010, and the Member of Parliament (MP) for Maidenhead since 1997. Identifying as a One-Nation Conservative [conserve central banking] and characterised as a liberal conservative, May is expected to replace David Cameron as Prime Minister of the United Kingdom following a meeting with Queen Elizabeth II on 13 July. …
On 12 May 2010, when May was appointed Home Secretary and Minister for Women and Equality by Prime Minister David Cameron as part of his first Cabinet, she became the fourth woman to hold one of the British Great Offices of State, after (in order of seniority) Margaret Thatcher (Prime Minister), Margaret Beckett (Foreign Secretary) and Jacqui Smith (Home Secretary). As Home Secretary, May is also a member of the National Security Council.She is the longest-serving Home Secretary for over 60 years, since James Chuter Ede who served over six years and two months from 1945 until 1951. May’s appointment as Home Secretary was somewhat unexpected, as Chris Grayling had served as shadow Home Secretary in opposition.
May’s debut as Home Secretary involved overturning several of the previous Labour Government’s measures on data collection and surveillance in England and Wales. By way of a Government Bill which became the Identity Documents Act 2010, she brought about the abolition of the Labour Government’s National Identity Card and database scheme and reformed the regulations on the retention of DNA samples for suspects and controls on the use ofCCTV cameras. On 20 May 2010, May announced the adjournment of the deportation to the United States of alleged computer hacker Gary McKinnon.She also suspended the registration scheme for carers of children and vulnerable people.
On 4 August 2010 it was reported that May was scrapping the former Labour Government’s proposed “go orders” scheme to protect women from domestic violence by banning abusers from the victim’s home. This was followed on 6 August 2010 by the closure of the previous government’s “ContactPoint” database of 11 million under-18-year-olds designed to protect children in the wake of the Victoria Climbié child abuse scandal.…
Between 1977 and 1983 May worked at the Bank of England, and from 1985 to 1997 as a financial consultant and senior advisor in International Affairs at the Association for Payment Clearing Services. Her parents both died some years after her graduation, her father in a car accident and her mother of multiple sclerosis the year after.”
“Former MI5 chief ‘involved in child sex abuse cover-up’
Jul 23, 2015
Newly discovered government documents also relate to senior Westminster figures, including Leon Brittan The former head of Britain’s intelligence service urged the government to cover up allegations of child sexual abuse against a senior MP, freshly uncovered documents have revealed.
Writing to cabinet secretary Sir Robert Armstrong in 1986, MI5 director general Sir Antony Duff said “the risk of political embarrassment to the government is rather greater than the security danger”.
The correspondence was about an unnamed MP who was alleged to have “a penchant for small boys,” but Duff said he accepted the politician’s denial of the abuse.
The documents, originally thought to have been lost or destroyed, were discovered in a Cabinet Office storeroom of “assorted and unstructured papers,” The Times reports.
The discovery comes months after an official review into whether allegations of child abuse were covered up by the Home Office in the 1980s found no evidence that records were deliberately removed.
However, in a supplementary report “quietly” released yesterday, the authors of the report condemned the government’s record keeping and called for an extensive search of Whitehall archives.
The freshly unearthed files also include documents about senior Westminster figures including Margaret Thatcher’s former parliamentary secretary Sir Peter Morrison, former home secretary Leon Brittan, and former minister Sir William van Straubenzee. The contents of those documents have not been revealed.
There are also papers relating to former MI6 chief Sir Maurice Oldfield and his alleged connection to the abuse scandals at the Kincora boys’ home in Northern Ireland.
The Home Office said the files will be handed over to the child abuse inquiry, which began earlier this month. The police are also investigating the material.
Simon Danczuk, the Labour MP who has long campaigned on the issue of child sexual abuse and who exposed the Cyril Smith scandal, has called the documents “explosive”.
“This confirms what I’ve long suspected – that the full weight of the British establishment, including MI5, colluded in a cover-up to protect politicians who sexually abused young boys.””
“UK Cabinet Office – Emergency Planning College – Serco …..Types of Exercise Workshop Exercises
These are structured discussion events where participants can explore issues in a less pressurised environment. They are an ideal way of developing solutions, procedures and plans rather than the focus being on decision making. Table Top Exercises These involve a realistic scenario and will follow a time line, either in real-time or with time jumps to concentrate on the more important areas. The participants would be expected to be familiar with the plans and procedures that are being used although the exercise tempo and complexity can be adjusted to suit the current state of training and readiness. Simulation and media play can be used to support the exercise. Table-top exercises help develop teamwork and allow participants to gain a better understanding of their roles and that of other agencies and organisations. Command/Control Post Exercises These are designed primarily to exercise the senior leadership and support staff in collective planning and decision making within a strategic grouping. Ideally such exercises would be run from the real command and control locations and using their communications and information systems [Feeling lucky, Punk?].
This could include a mix of locations and varying levels of technical simulation support. The Gold Standard system is flexible to allow the tempo and intensity to be adjusted to ensure maximum training benefit, or to fully test and evaluate the most important aspects of a plan. Such exercises also test information flow, communications, equipment, procedures, decision making and coordination. Live Exercises These can range from testing individual components of a system or organisation through to a full-scale rehearsal. They are particularly useful where there are regulatory requirements or with high-risk situations. They are more complex and costly to organise and deliver but can be integrated with Command Post Exercises as part of a wider exercising package.”
“On July 7, 2016, Micah Xavier Johnson ambushed and shot a group of people in Dallas, Texas, killing five police officers and injuring eight. Two members of the public were also hurt. Johnson was an Army Reserve Afghan War veteran who was reportedly angry over police shootings of black men and stated that he wanted to kill white people, especially white police officers. The shooting happened at the end of a peaceful Black Lives Matter protest against police killings of Alton Sterling in Baton Rouge, Louisiana, and Philando Castile in Falcon Heights, Minnesota, which had occurred in the preceding days.
Following the shooting, police confronted Johnson at a parking garage, and a standoff ensued. In the early hours of July 8, police killed Johnson with a bomb attached to a remote control bomb disposal robot. It was the first time an American police department used a robot to kill a suspect.
The shooting was the deadliest incident for U.S. police since the terrorist attacks of September 11, 2001, surpassing a pair of shootings in March 2009 in Oakland, California and a November 2009 shooting in Lakewood, Washington, both of which killed four officers.”
“Police drop investigation into Serco prisoner transport contract
The outsourcing group said there was no evidence of individual or corporate wrongdoing
By Marion Dakers 7:42AM GMT 19 Dec 2014
The City of London Police has closed an investigation into Serco‘s prisoner transport contract after more than a year of work, enabling the firm to continue with the contract until 2018.
The Ministry of Justice called in the police in August 2013 to examine whether Serco had misleadingly recorded prisoners as being ready for court when they were not, in order to meet the performance criteria of the contract.
However, Serco said on Friday that the probe into the Prisoner Escort and Custody Services (PECS) contract had been closed after the police found no evidence to support bringing charges against the outsourcing firm or its staff.
“The information obtained was also sufficient for the City of London Police to conclude there was no evidence of any corporate-wide conspiracy or an intention to falsify figures to meet the DRACT [designated ready and available for court time] contract requirement by senior Serco management or at the board level of the company,” the firm said in a statement.
The Ministry of Justice had said it would end the contract immediately if the firm’s board was found to have done wrong.”
“FBI: ‘Hostile Actors’ Likely Hacked Clinton Email Secrets
Comey recommends not prosecuting presumed Democratic nominee
BY: Bill Gertz July 6, 2016 5:00 am
An extensive FBI investigation found evidence that foreign government hackers accessed private emails sent by former secretary of state Hillary Clinton but no direct evidence spies hacked into the several unsecure servers she used.
FBI Director James Comey revealed Tuesday the 11-month probe into Clinton’s private email servers uncovered negligent handling of very sensitive classified information that was placed on several unsecure servers between 2009 and 2013, when Clinton served as secretary of state.
In an unusual public announcement, Comey outlined findings that included discovery of highly classified information sent and received on Clinton’s private email servers, and signs that “hostile actors” gained access to email accounts of people who were sharing emails with Clinton.
“Serco Awarded New $12 Million C4I Contract with the U.S. Navy
July 7, 2016 RESTON, VIRGINIA – July 7, 2016 – Serco Inc., a provider of professional, technology, and management services, announced today that the Company has been awarded a contract to deliver Command, Control, Communications, Computers and Intelligence (C4I)/IT infrastructure installation for the new Command and Control Facility at Offutt Air Force Base in Omaha, Nebraska. The Navy’s SPAWAR Systems Center Pacific (SSC Pacific) is leading the effort to upgrade the IT infrastructure in support of the United States Air Force. The new four-year contract awarded by SSC Pacific is valued at $12 million, including options.
Following the Air Force’s vision to build a state-of-the-art facility with the flexibility to support operations for the next 50 years, Serco will design, procure, integrate, and install C4I and IT network systems.”
“Defense Ammunition Center (DAC)
Contract Type: Fixed Price
Period of Performance: 10/1/2008 to 9/30/2013
Since 2008, Serco has assisted DAC with the analysis, design, development, implementation, management/ administration, and evaluation of integrated, enterprise-wide and component-specific training, learning, knowledge management, and strategic human resource management interventions that are critical to achieving their mission. Serco holds an OPM TMA TO with DAC and also a contract through GSA Millenia Lite. When the GSA contract could not support all of DACs needs, Serco recommended the use of the OPM TMA vehicle. Through these contracts, Serco provides training program management support to deliver multi-faceted best practice solutions in training development and delivery, knowledge management, portal technologies, course conversions (ILT and CBT to WBT), mobile performance applications, and Learning Management Systems support. Serco applies the ADDIE model to all course development activities including ILT, WBT, and leading-edge technologies including mobile performance applications. Serco provided LMS support and also developed and continues to manage DAC’s Ammunition Community of Excellence. … The CoP provides a repository of relevant materials, a forum for collaborative sharing of information, and an “Ask an Expert” capability for soldiers to receive answers to their questions from qualified DAC resources. The CoP enjoys more than 10,000 active members and has received numerous accolades from appreciative members. Most recently, Serco proposed the inclusion of mobile application tools and games to reinforce training and provide continuous and “in the field” performance support. To date, Serco has developed six mobile apps which have been distributed for both the iOS (Apple App Store) and Android (Google Play) environments. Together, these apps have reached over 15,000 soldiers and have allowed DAC to become a center of excellence in this burgeoning training environment.
Intended or Achieved Result:
Through the design and delivery of customized instructor-led, web-based training and distribution of mobile performance supports, Serco has increased the number of DAC learners by 10–15% year over year. Serco has increased the number of DAC learners reached annually by 10%–15% via varied modalities.
In 2011 alone:
110,000 Soldiers took a Serco-authored DAC Distance Learning course 15,000 Soldiers participated in a Serco-developed, DAC-sponsored ILT course 15,000 people used the Serco-administrated DAC Ammunition CoP to discover information, references or collaborate with other ammunition professionals””
“Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994. This file was obtained from the Secretary of State and has a file number of 1795583.
This business was created 7,695 days ago in the New York SOS Office and the registered agent is C T Corporation System that does business at 111 Eighth Avenue , New York in New York.
After conducting a search for principals and owners of Base One Technologies, Ltd., we were able to find 2 owners and/or executives. Their information is listed below. This file was last updated on May 14, 2013.
Liza R Zaneri
Chief Executive Officer
15 Irving Place
New Rochelle, NY 10801″
“Serco‘s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals.” http://www.dtic.mil/whs/directives/corres/pdf/100515p.pdf
“[DOJ Pride and Serco‘s 8(a) protégé company Base One Technologies] Information Security Services
Information Security Planning is the process whereby an organization seeks to protect its operations and assets from data theft or computer hackers that seek to obtain unauthorized information or sabotage business operations. Without a properly planned and managed Information Security Plan, an organization runs the risk of law suits, loss of data, compromised operations and loss of reputation. Our experts have secured some of the world largest and most complex commercial and carrier networks, as well as conducted extensive analysis and implementation work on some of the Federal Government’s most sensitive and critical environments, such as the FAA [and the Serco-mentored Pentagon Renovation project].
Base One Technologies takes your information security needs seriously! We conduct business analysis, install solutions and protect your network from unauthorized entry and data loss. We are there in the beginning to provide guidance and support to your data security program, through to implementation and eventually during the support life cycle providing process and procedures for incident reporting, analysis and counter measures.
Base One Technologies
Expertly researches, designs, and develops information security policies that protect your data and manage your firm’s information technology risk at levels acceptable to your business.
Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report.
Develops and implements multi-layer Information Security Solutions, practices and procedures. We deploy Intrusion Detection Systems (IDS) and IP Security with VPN solutions using Cisco routers, Frame Relay, firewalls, address and port translation, obscurity standards and authentication technologies (AAA, 3DES, TACACS, etcŠ), to enhance and meet the level of Data Security required for global organizations.
Conducts IT Security and Risk Assessment in Federal government as well as security testing, implementing security for multiple platforms and operating systems around the world.
Ability to conduct business process analysis to provide technical security countermeasures, risk management and data communications security planning for large organizations.
Provides computer security integration for web server and traditional client-server based applications. We secure environments up to as many layers as required by our clients’ policies, industry practices, and regulating bodies – including the desktop and user experience as required. Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions.”
“Originally appeared at Chuck Baldwin LIVE A missionary friend of mine in Eastern Europe recently gave me a heads up regarding an excellent article written by Sebastian Swift entitled “5 Confirmed False Flag Operations And How To Spot Them In The Future.”
Swift writes, “The false flag phenomenon is distinctively modern and used as an ideological weapon to control populations with the fear of a manufactured enemy. They are used in ostensibly democratic systems where people believe they have inalienable rights. Such democratic systems–primarily the United States, Israel, and Great Britain–must shock people into sociopolitical and geopolitical consent and, as such, require sophisticated modern propaganda systems and advanced covert operations teams with highly proficient skills.”
Here are his telltale signs of a false flag operation:
There is an immediate comprehensive narrative, including a convenient culprit. Law enforcement, government agencies, and the mainstream media immediately proffer a narrative that completely explains the event and encourages citizens to tie their intellectual understanding of the tragedy to the emotions they experience. In his lecture at Contact in the Desert, [author and researcher] Richard Dolan noted that a distinguishing characteristic of a false flag operation is that the official narrative IS NOT questioned by the media. There are often legislative, ideological and sociopolitical power plays waiting in the wings, which the government can immediately implement.
The official narrative has obvious domestic and geopolitical advantages for the governing body. The Bush administration used 9/11 to usher in the War on Terror, which has served as a lynchpin for countless civil liberty infringements by the national security state, including ubiquitous domestic surveillance and indefinite detention.
The narrative behind the attack serves to leverage emotions like fear, as well as patriotism, in order to manufacture consent around a previously controversial issue. For example, many of the recent domestic terror attacks, including the Aurora [and Orlando] shooting[s], have exacerbated and reinforced advocacy of gun control legislation.
Military training drills and police drills occur on the day of and very near the attack itself, causing confusion to obscure eye witness testimony and allowing orchestrators to plant both patsies, disinformation and backup operatives. This is no small point. An incredible percentage of major domestic or international terror attacks have involved simultaneous “training drills.” This list includes, but is not limited to, the infamous NORAD drills of 9/11, the 7/7 London Bombings, the 2011 Norway shooting, the Aurora shooting, Sandy Hook, and the Boston Marathon. Though none of the aforementioned events can be confirmed or denied without a doubt, they bear a striking resemblance to previous false flag attacks and should be looked at with an investigative eye…
Our Founding Fathers believed their government (the British Crown) was deliberately conspiring against them. Thomas Jefferson said as much in our Declaration of Independence:
“Prudence, indeed, will dictate that Governments long established should not be changed for light and transient causes; and accordingly all experience hath shewn, that mankind are more disposed to suffer, while evils are sufferable, than to right themselves by abolishing the forms to which they are accustomed. But when a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security.”
Read it again: “But when a long train of abuses and usurpations, pursuing invariably the same Object evinces a DESIGN to reduce them under absolute Despotism . . . .” Jefferson and the rest of America’s founders believed that there was a “design” (i.e, “plot,” “scheme,” or “conspiracy,” if you please) to “reduce them under absolute Despotism.” So, if you believe that government conspiracy is only for kooks, you must include America’s Founding Fathers in that group….
Again, I submit if we deliberately “shut our eyes against a painful truth,” liberty is not long for this country. And that includes admitting when a tragedy is NOT a conspiracy. But it also means admitting when evidence suggests that it IS.”
“[White’s Club member] Rupert Christopher Soames OBE (born 18 May 1959) is a British businessman, CEO of the outsourcing company Serco. Soames was born in Croydon, Surrey, to Lord and Lady Soames. He is a grandson of Sir Winston Churchill, a nephew of the former Defence Secretary Duncan Sandys and Diana Churchill; the journalist Randolph Churchill and the actress and dancer Sarah Churchill and a great-nephew of the founders of the Scout movement, Robert Baden-Powell and Olave Baden-Powell. His brother is the Conservative MP Sir Nicholas Soames.
Soames was educated at St. Aubyns Preparatory School in Rottingdean, East Sussex and Eton College, and then Worcester College at the University of Oxford, during which time he worked as a DJ at the London nightclub Annabel’s, as well as being elected to the Presidency of the Oxford Union.
Upon graduation, he was offered a position at General Electric Company (GEC) by the managing director Arnold Weinstock. He remained at GEC for 15 years, working in the company’s avionics and computing divisions, and became managing director of Avery Berkel, running the company’s UK, India, Asia and Africa operations.
After leaving GEC in 1997, Soames joined the software company Misys as chief executive of its Midas-Kapiti division. He was promoted to chief executive of the Banking and Securities Division in June 2000.
Soames left Misys after a disagreement with Misys founder Kevin Lomax on the company’s direction, and was appointed chief executive of power hire group Aggreko in June 2003, replacing Philip Harrower who died when his car collided with a train in the United States.
Soames was appointed Officer of the Order of the British Empire (OBE) in the 2010 New Year Honours. In November 2010 Rupert Soames gave a speech to Holyrood in which he warned, “In the UK, we are already close to the rocks, because, over the next 8 years a third of our coal-fired capacity, two-thirds of our oil-fired capacity, and nearly three-quarters of our nuclear capacity will be closed down either through age or the impact of the European Large Combustion Plant Directive. Absent a massive and immediate programme of building new power stations, with concrete being poured in the next two years, we will be in serious danger of the lights going out.”
“Serco do a bunch more that didn’t even make our story: As well as thanking God for his success, CEO Chris Hyman is a Pentecostal Christian who has released a gospel album in America and fasts every Tuesday. Amazingly, he was also in the World Trade Centre on 9/11, on the 47th floor addressing [Serco] shareholders Serco run navy patrol boats for the ADF, as well as search and salvage operations through their partnership with P&O which form Defence Maritime Services. Serco run two Australian jails already, Acacia in WA and Borallon in Queensland. They’re one of the biggest companies In the UK for running electronic tagging of offenders under house arrest or parole.”
“Serco farewell to NPL after 19 years of innovation
8 January 2015
Sercosaid goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco‘s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade….
NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading in the City through NPL [Zulu] Time.”
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation