#2746: Carlyle Clinton’s Bin Laden Kill List – Hotel Serco 3PL 8(a) Snuff – Sister’s USIS Zulu Bombs


United States Marine Field McConnell 

Plum City Online – (AbelDanger.net

August 9, 2016

1. Abel Danger (AD) claims that the Carlyle Group and Clinton Foundation hired patsy assassins and saboteurs through the Bin Laden Group in 1999 to eliminate targets named on kill-list servers operated by security-clearance agents in the Office of Personnel Management (OPM).

2. AD claims that Carlyle’s former chairman Frank Carlucci used Serco‘s 3PL service to book the Bin Laden saboteurs with 8(a) snuff-film crews into elite hotels such as the WTC Marriott and synchronize BBC news injects and media plays during the 9/11 attacks.

3. AD claims that Field McConnell’s sister Kristine “Conair” Marcy silenced Carlyle and Clinton insiders by adding their names to the 9/11 kill list and authorizing Serco‘s use of Zulu trigger signals on USIS servers to bomb the Twin Towers and kill nearly 3,000 victims.

4. United States Marine Field McConnell offers to show Donald Trump how to dismantle the OPM server-based kill lists and bring the Serco, Carlyle and Clinton co-conspirators to justice for the events of 9/11 described as “the first live-broadcast mass snuff film in human history.” (https://abeldanger.blogspot.com/2010/01/field-mcconnell-bio.html).

Who are The Carlyle Group, and how are they connected to bin Laden? – Truthloader




The 9/11 Hotel – Part 1 of 5


ENHANCED VERSION: News Reports WTC7 Fell Before It Happens!


Comey: Clinton Made United States Secrets Vulnerable To Hostile Actors

Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders!

 [Note HSBC, British and Saudi Governments and Goldman Sachs]

Top HSBC [Serco‘s dirty banker] Executive Arrested In US For Front-Running Trades

White’s Club death-bet bookmaker service dates back to 1743 only the technology to spot fix the Zulu time of victim death has changed.

Defense Ammunition Center [Outsourced to Serco] 

Serco… Would you like to know more? 

“Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”


“9/11 Firefighters Reveal Bombs Destroyed WTC lobby 

by Michael Suede • July 28, 2013 

R1: What happened? 

FM1: There was an explosion. We was in the lobby, and then *scrunch*, the whole lobby collapsed in on us.

R2: What was it like?

FM1: Horrible. It was horrible.

FM2: Like hell.

FM1: The whole building just collapsed on us… Inside the lobby.

R1: Was that a secondary explosion?

FM1: Yes it was. Definitely a secondary explosion. We was inside waiting to go upstairs, and on our way upstairs, the whole fucking thing blew. It just collapsed on everybody inside the lobby.

R1: Someone took the first tower coming down, secondary explosion?

FM1: I don’t know about the first one, but the second one, it was terrible. There was a third one too after that one.

R2: There was an explosion after that?

FM1: That’s right. Everybody was inside the building, waiting to go upstairs. And it just let loose, everything just let loose inside the building.

R1: So what you’re telling me is that there was a plane, or whatever, hit the building, and then a secondary explosion.

FM1: It was like THREE explosions after that. We came in there after the fire. We came in there when the fire was going on already. We was in the staging area inside the building. Waiting to go upstairs. Then there was a second explosion, and the whole lobby collapsed on the lobby inside. R1: Just mayhem after that?

FM1: Just mayhem. Everybody tried to work their way out. A lot of people was trapped inside.

FM3: *unintelligible* I was near Brooklyn, we watched the first explosion. As we were watching the buildings, I saw a black, very large airplane, fly right into the second building. It came out of the south. Right in front of our eyes. It was so surreal, just like a movie set. 

R1: Second and third explosions also right?

FM3: We were in the building for the third one, the collapse. I was on this drive here for the other one.

FM2: People don’t understand, there may be more. Any one of these fucking buildings could blow up. This ain’t done yet.

R2: As far as disasters go, how does this?

FM1: This is one of the top disasters, it could be no worse than this. There could be nothing no more worse than this. We in the building trying to help people and there was an explosion inside the buildings. I don’t think it can get any worse than this.”

“George W. Bush and the Bin Laden Family, Meeting At Ritz Carlton Hotel, NYC, One Day Before 9/11 

By CBC Global Research, April 28, 2013 

Region: Middle East & North Africa, USA 

Theme: 9/11 & ‘War on Terrorism’ According to the Washington Post, the Carlyle Group met at the Ritz Carlton Hotel in NYC one day before 9/11. In attendance at this meeting were former president George H. W. Bush and Shafiq bin Laden, the brother of Osama:

The Carlyle Group is a large private-equity investment firm, closely associated with officials of the Bush and Reagan administrations, and has considerable ties to Saudi oil money, including ties to the bin Laden family.

This morning [September 10, 2001] it is holding its annual investor conference at the Ritz Carlton hotel in Washington, DC. Among the guests of honor is investor Shafig bin Laden, brother of Osama bin Laden. [Observer, 6/16/2002; London Times, 5/8/2003] Former President George H. W. Bush, who makes speeches on behalf of the Carlyle Group and is also senior adviser to its Asian Partners fund [Wall Street Journal, 9/27/2001] , attended the conference the previous day, but is not there today (see (8:00 a.m.) September 11, 2001). [Washington Post, 3/16/2003]”

“Carlucci served as chairman of the Carlyle Group from 1992–2003, and chairman emeritus until 2005. He also has business interests in the following companies: General Dynamics, Westinghouse, Ashland Oil, Neurogen, CB Commercial Real Estate, Nortel, BDM International, Quaker Oats, and Kaman. Carlucci is Chairman of Envion USA, and former director of Wackenhut. He is a co-founder and senior member of the Frontier Group, a private equity investment firm co-founded by David Robb (formerly with The Carlyle Group) and to which Sanford McDonnell and Norm Augustine are senior advisors. Frontier Group is the principal investor in Utopia Residences (http://www.utopiaresidences.com), which has ordered the Utopia ocean liner [see “A Cruise That Never Ends”. http://www.forbes.com/2009/12/01/asia-biggest-cruise-ship-lifestyle-travel-samsung.html?feed=rss_asia. Retrieved 2009-12-21.]. Carlucci is an Advisory board member of G2 Satellite Solutions and the Chairman Emeritus of Nortel Networks.”

“Outsourcing of US Security Clearances, how USIS happened 

Posted on October 10, 2014 

by Daniel Jackson 

In the past, the U.S. government has often looked to private corporations to address urgent matters of national security or help overcome strategic shortfalls in times of need. From the establishment of the Pinkerton National Detective Agency in 1850, to the use of General Motors factories for weapons systems manufacturing during World War II, and finally to the massive increase in federal contracting in the years since September 11th, 2001 the United States has had a long and tumultuous relationship with federal contractors.

The advantage of these business relationships is that they have enabled the US Government to contract out for services or goods that could not be as adequately acquired through federal acquisition practices. In short, critical needs were met. The fact that fraud also increased was not lost on either the government or contractors, but it was not until contingency operations slowed that accountability was catalogued through the Gansler [1], SIGIR [2], and SIGAR [3] reports. Indeed, the US government has struggled with the speed, efficiency, and bureaucracy of its acquisition practices for some time. Evidence of this is seen in the expanding and contracting of government regulations, especially with respect to the current preferences to utilize commercial practices whenever possible [4]. Some of this is obvious as the government cannot fire and hire as quickly as a private company due to personnel regulations and unions, and therefore cannot increase employee numbers as part of a response to an emergency or shortfall like a private company. In some ways the private model is uniquely adaptable to contingencies in that temporary employment agreements, a tool not usually available to the government and only recently in the form of term appointments, allows vendors to increase and decrease manning commensurate with the contingency.

However, there are some significant disadvantages to outsourcing. The fact that contractors work for the government, often in government offices, but are employees of contractors has muddied the waters. This legal tension has resulted in much controversy over the use of contractor employees to perform functions that are considered inherently governmental [5]. These prohibited activities are listed in sub-part 7.503 of the Federal Acquisition Regulation [6], but even developing this list has been fraught with confusion and interpretation issues. Additional issues arise when the line between contract employees and government employees is blurred [7]. With USIS, the full range of issues involved with contracting out critical services is on display.

USIS was created in 1996 when the Office of Personnel Management privatized its’ investigate branch as part of a larger government downsizing initiative and grew significantly through rounds of capital investment (notably from the Carlyle Group) and public sale to Altegrity [8]. In FY 2012 USIS received $253 Million of its revenue from OPM, which accounted for 67% of total revenue [9]. The September 11, 2001 terrorist attacks on the United States not only changed the country, but also changed the fate of USIS. After these events the government greatly increased its scope, spending and action around the world [10]; which eventually resulted in the named contingency operations Operation Iraqi Freedom and Operation Enduring Freedom. Due to the all of this activity the US government found that its infrastructure to hire, vet and place employees was insufficient [11].

With regard to security clearances the DOD office responsible for clearances and the OPM were found to be falling significantly short of targets, with stories of initial clearance investigations and clearance renewals taking up to a year [12]. This was found to be endangering multiple missions and congress passed the Intelligence Reform and Terrorism Prevention Act of 2004, which mandated new more aggressive timelines for investigation and adjudication of clearances [13]. It was not until the events of the last year and a half that it became clear that this push for faster investigation and adjudication has caused some issues.

While the federal government focus has been on decreasing clearance wait times [14], two other seminal events have shifted that focus to accuracy in investigations and clearance determinations. The first was the tragic Navy Yard Shooting of September 16, 2013 and the second were the revelations of widespread surveillance by the National Security Agency revealed by Edward Snowden. USIS was subsequently found to have had a part in both investigations.

While these issues highlighted the out-sourcing of security clearance investigations, USIS was already under “criminal investigation” as early as June 2013 [15]. The DOJ brought charges against USIS in January, 2014 for circumventing quality reviews, which led to the charges of false claims for the invoiced work that was not actually completed [16]. This was compounded by a cyber-attack in the summer of 2014 [17].

For USIS this turned out to be the last straw. Their existing unilateral option contracts with the Office of Personnel Management were not renewed when they expired in September of 2014 [18]; these contracts were cumulatively valued at $2,456,500,000 (maximum) for three contractors: OPM15-11-C-0015 USIS; OPM15-11-C-0016 KeyPoint Government Solutions; and OPM15-11-C-0017 CACI Premiere [19]. While other agencies have current contracts with USIS, it will be difficult for future government agency contracts considering the responsibility requirements of FAR 9.405 [20].

The damage done to the United States security clearance process is not fully known, but it is clear that the government is no longer able to meet its security clearance needs. Whether other contracts will be awarded to address the shortfall remains to be seen, but in any case, the future likely holds longer delays for security clearances as the government searches for the balance between bureaucracy and accuracy.”

“The List of Adrian Messenger is a 1963 mystery film about a retired British intelligence officer (George C. Scott) investigating a series of apparently unrelated deaths. It was directed by John Huston from a screenplay by Anthony Veiller, based on the 1959 novel of the same title by Philip MacDonald. .. A writer named Adrian Messenger (John Merivale) believes a series of apparently unrelated “accidental” deaths are actually linked murders. He asks his friend Anthony Gethryn (George C. Scott), recently retired from MI5, to help clear up the mystery. However, Messenger’s plane is bombed while he is en route to collect evidence to confirm his suspicions and, with his dying breath, he tries to tell a fellow passenger the key to the mystery.

The passenger survives and turns out to be Raoul Le Borg (Jacques Roux), Gethryn’s old World War II counterpart in the French Resistance. They join forces to investigate Messenger’s list of names, and decode Messenger’s final cryptic words. They establish that all on the list were together in a prisoner of war camp in Burma, where a Canadian sergeant, George Brougham, betrayed his fellow prisoners, foiling their escape attempt. Each has a reason to kill Brougham. It evolves that Brougham is their killer, but why? They deduce that he is about to come into prominence and cannot risk being recognised. Gethryn and Le Borg establish that he stands in line to an inheritance of the Bruttenholm family, landed gentry who are friends of Gethryn and the late Messenger, and who avidly engage in fox hunting.

Having disposed of all possible witnesses to his wartime treachery, Brougham (Kirk Douglas) appears at a Bruttenholm estate fox hunt and introduces himself as a member of the family (he has previously been seen only in disguise). It then becomes clear to the visiting Gethryn and Le Borg that Brougham’s next victim is to be the young heir, Derek. In an attempt to divert Brougham, Gethryn makes known his investigation of Messenger’s list, calculating to set himself up as the next victim.

That night, Brougham sabotages the next morning’s hunt by laying a drag with a fox in a sack over the fields. He especially marks a blind spot behind a high wall, and moves a large hay tedder behind, intending for Gethryn (who has been given the honour of leading the hunt) to be impaled upon its lethal tines. Unbeknownst to Brougham, his plan goes awry when a farmer repositions the tedder early the next morning. The hunt commences but comes to a halt at the specified spot. Gethryn reveals to the gathered crowd that he discovered and removed the hay-tedder booby trap earlier that morning and, with the help of the lead fox hound, will detect the scent of the culprit amongst a group of hunt saboteurs. Brougham, once again disguised, is identified and runs off, mounting Derek’s horse. When Derek shouts a command to the horse, the animal stops short, throwing Brougham and impaling him on the very same machine he intended for Gethryn.” 

“The Secret Internet Protocol Router Network (SIPRNet) is “a system of interconnected computer networks used by the U.S. Department of Defense and the U.S. Department of State to transmit classified information (up to and including information classified SECRET) by packet switching over the ‘completely secure’ environment”.[1] It also provides services such as hypertext document access and electronic mail. As such, SIPRNet is the DoD’s classified version of the civilian Internet. SIPRNet is the SECRET component of the Defense Information Systems Network.[2] Other components handle communications with other security needs, such as NIPRNet which is used for nonsecure communications, and JWICS which is used for Top Secret communications.”

“The Kill List: ICWatch Uses LinkedIn Account Info to Out Officials Who Aided Assassination Program 

MAY 28, 2015 

WikiLeaks has begun hosting a new database called ICWatch, built by Transparency Toolkit. The site includes a searchable database of 27,000 LinkedIn profiles of people in the intelligence community. Organizers say the aim of the site is to “watch the watchers.” WikiLeaks founder Julian Assange talks about how the database could be used to help identify individuals connected to the U.S. kill list, formally known as the Joint Prioritized Effects List, or JPEL.”

“The Secret Internet Protocol Router Network (SIPRNet) is “a system of interconnected computer networks used by the U.S. Department of Defense and the U.S. Department of State to transmit classified information (up to and including information classified SECRET) by packet switching over the ‘completely secure’ environment”.[1] It also provides services such as hypertext document access and electronic mail. As such, SIPRNet is the DoD’s classified version of the civilian Internet. SIPRNet is the SECRET component of the Defense Information Systems Network.[2] Other components handle communications with other security needs, such as NIPRNet which is used for nonsecure communications, and JWICS which is used for Top Secret communications.” 

“FBI: ‘Hostile Actors’ Likely Hacked Clinton Email Secrets 

Comey recommends not prosecuting presumed Democratic nominee 

BY: Bill Gertz 

July 6, 2016 5:00 am 

An extensive FBI investigation found evidence that foreign government hackers accessed private emails sent by former secretary of state Hillary Clinton but no direct evidence spies hacked into the several unsecure servers she used.

FBI Director James Comey revealed Tuesday the 11-month probe into Clinton’s private email servers uncovered negligent handling of very sensitive classified information that was placed on several unsecure servers between 2009 and 2013, when Clinton served as secretary of state.

In an unusual public announcement, Comey outlined findings that included discovery of highly classified information sent and received on Clinton’s private email servers, and signs that “hostile actors” gained access to email accounts of people who were sharing emails with Clinton.”

“Loan Improvement 

Jan 31, 2001 

SBA modernizes to help feed its growing programs [Field McConnell’s sister Kristine Marcy introduced the 8(a) electronic accelerated loan guarantee program at SBA to ensure funding for the Serco protégés’ participating in the 9/11 carbon cap]


Under a five-year plan for overhauling its information technology systems, the Small Business Administration recently acquired new software for financial and other administrative tasks.

By the time SBA celebrates its 50th anniversary in 2003, agency officials want all their programs up and running around the clock, chief financial officer Joseph Loddo said.

In the first phase of the modernization, the agency has upgraded systems for managing its extensive portfolio of guaranteed loans, chief operating officer Kristine Marcy said.

SBA processed its first electronic loan last November through its Sacramento, Calif., office and plans to add more private lenders during fiscal 2001.

The agency’s staffing level has dropped 22 percent over the past eight years, which is another reason to improve IT, Marcy said. Over the past decade, SBA’s portfolio of loans to small and disadvantaged businesses has more than doubled to $50 billion.

‘We’re a small agency with a huge portfolio,’ Marcy said. SBA supplies more than half of the U.S. venture capital available each year.

Seventy percent to 80 percent of the loans are booked through a preferred lender program [structured by Serco], which involves nearly 7,000 banks, Marcy said. SBA guarantees the loans, just as the government backs student and housing loans.

‘The financial and IT businesses were changing so rapidly, we had to make some changes to stay current with the private sector,’ Marcy said. Banks had been asking SBA to make faster decisions on loan guarantees. The agency decided to aim for a turnaround time of one hour.”

Serco do a bunch more that didn’t even make our story: As well as thanking God for his success, CEO Chris Hyman is a Pentecostal Christian who has released a gospel album in America and fasts every Tuesday. Amazingly, he was also in the World Trade Centre on 9/11, on the 47th floor addressing [Serco] shareholders. Serco run navy patrol boats for the ADF, as well as search and salvage operations through their partnership with P&O which form Defence Maritime Services. Serco run two Australian jails already, Acacia in WA and Borallon in Queensland. They’re one of the biggest companies In the UK for running electronic tagging of offenders under house arrest or parole.” 

“UK Cabinet Office – Emergency Planning College – Serco …..Types of Exercise 

Workshop Exercises These are structured discussion events where participants can explore issues in a less pressurised environment. They are an ideal way of developing solutions, procedures and plans rather than the focus being on decision making. Table Top Exercises These involve a realistic scenario and will follow a time line, either in real-time or with time jumps to concentrate on the more important areas. The participants would be expected to be familiar with the plans and procedures that are being used although the exercise tempo and complexity can be adjusted to suit the current state of training and readiness. Simulation and media play can be used to support the exercise. Table-top exercises help develop teamwork and allow participants to gain a better understanding of their roles and that of other agencies and organisations. Command/Control Post Exercises These are designed primarily to exercise the senior leadership and support staff in collective planning and decision making within a strategic grouping. Ideally such exercises would be run from the real command and control locations and using their communications and information systems [Feeling lucky, Punk?]. This could include a mix of locations and varying levels of technical simulation support. The Gold Standard system is flexible to allow the tempo and intensity to be adjusted to ensure maximum training benefit, or to fully test and evaluate the most important aspects of a plan. Such exercises also test information flow, communications, equipment, procedures, decision making and coordination. Live Exercises These can range from testing individual components of a system or organisation through to a full-scale rehearsal. They are particularly useful where there are regulatory requirements or with high-risk situations. They are more complex and costly to organise and deliver but can be integrated with Command Post Exercises as part of a wider exercising package.”

Serco farewell to NPL after 19 years of innovation 8 January 2015 Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco‘s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade…. NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading [for Serco‘s front running banks] in the City through NPL [Zulu] Time.”

“Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994. This file was obtained from the Secretary of State and has a file number of 1795583.

This business was created 7,695 days ago in the New York SOS Office and the registered agent is C T Corporation System that does business at 111 Eighth Avenue , New York in New York.

After conducting a search for principals and owners of Base One Technologies, Ltd., we were able to find 2 owners and/or executives. Their information is listed below.

This file was last updated on May 14, 2013.


Liza R Zaneri 

Chief Executive Officer 

15 Irving Place New 

Rochelle, NY 10801″

Serco‘s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals.” http://www.dtic.mil/whs/directives/corres/pdf/100515p.pdf 

[White’s Club member] Rupert Christopher Soames OBE (born 18 May 1959) is a British businessman, CEO of the outsourcing [and long range death-betting bookmaker] company Serco.[1] Soames was born in Croydon, Surrey, to Lord and Lady Soames. He is a grandson of Sir Winston Churchill, a nephew of the former Defence Secretary Duncan Sandys and Diana Churchill; the journalist Randolph Churchill and the actress and dancer Sarah Churchill and a great-nephew of the founders of the Scout movement, Robert Baden-Powell and Olave Baden-Powell. His brother is the Conservative MP Sir Nicholas Soames.


Soames was educated at St. Aubyns Preparatory School in Rottingdean, East Sussex and Eton College,[2] and then Worcester College at the University of Oxford,[3] during which time he worked as a DJ at the London nightclub Annabel’s, as well as being elected to the Presidency of the Oxford Union.[3] Career[edit]

Upon graduation, he was offered a position at General Electric Company (GEC) by the managing director Arnold Weinstock. He remained at GEC for 15 years, working in the company’s avionics and computing divisions, and became managing director of Avery Berkel, running the company’s UK, India, Asia and Africa operations.[4]

After leaving GEC in 1997, Soames joined the software company Misys as chief executive of its Midas-Kapiti division. He was promoted to chief executive of the Banking and Securities Division in June 2000.[5]

Soames left Misys after a disagreement with Misys founder Kevin Lomax on the company’s direction, and was appointed chief executive of power hire group Aggreko in June 2003,[6] replacing Philip Harrower who died when his car collided with a train in the United States.[7]

Soames was appointed Officer of the Order of the British Empire (OBE) in the 2010 New Year Honours.[8] In November 2010 Rupert Soames gave a speech to Holyrood in which he warned, “In the UK, we are already close to the rocks, because, over the next 8 years a third of our coal-fired capacity, two-thirds of our oil-fired capacity, and nearly three-quarters of our nuclear capacity will be closed down either through age or the impact of the European Large Combustion Plant Directive. Absent a massive and immediate programme of building new power stations, with concrete being poured in the next two years, we will be in serious danger of the lights going out.”

Yours sincerely,

Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222

David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation



Fissioncoin - The Nuclear Coin Networks

Easy Bitcoin Faucet

812 Total Views 1 Views Today
Please follow and like us:

Related Post