#2725: Clinton 8(a) Benghazi Server – May’s 3PL In DOJ Pride – Serco Snuff Of Zulu SEALs
United States Marine Field McConnell
Plum City Online – (AbelDanger.net)
July 20, 2016
1. Abel Danger (AD) claims that Hillary Clinton used a server network operated by 8(a) companies funded through the SBA’s phony-loan programs to coordinate the Benghazi attacks of 9/11/12 on behalf of a supranational government of world bankers and feminist elites.
2. AD claims that former UK Home Secretary Theresa May used the Blue Mountain Group as a third-party logistics (3PL) company to provide Clinton feminists in DOJ Pride with unarmed guards in Benghazi so the feminists could have the late U.S. Ambassador to Libya Christopher Stevens killed without risking their own or their partners’ lives.
3. AD claims that Serco used 8(a) servers to mentor the movement of ammo, visas and unarmed guards by Blue Mountain and to back-haul snuff films in Zulu time showing the feminists how the former Navy SEALs Glen Doherty and Tyrone Woods died on 9/12/12.
4. United States Marine Field McConnell asks James Comey – a former director of one of Serco’s shareholder bankers HSBC and the current FBI director – to hand over any evidence of hostile actors or third-party logistics on the Clinton 8(a) server network which might help families sue for the wrongful deaths of relatives in Benghazi on 9/11-12/12.
“Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”
“BLUE MOUNTAIN GROUP
June 20, 2016
My recent article on the G4S Security firm and its connection to the Orlando Shooter and the Department of Homeland Security has generated a tremendous response. Many people have asked if the G4S Company was involved with providing security for our consulate in Benghazi when it was attacked on September 11, 2012 and four brave Americans were murdered.
The firm in charge of security at Benghazi was the Blue Mountain Group, and I have not uncovered any relationship between it and G4S other than the fact that the G4S headquarters is in England and Blue Mountain is in Wales. However, what occurred with Blue Mountain makes its employment by Hillary Clinton and the State Department just as much of a scandal as that involving G4S.
Much of this information was reported by the Reuters News service in October of 2012, but it accepted the State Department’s explanation as to the reason for hiring the Blue Mountain Group. The department claimed that federal law required it to accept the lowest bidder for all contracts, however, I don’t buy this explanation and based on my research have reached a different and far more insidious explanation.
According to the Reuters article Blue Mountain employed local Libyans as security guards that went through no real background checks and were poorly trained. They were not allowed to carry firearms, and were told that they had to patrol the compound with flashlights and batons. They were also instructed that if they detected an impending threat to the consulate they were to radio that in and then runaway and hide.
In fact, I have found no records that prove that Blue Mountain Group was hired for Benghazi security because it was the low bidder. There were many other security firms that had very good reputations, provided armed guards, and were providing adequate security to U.S. Embassies and other facilities around the world. Yet, it appears that none of them were offered the Benghazi contract.
I believe that based on my research Blue Mountain Group was hired because it was the only company to agree to Hillary Clinton’s demand that the firm provide guards who were not carrying firearms in what was clearly a dangerous area of the world. This makes no sense. Was it some form of insane political correctness that caused the Secretary of State to prohibit consular security from having armed guards that may have been able to save the lives of Americans who were working for our country and Hillary Clinton?
Unfortunately, there is more to this story. It is clear that the Benghazi attack was well planned and organized, and that the attackers knew when Ambassador Chris Stevens was going to be in Benghazi, where he would be in the compound, and what type of security would be protecting him. I can only identify two possible sources that could have provided this information. First is that one or more of the security employees hired by Blue Mountain gave the information to the terrorists that launched the attack. There had already been one previous incident involving the local security guards. Two of them were suspected of actually throwing a firebomb into the compound. One was fired, but the other stayed on the payroll.
The other possible source of the breach of security is the private server illegally maintained by Clinton. Several emails have been uncovered that detailed the itinerary and movements of Ambassador Chris Stevens prior to the day of the attack. Whether it was the betrayal of a Libyan security guard, or a hacking of the email server, it occurred under Hillary Clinton’s watch. At best she is guilty of gross negligence, and violation of federal laws regarding private email servers, so who else has been put at risk? Now she wants to be our President!”
“JULY 20, 2016
The Triumph of Imperialist Feminism: Hillary vs the Immense Revolution
by BILL MARTIN
Herbert Marcuse said somewhere that, despite the appearance of great dynamism in capitalist society, nothing really happens. This could be Marcuse’s gloss on Shakespeare: sound and fury, etc. Written over about eight weeks, and showing the marks of particular days a bit more than I would like, the following is a long discussion of what, in the end, signifies something very close to nothing. The very simple takeaway might be that the Clintons have done a wonderful job of high-jacking certain Sixties and “progressive” motifs, and liberals, so-called progressives, and many so-called leftists are sucking it up. The result is the consolidation of what I am calling “imperialist feminism,” and the reason why so many who should know better are buying into it is that they are attached to the imperialist system in both body and mind.”
“Jack Phillips Many of the responsibilities of the Home Secretary, at least from what I can tell, are divided up between several departments within the Cabinet of The United States, who are advisors to the President and integral to the executive branch. For instance, border patrol, immigration, etc., are part of the duties assigned to the Secretary of Homeland Security. Other duties the Home Secretary may handle are handled by the Attorney General and perhaps the Secretaries of Health and Human Services or Interior in the U.S. Also, some of the duties of a Home Secretary would be handled by the individual states in the U.S., as determined by the constitution, and thus not handled in the executive branch of the federal government. Written Oct 16, 2015”
“In Theresa May’s government, the macho men make the noise and the women run the country
Likewise, Westminster obsesses over Nick Timothy, Mrs May’s joint chief of staff, feting him as the most important man in the country – and all but ignoring Fiona Hill, also chief of staff (the first woman to hold the post) and just as significant a figure in our national life.
In politics as in life, the macho men will make the noise, but it’ll be the women – and perhaps a few men untroubled by the insecurities that are part and parcel of machismo – who get on with the stuff that really matters. Be in no doubt: this is a woman’s Government, and all the better for it.”
“Theresa Mary May (née Brasier; born 1 October 1956) is the Prime Minister of the United Kingdom and Leader of the Conservative Party, the second woman to hold both offices. She has also been the Member of Parliament (MP) for Maidenhead since 1997. May identifies as a One-Nation Conservative and is characterised as a liberal conservative. The daughter of a vicar, May grew up in Oxfordshire.
From 1977 until 1983, she worked for the Bank of England, and from 1985 until 1997 at the Association for Payment Clearing Services, also serving as a councillor for Durnsford in Merton. After unsuccessful attempts to be elected to the House of Commons in 1992 and 1994, she was elected as the MP for Maidenhead in the 1997 general election. From 1999 to 2010, May served in a number of roles in the Shadow Cabinets ofWilliam Hague, Iain Duncan Smith, Michael Howard, and David Cameron, including Shadow Transport Secretary and Shadow Work and Pensions Secretary.
She was also Chairman of the Conservative Party from 2002 to 2003. After the formation of the Coalition Government following the 2010 general election, May was appointed Home Secretary and Minister for Women and Equalities, giving up the latter role in 2012. Reappointed after the Conservative victory in the 2015 general election, she went on to become the longest-serving Home Secretary since James Chuter Ede over 60 years previously, pursuing reform of the police, taking a harder line on drug policy, overseeing the creation of elected Police and Crime Commissioners and introducing restrictions on immigration.
Following the resignation of David Cameron on 24 June 2016, May announced her candidacy for the leadership of the Conservative Party and quickly emerged as the front-runner. She won the first ballot of Conservative MPs on 5 July by a significant margin, and two days later won the votes of 199 MPs, going forward to face a vote of Conservative Party members in a contest with Andrea Leadsom. Leadsom’s withdrawal from the election on 11 July led to May’s appointment as leader the same day. She was appointed Prime Minister two days later.”
“Serco do a bunch more that didn’t even make our story: As well as thanking God for his success, CEO Chris Hyman is a Pentecostal Christian who has released a gospel album in America and fasts every Tuesday. Amazingly, he was also in the World Trade Centre on 9/11, on the 47th floor addressing [Serco] shareholders Serco run navy patrol boats for the ADF, as well as search and salvage operations through their partnership with P&O which form Defence Maritime Services. Serco run two Australian jails already, Acacia in WA and Borallon in Queensland. They’re one of the biggest companies In the UK for running electronic tagging of offenders under house arrest or parole.”
“FBI: ‘Hostile Actors’ Likely Hacked Clinton Email Secrets
Comey recommends not prosecuting presumed Democratic nominee
BY: Bill Gertz July 6, 2016 5:00 am
An extensive FBI investigation found evidence that foreign government hackers accessed private emails sent by former secretary of state Hillary Clinton but no direct evidence spies hacked into the several unsecure servers she used.
FBI Director James Comey revealed Tuesday the 11-month probe into Clinton’s private email servers uncovered negligent handling of very sensitive classified information that was placed on several unsecure servers between 2009 and 2013, when Clinton served as secretary of state.
In an unusual public announcement, Comey outlined findings that included discovery of highly classified information sent and received on Clinton’s private email servers, and signs that “hostile actors” gained access to email accounts of people who were sharing emails with Clinton.
“Marine Corps Base Camp Pendleton is the major West Coast base of the United States Marine Corps. It is located on the Southern California coast, in San Diego County, and bordered by Oceanside to the south, Cleveland National Forest, Orange and Riverside counties to the north, and Fallbrook to the east. The base is split into North and South and was established in 1942 to train U.S. Marines for service in World War II. By October 1944, Camp Pendleton was declared a “permanent installation” and by 1946, it became the home of the 1st Marine Division. It was named after Major General Joseph Henry Pendleton (1860–1942), who had long advocated setting up a training base for the Marine Corps on the west coast. Today it is the home to myriad Operating Force units including the I Marine Expeditionary Force and various training commands.”
“Theresa May blocks Gary McKinnon’s extradition to US
Computer hacker Gary McKinnon wins his 10-year fight against extradition today after Home Secretary Theresa May stepped in to halt proceedings.
.. The Home Secretary announced today that she had stopped Gary McKinnon’s extradition to the US on human rights grounds.
Mrs May told the Commons that she had given the “most careful consideration” to all the legal and medical evidence before concluding there was a significant risk the 46-year-old, who suffers from Asperger syndrome, would try to kill himself if forced to stand trial in the US.
Mr McKinnon was accused by US prosecutors of “the biggest military computer hack of all time”, but he claims he was simply looking for evidence of UFOs.
Mrs May said it was a “difficult and exceptional case” but it was now up to the director of public prosecutions to determine whether there was enough evidence for Mr McKinnon to face charges in the UK.”
“Third-party logistics (abbreviated 3PL, or sometimes TPL) in logistics and supply chain management is a company’s use of third party businesses to outsource elements of the company’s distribution and fulfillment services. Third party logistics providers typically specialize in integrated operation, warehousing and transportation services which can be scaled and customized to customers’ needs based on market conditions, such as the demands and delivery service requirements for their products and materials. Often, these services go beyond logistics and include value-added services related to the production or procurement of goods, i.e., services that integrate parts of the supply chain. When this integration occurs, the provider is then called a third-party supply chain management provider (3PSCM) or supply chain management service provider (SCMSP). 3PL targets particular functions within supply management, such as warehousing, transportation, or raw material provision.”
“UK Cabinet Office – Emergency Planning College – Serco …..Types of Exercise Workshop Exercises
These are structured discussion events where participants can explore issues in a less pressurised environment. They are an ideal way of developing solutions, procedures and plans rather than the focus being on decision making. Table Top Exercises These involve a realistic scenario and will follow a time line, either in real-time or with time jumps to concentrate on the more important areas. The participants would be expected to be familiar with the plans and procedures that are being used although the exercise tempo and complexity can be adjusted to suit the current state of training and readiness. Simulation and media play can be used to support the exercise. Table-top exercises help develop teamwork and allow participants to gain a better understanding of their roles and that of other agencies and organisations. Command/Control Post Exercises These are designed primarily to exercise the senior leadership and support staff in collective planning and decision making within a strategic grouping. Ideally such exercises would be run from the real command and control locations and using their communications and information systems [Feeling lucky, Punk?].
This could include a mix of locations and varying levels of technical simulation support. The Gold Standard system is flexible to allow the tempo and intensity to be adjusted to ensure maximum training benefit, or to fully test and evaluate the most important aspects of a plan. Such exercises also test information flow, communications, equipment, procedures, decision making and coordination. Live Exercises These can range from testing individual components of a system or organisation through to a full-scale rehearsal. They are particularly useful where there are regulatory requirements or with high-risk situations. They are more complex and costly to organise and deliver but can be integrated with Command Post Exercises as part of a wider exercising package.”
“Following a management buyout in 1987, RCA Services Limited was renamed Serco Limited. In 1988, the company achieved a full listing on the London Stock Exchange as Serco Group plc. A period of expansion and diversification followed. Governments across the developed world were beginning programmes of management reform and outsourcing, introducing competition for the services needed to sustain and improve public services. At the same time, private sector organisations increasingly saw the value of outsourcing support services, freeing up management to focus on core activities. Serco won business in the civil government, transport and commercial/industrial markets, and established operations in Asia Pacific and North America.”
“Serco farewell to NPL after 19 years of innovation
8 January 2015
Sercosaid goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco’s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade….
NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading in the City through NPL [Zulu] Time.”
“Police drop investigation into Serco prisoner transport contract
The outsourcing group said there was no evidence of individual or corporate wrongdoing
By Marion Dakers 7:42AM GMT 19 Dec 2014
The City of London Police has closed an investigation into Serco’s prisoner transport contract after more than a year of work, enabling the firm to continue with the contract until 2018.
The Ministry of Justice called in the police in August 2013 to examine whether Serco had misleadingly recorded prisoners as being ready for court when they were not, in order to meet the performance criteria of the contract.
However, Serco said on Friday that the probe into the Prisoner Escort and Custody Services (PECS) contract had been closed after the police found no evidence to support bringing charges against the outsourcing firm or its staff.
“The information obtained was also sufficient for the City of London Police to conclude there was no evidence of any corporate-wide conspiracy or an intention to falsify figures to meet the DRACT [designated ready and available for court time] contract requirement by senior Sercomanagement or at the board level of the company,” the firm said in a statement.
The Ministry of Justice had said it would end the contract immediately if the firm’s board was found to have done wrong.”
“Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994.This file was obtained from the Secretary of State and has a file number of 1795583.
This business was created 7,695 days ago in the New York SOS Office and the registered agent is C T Corporation System that does business at 111 Eighth Avenue , New York in New York.
After conducting a search for principals and owners of Base One Technologies, Ltd., we were able to find 2 owners and/or executives. Their information is listed below. This file was last updated on May 14, 2013.
Liza R Zaneri
Chief Executive Officer
15 Irving Place
New Rochelle, NY 10801″
“Serco’s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals.”http://www.dtic.mil/whs/directives/corres/pdf/100515p.pdf
“[DOJ Pride and Serco’s 8(a) protégé company Base One Technologies] Information Security Services
Information Security Planning is the process whereby an organization seeks to protect its operations and assets from data theft or computer hackers that seek to obtain unauthorized information or sabotage business operations. Without a properly planned and managed Information Security Plan, an organization runs the risk of law suits, loss of data, compromised operations and loss of reputation. Our experts have secured some of the world largest and most complex commercial and carrier networks, as well as conducted extensive analysis and implementation work on some of the Federal Government’s most sensitive and critical environments, such as the FAA [and theSerco-mentored Pentagon Renovation project].
Base One Technologies takes your information security needs seriously! We conduct business analysis, install solutions and protect your network from unauthorized entry and data loss. We are there in the beginning to provide guidance and support to your data security program, through to implementation and eventually during the support life cycle providing process and procedures for incident reporting, analysis and counter measures.
Base One Technologies
Expertly researches, designs, and develops information security policies that protect your data and manage your firm’s information technology risk at levels acceptable to your business.
Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report.
Develops and implements multi-layer Information Security Solutions, practices and procedures. We deploy Intrusion Detection Systems (IDS) and IP Security with VPN solutions using Cisco routers, Frame Relay, firewalls, address and port translation, obscurity standards and authentication technologies (AAA, 3DES, TACACS, etcŠ), to enhance and meet the level of Data Security required for global organizations.
Conducts IT Security and Risk Assessment in Federal government as well as security testing, implementing security for multiple platforms and operating systems around the world.
Ability to conduct business process analysis to provide technical security countermeasures, risk management and data communications security planning for large organizations.
Provides computer security integration for web server and traditional client-server based applications. We secure environments up to as many layers as required by our clients’ policies, industry practices, and regulating bodies – including the desktop and user experience as required. Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions.”
“Originally appeared at Chuck Baldwin LIVE A missionary friend of mine in Eastern Europe recently gave me a heads up regarding an excellent article written by Sebastian Swift entitled “5 Confirmed False Flag Operations And How To Spot Them In The Future.”
Swift writes, “The false flag phenomenon is distinctively modern and used as an ideological weapon to control populations with the fear of a manufactured enemy. They are used in ostensibly democratic systems where people believe they have inalienable rights. Such democratic systems–primarily the United States, Israel, and Great Britain–must shock people into sociopolitical and geopolitical consent and, as such, require sophisticated modern propaganda systems and advanced covert operations teams with highly proficient skills.”
Here are his telltale signs of a false flag operation:
There is an immediate comprehensive narrative, including a convenient culprit. Law enforcement, government agencies, and the mainstream media immediately proffer a narrative that completely explains the event and encourages citizens to tie their intellectual understanding of the tragedy to the emotions they experience. In his lecture at Contact in the Desert, [author and researcher] Richard Dolan noted that a distinguishing characteristic of a false flag operation is that the official narrative IS NOT questioned by the media. There are often legislative, ideological and sociopolitical power plays waiting in the wings, which the government can immediately implement.
The official narrative has obvious domestic and geopolitical advantages for the governing body. The Bush administration used 9/11 to usher in the War on Terror, which has served as a lynchpin for countless civil liberty infringements by the national security state, including ubiquitous domestic surveillance and indefinite detention.
The narrative behind the attack serves to leverage emotions like fear, as well as patriotism, in order to manufacture consent around a previously controversial issue. For example, many of the recent domestic terror attacks, including the Aurora [and Orlando] shooting[s], have exacerbated and reinforced advocacy of gun control legislation.
Military training drills and police drills occur on the day of and very near the attack itself, causing confusion to obscure eye witness testimony and allowing orchestrators to plant both patsies, disinformation and backup operatives. This is no small point. An incredible percentage of major domestic or international terror attacks have involved simultaneous “training drills.” This list includes, but is not limited to, the infamous NORAD drills of 9/11, the 7/7 London Bombings, the 2011 Norway shooting, the Aurora shooting, Sandy Hook, and the Boston Marathon. Though none of the aforementioned events can be confirmed or denied without a doubt, they bear a striking resemblance to previous false flag attacks and should be looked at with an investigative eye…
Our Founding Fathers believed their government (the British Crown) was deliberately conspiring against them. Thomas Jefferson said as much in our Declaration of Independence:
“Prudence, indeed, will dictate that Governments long established should not be changed for light and transient causes; and accordingly all experience hath shewn, that mankind are more disposed to suffer, while evils are sufferable, than to right themselves by abolishing the forms to which they are accustomed. But when a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security.”
Read it again: “But when a long train of abuses and usurpations, pursuing invariably the same Object evinces a DESIGN to reduce them under absolute Despotism . . . .” Jefferson and the rest of America’s founders believed that there was a “design” (i.e, “plot,” “scheme,” or “conspiracy,” if you please) to “reduce them under absolute Despotism.” So, if you believe that government conspiracy is only for kooks, you must include America’s Founding Fathers in that group….
Again, I submit if we deliberately “shut our eyes against a painful truth,” liberty is not long for this country. And that includes admitting when a tragedy is NOT a conspiracy. But it also means admitting when evidence suggests that it IS.”
“[White’s Club member] Rupert Christopher Soames OBE (born 18 May 1959) is a British businessman, CEO of the outsourcing company Serco. Soames was born in Croydon, Surrey, to Lord and Lady Soames. He is a grandson of Sir Winston Churchill, a nephew of the former Defence Secretary Duncan Sandys and Diana Churchill; the journalist Randolph Churchill and the actress and dancer Sarah Churchill and a great-nephew of the founders of the Scout movement, Robert Baden-Powell and Olave Baden-Powell. His brother is the Conservative MP SirNicholas Soames.
Soames was educated at St. Aubyns Preparatory School in Rottingdean, East Sussex and Eton College, and then Worcester College at theUniversity of Oxford, during which time he worked as a DJ at the London nightclub Annabel’s, as well as being elected to the Presidency of theOxford Union.
Upon graduation, he was offered a position at General Electric Company (GEC) by the managing director Arnold Weinstock. He remained at GEC for 15 years, working in the company’s avionics and computing divisions, and became managing director of Avery Berkel, running the company’s UK, India, Asia and Africa operations.
After leaving GEC in 1997, Soames joined the software company Misys as chief executive of its Midas-Kapiti division. He was promoted to chief executive of the Banking and Securities Division in June 2000.
Soames left Misys after a disagreement with Misys founder Kevin Lomax on the company’s direction, and was appointed chief executive of power hire group Aggreko in June 2003, replacing Philip Harrower who died when his car collided with a train in the United States.
Soames was appointed Officer of the Order of the British Empire (OBE) in the 2010 New Year Honours. In November 2010 Rupert Soames gave a speech to Holyrood in which he warned, “In the UK, we are already close to the rocks, because, over the next 8 years a third of our coal-fired capacity, two-thirds of our oil-fired capacity, and nearly three-quarters of our nuclear capacity will be closed down either through age or the impact of the European Large Combustion Plant Directive. Absent a massive and immediate programme of building new power stations, with concrete being poured in the next two years, we will be in serious danger of the lights going out.”
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation