#2748: Serco 8(a) Ammo Servers – ISIS Friend Or Usis Foe – Zulu Lipstick Switch On The Benghazi Clinton Pig
United States Marine Field McConnell
Plum City Online – (AbelDanger.net)
August 11, 2016
1. Abel Danger (AD) claims that Serco has equipped its shareholders and 8(a) protégé companies with Defense Ammunition Center servers to prepare for an armed insurrection funded by a supranational government of world bankers and feminist elites.
2. AD claims that Serco servers link ISIS friends including the late Jihadi John with USIS foes including the murderers of the late Colonel Westhusing, so U.S. President Barack Obama never knows whether to stand up or to stand down during terrorist attacks.
3. AD claims that aides in the UK Cabinet Office used Zulu time signals on the Serco servers to synchronize Hillary Clinton’s State Department pigs as they switched lipstick during the 9/11/12 Benghazi digital fires attacks falsely attributed to ISIS crisis actors.
4. United States Marine Field McConnell offers to show Donald Trump how to neutralize the USIS insurrection and bring Clinton’s lipstick-switching pigs to justice for their role in the murders of U.S. Ambassador J. Christopher Stevens and U.S. Foreign Service Information Management Officer Sean Smith, CIA contractors Tyrone S. Woods and Glen Doherty during the 2012 Battle of Benghazi.
WAR IS WAR; WESTHUSING IN IRAQ
Defense Ammunition Center [Outsourced to Serco]
BBC Radio 4: The World Tonight – UK Muslims reactions to ‘Innocence of Mohammed’ video
Hillary Clinton – What difference does it make?
Comey: Clinton Made United States Secrets Vulnerable To Hostile Actors
Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders!
[Note HSBC, British and Saudi Governments and Goldman Sachs]
Top HSBC [Serco‘s dirty banker] Executive Arrested In US For Front-Running Trades
White’s Club death-bet bookmaker service dates back to 1743 only the technology to spot fix the Zulu time of victim death has changed.
Serco… Would you like to know more?
“Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”
“The 2012 Benghazi attack took place on the evening of September 11, 2012, when Islamic militants attacked the American diplomatic compound in Benghazi, Libya, killing U.S. Ambassador J. Christopher Stevens and U.S. Foreign Service Information Management Officer Sean Smith. Stevens was the first U.S. Ambassador killed in the line of duty since 1979. The attack has also been referred to as the Battle of Benghazi.
Many Libyans condemned the attacks and praised the late ambassador. They staged public demonstrations condemning the militias (formed during the2011 civil war to oppose leader Colonel Muammar Gaddafi) that were suspected of the attacks.
The United States immediately increased security worldwide at diplomatic and military facilities and began investigating the Benghazi attack. In the aftermath of the attack, State Department officials were criticized for denying requests for additional security at the consulate prior to the attack. In her role as Secretary of State, Hillary Clinton subsequently took responsibility for the security lapses.
On August 6, 2013, it was reported that the U.S. had filed criminal charges against several individuals, including militia leader Ahmed Abu Khattala, for alleged involvement in the attacks. Khattala has been described by Libyan and U.S. officials as the Benghazi leader of Ansar al-Sharia, which was listed in January 2014 by the U.S. Department of State as a terrorist organization. On the weekend of June 14, 2014, U.S. Army special operations forces, in coordination with the FBI, captured Khattala in Libya.
Initially, top U.S. officials and the media reported that the Benghazi attack was a spontaneous protest triggered by an anti-Muslim video, Innocence of Muslims. Subsequent investigations determined that there was no such protest and that the incident started as a premeditated attack that was quickly joined by rioters and looters enraged by the video. Captured suspect Ahmed Abu Khattala stated that the assault was indeed in retaliation for the video Innocence of Muslims.”
“Questions Still Cloud Col Westhusing’s ‘Suicide’ In Iraq
By Wayne Madsen 1-15-6
Serious questions remain concerning Col. Westhusing’s “suicide” in Iraq. Army’s chief ethics expert was murdered, according to Carlyle Group insider.
According an informed source within The Carlyle Group business consortium, Col. Ted Westhusing, the Army’s top military ethicist and professor at West Point, did not commit suicide in a Baghdad trailer in June 2005 as was widely reported in the mainstream media five months later. At the time of his death, Westhusing was investigating contract violations and human rights abuses by US Investigations Services (USIS), formerly a federal agency, the Office of Federal Investigations (OFI), which operated under the Office of Personnel Management (OPM).
In 1996, OFI, which conducted background investigations for civil service personnel, was privatized. The 700 government employees of OFI became employee-owners as part of USIS. In January 2003, the New York investment firm Welsh, Carson, Anderson, and Stowe, described by a Carlyle insider as a virtual shadow operation for The Carlyle Group, bought USIS for $545 million. With 5000 current and former employees of USIS sharing $500 million, the deal made them wealthy with the stroke of a pen. However, upper management within USIS became much wealthier than the rank-and-file. Insiders report that the twelve top managers at USIS became multimillionaires as a result of their cashing in of their Employee Stock Ownership Plans (ESOPs). Many of these instant millionaires already had a close relationship with The Carlyle Group.
Carlyle had been a shareholder in USIS since 1999 and with the buy-out deal via the Welsh, Carson, Anderson, and Stowe deal, Carlyle became the major shareholder.
USIS continues to have a virtual exclusivity deal to perform background security investigations for OPM. The company bills itself as “one of the largest Intelligence and Security Services companies in North America.”
With the Iraq invasion, USIS obtained lucrative Pentagon private security contracts in Iraq. At a 2004 job fair in Falls Church, Virginia, USIS was advertising for “interrogators” and “protection specialists” for “overseas assignments.” While he was in Iraq training Iraqi police and overseeing the USIS contract to train police as part of the Pentagon’s Civilian Police Assistance Training Team, Westhusing received an anonymous letter that reported USIS’s Private Services Division (PSD) was engaged in fraudulent activities in Iraq, including over-billing the government. In addition, the letter reported that USIS security personnel had murdered innocent Iraqis. After demanding answers from USIS, Westhusing reported the problems up the chain of command. After an “investigation,” the Army found no evidence of wrongdoing by USIS.
That decision signed Col. Westhusing’s death sentence. USIS and Carlyle have powerful allies in the administration, including Defense Secretary Donald Rumsfeld, the Princeton roommate of Carlyle Chairman Emeritus and former Defense Secretary Frank Carlucci. Former President George H. W. Bush, former Secretary of State James Baker, and former British Prime Minister John Major are Carlyle international advisers. George W. Bush was formerly employed by a Carlyle subsidiary and the Bin Laden business cartel was a one-time investor in the firm.
Westhusing, who, according to friends and colleagues, showed no signs of depression, left a suicide note the Army concluded was in his handwriting. However, Westhusing’s family and friends have thrown cold water on the Army’s investigation.
WMR can report that based on information obtained from Carlyle insiders, Col. Westhusing’s death was not caused by suicide. The fact that Westhusing was investigating one of the most politically and financially powerful firms in the world resulted in higher-ups wanting him out of the way. According to the Los Angeles Times, all of the witnesses who claimed Westhusing shot himself were USIS employees. In addition, a USIS manager interfered with the crime scene, including handling Westhusing’s service revolver. The USIS manager was not tested for gunpowder residue on his hands.
Westhusing’s investigation threatened to unearth a network of fraudsters looting the US Treasury that included the Bush family and some of their closest financial partners. After Westhusing’s murder, USIS management sent a vaguely-worded memo to employees about how to respond to derogatory information in the media or rumors about USIS. Management’s attention, described as “psychotic” in nature, was on USIS’s upcoming IPO (initial public offering), according to a well-placed source.
USIS also owns Total Information Services of Tulsa, Oklahoma, a commercial personal data mining operation.
Coming Up: How Carlyle began on the net operating loss (NOL) financial backs of Native Alaskan tribal corporations.”
“FSB busts internet ring recruiting terrorists for ISIS
Published time: 11 Aug, 2016 10:11 © Dado Ruvic / Reuters Russia’s Federal Security Service has uncovered and closed an internet community recruiting fighters for Islamic State and propagating terrorism on the web. It also seized weapons and explosives from the suspects during searches in three Russian regions.
The FSB’s center for public communications reported on Thursday that the agency and Russia’s Interior Ministry jointly liquidated the cells of an internet community called “The Guide for Joining the Islamic State” in the Tyumen, Chelyabinsk and Sverdlovsk regions. The community members are suspected of spreading terrorist propaganda and collecting funds for the banned Islamic State terrorist group (IS, formerly ISIS/ISIL), as well as recruiting new fighters and helping them reach terrorist bases abroad.
Security services seized three pistols, four hand grenades, plastic explosives and TNT, as well as detonators for them, during searches conducted in 27 locations. They also confiscated a large cache of extremist literature and videos.
Criminal cases have been launched to investigate the head of the terrorist cell and three of its members who are suspected of organizing a terrorist group and participating in one – crimes punishable by five to ten years imprisonment, as well as large fines.
According to the FSB, the total number of members in the “The Guide for Joining the Islamic State” community based in the Russian Federation, Central Asian Nations, the Middle East, and North Africa could be as high as 100,000. The community has dozens of moderators who use encryption software and internet anonymizers to conceal their identities, the agency’s press service said.
Sponsored Links From The Web”
“The List of Adrian Messenger is a 1963 mystery film about a retired British intelligence officer (George C. Scott) investigating a series of apparently unrelated deaths. It was directed by John Huston from a screenplay by Anthony Veiller, based on the 1959 novel of the same title by Philip MacDonald. .. A writer named Adrian Messenger (John Merivale) believes a series of apparently unrelated “accidental” deaths are actually linked murders. He asks his friend Anthony Gethryn (George C. Scott), recently retired from MI5, to help clear up the mystery. However, Messenger’s plane is bombed while he is en route to collect evidence to confirm his suspicions and, with his dying breath, he tries to tell a fellow passenger the key to the mystery.
The passenger survives and turns out to be Raoul Le Borg (Jacques Roux), Gethryn’s old World War II counterpart in the French Resistance. They join forces to investigate Messenger’s list of names, and decode Messenger’s final cryptic words. They establish that all on the list were together in a prisoner of war camp in Burma, where a Canadian sergeant, George Brougham, betrayed his fellow prisoners, foiling their escape attempt. Each has a reason to kill Brougham. It evolves that Brougham is their killer, but why? They deduce that he is about to come into prominence and cannot risk being recognised. Gethryn and Le Borg establish that he stands in line to an inheritance of the Bruttenholm family, landed gentry who are friends of Gethryn and the late Messenger, and who avidly engage in fox hunting.
Having disposed of all possible witnesses to his wartime treachery, Brougham (Kirk Douglas) appears at a Bruttenholm estate fox hunt and introduces himself as a member of the family (he has previously been seen only in disguise). It then becomes clear to the visiting Gethryn and Le Borg that Brougham’s next victim is to be the young heir, Derek. In an attempt to divert Brougham, Gethryn makes known his investigation of Messenger’s list, calculating to set himself up as the next victim.
That night, Brougham sabotages the next morning’s hunt by laying a drag with a fox in a sack over the fields. He especially marks a blind spot behind a high wall, and moves a large hay tedder behind, intending for Gethryn (who has been given the honour of leading the hunt) to be impaled upon its lethal tines. Unbeknownst to Brougham, his plan goes awry when a farmer repositions the tedder early the next morning. The hunt commences but comes to a halt at the specified spot. Gethryn reveals to the gathered crowd that he discovered and removed the hay-tedder booby trap earlier that morning and, with the help of the lead fox hound, will detect the scent of the culprit amongst a group of hunt saboteurs. Brougham, once again disguised, is identified and runs off, mounting Derek’s horse. When Derek shouts a command to the horse, the animal stops short, throwing Brougham and impaling him on the very same machine he intended for Gethryn.”
“The Kill List: ICWatch Uses LinkedIn Account Info to Out Officials Who Aided Assassination Program
MAY 28, 2015
WikiLeaks has begun hosting a new database called ICWatch, built by Transparency Toolkit. The site includes a searchable database of 27,000 LinkedIn profiles of people in the intelligence community. Organizers say the aim of the site is to “watch the watchers.” WikiLeaks founder Julian Assange talks about how the database could be used to help identify individuals connected to the U.S. kill list, formally known as the Joint Prioritized Effects List, or JPEL.”
“The Secret Internet Protocol Router Network (SIPRNet) is “a system of interconnected computer networks used by the U.S. Department of Defense and the U.S. Department of State to transmit classified information (up to and including information classified SECRET) by packet switching over the ‘completely secure’ environment”. It also provides services such as hypertext document access and electronic mail. As such, SIPRNet is the DoD’s classified version of the civilian Internet. SIPRNet is the SECRET component of the Defense Information Systems Network. Other components handle communications with other security needs, such as NIPRNet which is used for nonsecure communications, and JWICS which is used for Top Secret communications.”
“FBI: ‘Hostile Actors’ Likely Hacked Clinton Email Secrets
Comey recommends not prosecuting presumed Democratic nominee
BY: Bill Gertz
July 6, 2016 5:00 am
An extensive FBI investigation found evidence that foreign government hackers accessed private emails sent by former secretary of state Hillary Clinton but no direct evidence spies hacked into the several unsecure servers she used.
FBI Director James Comey revealed Tuesday the 11-month probe into Clinton’s private email servers uncovered negligent handling of very sensitive classified information that was placed on several unsecure servers between 2009 and 2013, when Clinton served as secretary of state.
In an unusual public announcement, Comey outlined findings that included discovery of highly classified information sent and received on Clinton’s private email servers, and signs that “hostile actors” gained access to email accounts of people who were sharing emails with Clinton.”
Jan 31, 2001
SBA modernizes to help feed its growing programs [Field McConnell’s sister Kristine Marcy introduced the 8(a) electronic accelerated loan guarantee program at SBA to ensure funding for the Serco protégés’ participating in the 9/11 carbon cap]
BY PATRICIA DAUKANTAS | GCN STAFF
Under a five-year plan for overhauling its information technology systems, the Small Business Administration recently acquired new software for financial and other administrative tasks.
By the time SBA celebrates its 50th anniversary in 2003, agency officials want all their programs up and running around the clock, chief financial officer Joseph Loddo said.
In the first phase of the modernization, the agency has upgraded systems for managing its extensive portfolio of guaranteed loans, chief operating officer Kristine Marcy said.
SBA processed its first electronic loan last November through its Sacramento, Calif., office and plans to add more private lenders during fiscal 2001.
The agency’s staffing level has dropped 22 percent over the past eight years, which is another reason to improve IT, Marcy said. Over the past decade, SBA’s portfolio of loans to small and disadvantaged businesses has more than doubled to $50 billion.
‘We’re a small agency with a huge portfolio,’ Marcy said. SBA supplies more than half of the U.S. venture capital available each year.
Seventy percent to 80 percent of the loans are booked through a preferred lender program [structured by Serco], which involves nearly 7,000 banks, Marcy said. SBA guarantees the loans, just as the government backs student and housing loans.
‘The financial and IT businesses were changing so rapidly, we had to make some changes to stay current with the private sector,’ Marcy said. Banks had been asking SBA to make faster decisions on loan guarantees. The agency decided to aim for a turnaround time of one hour.”
“Serco do a bunch more that didn’t even make our story: As well as thanking God for his success, CEO Chris Hyman is a Pentecostal Christian who has released a gospel album in America and fasts every Tuesday. Amazingly, he was also in the World Trade Centre on 9/11, on the 47th floor addressing [Serco] shareholders. Serco run navy patrol boats for the ADF, as well as search and salvage operations through their partnership with P&O which form Defence Maritime Services. Serco run two Australian jails already, Acacia in WA and Borallon in Queensland. They’re one of the biggest companies In the UK for running electronic tagging of offenders under house arrest or parole.”
“UK Cabinet Office – Emergency Planning College – Serco …..Types of Exercise
Workshop Exercises These are structured discussion events where participants can explore issues in a less pressurised environment. They are an ideal way of developing solutions, procedures and plans rather than the focus being on decision making. Table Top Exercises These involve a realistic scenario and will follow a time line, either in real-time or with time jumps to concentrate on the more important areas. The participants would be expected to be familiar with the plans and procedures that are being used although the exercise tempo and complexity can be adjusted to suit the current state of training and readiness. Simulation and media play can be used to support the exercise. Table-top exercises help develop teamwork and allow participants to gain a better understanding of their roles and that of other agencies and organisations. Command/Control Post Exercises These are designed primarily to exercise the senior leadership and support staff in collective planning and decision making within a strategic grouping. Ideally such exercises would be run from the real command and control locations and using their communications and information systems [Feeling lucky, Punk?]. This could include a mix of locations and varying levels of technical simulation support. The Gold Standard system is flexible to allow the tempo and intensity to be adjusted to ensure maximum training benefit, or to fully test and evaluate the most important aspects of a plan. Such exercises also test information flow, communications, equipment, procedures, decision making and coordination. Live Exercises These can range from testing individual components of a system or organisation through to a full-scale rehearsal. They are particularly useful where there are regulatory requirements or with high-risk situations. They are more complex and costly to organise and deliver but can be integrated with Command Post Exercises as part of a wider exercising package.”
“Serco farewell to NPL after 19 years of innovation 8 January 2015 Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco‘s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade…. NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading [for Serco‘s front running banks] in the City through NPL [Zulu] Time.”
“Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994. This file was obtained from the Secretary of State and has a file number of 1795583.
This business was created 7,695 days ago in the New York SOS Office and the registered agent is C T Corporation System that does business at 111 Eighth Avenue , New York in New York.
After conducting a search for principals and owners of Base One Technologies, Ltd., we were able to find 2 owners and/or executives. Their information is listed below.
This file was last updated on May 14, 2013.
Liza R Zaneri
Chief Executive Officer
15 Irving Place New
Rochelle, NY 10801″
“Serco‘s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals.” http://www.dtic.mil/whs/directives/corres/pdf/100515p.pdf
“[White’s Club member] Rupert Christopher Soames OBE (born 18 May 1959) is a British businessman, CEO of the outsourcing [and long range death-betting bookmaker] company Serco. Soames was born in Croydon, Surrey, to Lord and Lady Soames. He is a grandson of Sir Winston Churchill, a nephew of the former Defence Secretary Duncan Sandys and Diana Churchill; the journalist Randolph Churchill and the actress and dancer Sarah Churchill and a great-nephew of the founders of the Scout movement, Robert Baden-Powell and Olave Baden-Powell. His brother is the Conservative MP Sir Nicholas Soames.
Soames was educated at St. Aubyns Preparatory School in Rottingdean, East Sussex and Eton College, and then Worcester College at the University of Oxford, during which time he worked as a DJ at the London nightclub Annabel’s, as well as being elected to the Presidency of the Oxford Union. Career
Upon graduation, he was offered a position at General Electric Company (GEC) by the managing director Arnold Weinstock. He remained at GEC for 15 years, working in the company’s avionics and computing divisions, and became managing director of Avery Berkel, running the company’s UK, India, Asia and Africa operations.
After leaving GEC in 1997, Soames joined the software company Misys as chief executive of its Midas-Kapiti division. He was promoted to chief executive of the Banking and Securities Division in June 2000.
Soames left Misys after a disagreement with Misys founder Kevin Lomax on the company’s direction, and was appointed chief executive of power hire group Aggreko in June 2003, replacing Philip Harrower who died when his car collided with a train in the United States.
Soames was appointed Officer of the Order of the British Empire (OBE) in the 2010 New Year Honours. In November 2010 Rupert Soames gave a speech to Holyrood in which he warned, “In the UK, we are already close to the rocks, because, over the next 8 years a third of our coal-fired capacity, two-thirds of our oil-fired capacity, and nearly three-quarters of our nuclear capacity will be closed down either through age or the impact of the European Large Combustion Plant Directive. Absent a massive and immediate programme of building new power stations, with concrete being poured in the next two years, we will be in serious danger of the lights going out.”
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation