#2765: Sister Abedin Pimps Clinton Kill List – Serco Conair 8(a) Visas – MH Deaths Trump Zulu ICE
United States Marine Field McConnell
Plum City Online – (AbelDanger.net)
August 30, 2016
1. Abel Danger (AD) claims that Sister Huma Abedin – one of the feminist custodians of a kill list allegedly developed and dumped by the US Investigation Services (USIS) – has been pimping kill-list names to selected pay-to-play donors to the Clinton Foundation since 1996.
2. AD claims that the Abedin Sisterhood has authorized Serco operatives at the National Visa Center to sell Conair rendition visas to donors so they can safely deploy stand-down teams and snuff-film crews to crime scenes for the addition or removal of target names to or from the Clinton kill list.
3. United States Marine Field McConnell has explained to Donald Trump how the Abedin Sisterhood tracked passengers on the Clinton kill list onto MH Flight 370 through a hack of U.S. Immigration and Customs Enforcement (ICE) servers and how those passengers died after Serco remote 8(a) hijackers stood down the Boeing Honeywell Uninterruptible Autopilot on the plane and staged a snuff-film crash in Zulu time.
“Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”
“12/09/2014 DHS, Malaysia sign memorandum of cooperation enhancing customs information-sharing
On Tuesday, U.S. Department of Homeland Security (DHS) Assistant Secretary of International Affairs Alan Bersin and Malaysia’s Ministry of Finance Deputy Minister Ahmad Maslan signed a trade agreement on behalf of their nations in Kuala Lumpur, Malaysia.
Assistant Secretary Bersin signed the Customs Mutual Assistance Agreement (CMAA) on behalf of U.S. Immigration and Customs Enforcement (ICE) and Customs and Border Protection (CBP), two DHS agencies responsible for enforcing U.S. customs laws.
The CMAA enhances bilateral relations by affording both nations with better information-sharing capabilities that will help prevent, repress and investigate customs offenses.
With this new agreement, CBP and ICE now have 73 CMAAs with other customs administrations across the world. CMAAs provide the legal framework for the exchange of information and evidence. This helps countries prevent, detect and investigate customs offenses and crimes associated with goods crossing international borders, including duty evasion, trafficking, money laundering and terrorism-related activities. CMAAs also serve as foundational documents for subsequent information-sharing arrangements, including mutual recognition arrangements on authorized economic operator programs.
Through ICE’s Office of International Affairs and the U.S. Department of State, Homeland Security Investigations (HSI) has 67 attaché offices in 48 countries around the world. HSI special agents work closely with foreign law enforcement agencies and through a robust network of specialized, vetted units known as Transnational Criminal Investigative Units.”
“Malaysian plane: 20 passengers worked for ELECTRONIC WARFARE and MILITARY RADAR firm
A US technology company which had 20 senior staff on board Malaysia Airlines Flight MH370 had just launched a new electronic warfare gadget for military radar systems in the days before the Boeing 777 went missing.
By TED JEORY
PUBLISHED: 08:19, Wed, Mar 19, 2014
DEVELOPMENT: Freescale Semiconductor which had 20 workers on MH370 had just launched new radar chips [EXPRESS] Freescale Semiconductor, which makes powerful microchips for industries including defence, released the powerful new products to the American market on March 3.
Five days later, Flight MH370 took off from Kuala Lumpur for Beijing with 239 people on board including 20 working for Freescale.
Twelve were from Malaysia, while eight were Chinese nationals.
Freescale’s spokesman Mitch Haws has said: “These were all people with a lot of experience and technical background and they were very important people.
“It’s definitely a loss for the company.”
Freescale’s shareholders include the Carlyle Group of private equity investors whose past advisers have included ex-US president George Bush Sr and former British Prime Minister John Major.
These were all people with a lot of experience and technical background – they were very important
Carlyle’s previous heavyweight clients include the Saudi Binladin Group, the construction firm owned by the family of Osama bin Laden.
The fact that Freescale had so many highly qualified staff on board the Boeing 777 had already prompted wild conspiracy theories about what might have happened.
The company says they were flying to China to improve its consumer products operations, but Freescale’s fresh links to electronic warfare technology is likely to trigger more speculation and deepen the mystery. Experts have been baffled how a large passenger jet seems to have flown undetected and possibly beaten military radar systems for up to six hours.
Avoiding radar via “cloaking technology” has long been one of the objectives of the defence industry and Freescale has been active developing chips for military radar.
On its website, the company says its radio frequency products meet the requirements for applications in “avionics, radar, communications, missile guidance, electronic warfare and identification friend or foe”.
Last June it announced it was creating a team of specialists dedicated to producing “radio frequency power products” for the defence industry.
And on March 3, it announced it was releasing 11 of these new gadgets for use in “high frequency, VHF and low-band UHF radar and radio communications”.
The company did not respond to questions from Express Online, including whether any of its missing employees had been working on the defence products.
It neither provided any responses to the latest bizarre conspiracy theory being widely published on the comments sections of newspaper websites and other internet forums.
The comment reads: “It reads: “Have you pieced together the puzzle of missing flight 370 to Beijing China? If not, here are your missing pieces.
“Patents Patents Patents.
“Four days after the missing flight MH370 a patent is approved by the Patent Office [operated by Serco!!!!], four of the five Patent holders are Chinese employees of Freescale Semiconductor of Austin TX….
Malaysia missing plane latest: Now even Malaysian Airlines ground crew face probe
Malaysia Airlines missing plane latest: Co-pilot transmitted final words from the jet
Missing MH 370: Chinese relatives of passengers threaten to go on hunger strike
UK university student among passengers aboard missing Malaysian plane
Bomb could have been concealed in cargo of fruit on missing Malaysia Airlines plane
However, the absurd theory does not add up.
Although a Freescale patent does exist under number US8650327, none of the names listed actually appear on the passenger manifest released by the Malaysian authorities.
The search continues for Flight MH370 but speculation surrounding its fate grows by the day. Some experts believe the plane was hijacked–possibly by the pilots–or that there was a struggle on board which led to a catastrophic decompression.
However, no seat cushions or luggage that would have been expected to float have yet been found in the vast Indian Ocean where it might have crashed.”
“ICE is the largest investigative arm of the Department of Homeland Security (DHS). ICE Homeland Security Investigations (HSI) protects the United States against terrorist and other criminal organizations who threaten our safety and national security and transnational criminal enterprises who seek to exploit America’s legitimate trade, travel, and financial systems. ICE HSI operates out of 70 offices in 47 foreign countries.
HSI criminal investigators utilize innovative investigative techniques and new technological resources to help prevent terrorism and other criminal activities by targeting the people, money and materials that support illegal organizations. They are involved in a variety of challenging criminal and civil investigations involving national security threats, terrorism, public safety, drug smuggling, child exploitation, human trafficking, illegal arms export, financial crimes, identity fraud, benefit fraud, commercial fraud and more. HSI criminal investigators have a commitment to excellence and protecting our country.
ICE HSI periodically posts criminal investigator vacancy announcements on the Office of Personnel Management’s (OPM) USA Jobs website. To learn more about becoming an HSI criminal investigator, contact your nearest Special Agent in Charge Office and ask for the regional or local recruitment coordinator. Phone numbers for each HSI office are listed under Contact Us.”
HOME » IT SECURITY AND DATA PROTECTION » CYBER SECURITY » The OPM Breach: Timeline of a Hack The OPM Breach: Timeline of a Hack
JUN 29, 2015
Updated: July 10, 2015 – 9:00 AM PST The United States Office of Personnel Management (OPM) has recently been in the news for two separate breaches that may have compromised the information of as many as 18 million former, current and prospective federal employees. Significantly, the story of these two intrusions stretches back to as early as spring of last year. The timeline below summarizes the events that are known to have been associated with these breaches thus far.
Chinese hackers infiltrate the OPM’s computer systems, presumably to collect information on federal employees who had applied for top security clearance in the past. The agency informs federal, state, and local government officials that they were able to thwart the attack using intrusion detection systems (IDS) installed on its network, which leads the Obama administration to believe that no personally identifiable information was compromised by the incident. No mention of the attack is therefore made to the public.
The United States Investigation Services (USIS) discloses a breach of 25,000 government employees’ personal information to the OPM and sends out a memo on June 17 notifying 15 large federal agencies of the intrusion. The Department of Homeland Security (DHS) contacts the United States Computer Emergency Readiness Team, which launches an investigation into the scope and nature of the breach. In the meantime, the OPM severs its contracts with USIS, which leads the contractor to lay off 2,500 employees by October. It has since been revealed that this incident affecting USIS likely occurred at around the same time as the OPM breach.
July 9, 2014
The New York Times runs an article that reveals the OPM attack for the first time to the American public. On that same day, the agency sends anemail to its employees informing them of the intrusion into its networks back in March and advising that they remain vigilant with regards to future computer threats.
August 6, 2014
Multiple news outlets report on the USIS June breach, with the contractor reportedly having stated that the intrusion “has all the markings of a state-sponsored attack.” By this time, the DHS has also suspended all contracts with the USIS, and the Federal Bureau of Investigations has commenced an investigation into the incident.”
“The ICE Foundation is governed by an executive committee. The board of directors is responsible for crafting programming and support strategies. … Kristine Marcy Board Director The National Academy of Public Administration (NAPA) Kristine M. Marcy served as President and CEO of the National Academy of Public Administration, a non-profit organization chartered by Congress and dedicated to improving Government from January 2011 to June 30, 2011 at the unanimous request of the Board of Directors. Ms. Marcy is a retired federal executive with over 30 years of experience in ten federal departments and agencies including Small Business Administration, Department of Justice Immigration and Naturalization Service, DOJ U.S. Marshals Service, and DOJ Office of the Deputy Attorney General. During her career, Ms. Marcy blended deep technical knowledge with extensive hands-on experience to assist agencies in both operational and leadership positions. Post retirement, Ms. Marcy was an executive consultant for McConnell International, a Government Relations consulting firm, and brought her considerable network of contacts and her direct knowledge of many US federal agencies to help private sector clients develop business strategies.”
“McConnell’s Conair Sister Kristine Marcy installed remote decoy, drone and hijacking technology on the Conair fleet for use by Serco – the world largest air traffic controller – to bypass POTUS and JCS on the Defense Red Switch Network
http://www.ufomind.com/area51/list/1997/jan/a07-008.shtml “Con-Air” in 1/6 San Diego Union Tribune Nichols and McVeigh were transported in the dead of night in an operation much akin to a clandestine military operation, Little said. He did not want to go into details but mentioned that a decoy plane was among the ploys used to guard against possible attempts by supporters to free the suspects. Federal officials have always been circumspect about the fine points of prisoner movement. But ConAir soon could gain a higher public profile with the planned release in June of a movie by the same name. In the Disney film, Nicolas Cage plays a hapless prisoner who wanders into a hijack plot aboard a Marshals Service plane carrying a group of high-security inmates. The Hollywood marshals rough up some of the prisoners, and the plane crashes, leaving the real Marshals Service frowning on the silver screen’s invention, said Kristine Marcy, a top official in charge of detentions [and decoy contract hits]. “We don’t beat up our prisoners, and our planes certainly don’t crash,” Marcy said on a recent trip to San Diego, where she was trying to find more jail space for federal prisoners.””
“Innoventor, Inc. recognized by U.S. Small Business Administration
By: By Linda H. Conway
Innoventor, Inc., which was founded by MechSE alumnus Kent Schien, has been named ‘National Small Business Prime Contractor of the Year’ by the U.S. Small Business Administration. Schien’s company was selected from among nine regional prime contractors to receive the award in recognition of the company’s outstanding service as a prime contractor of goods and services to the federal government. The award was announced last week as part of the National Small Business Week celebration in Washington, D.C.
“The federal government put nearly $100 billion in federal contracts in the hands of small businesses last year,” said SBA Administrator Karen G. Mills. “Those small businesses–including the ones being honored today–are creating jobs and delivering innovative products and services to make America stronger. Today, we celebrate the achievements of small businesses as well as their partners and advocates in the federal contracting community.”
Innoventor is a design/build engineering firm founded in the basement of Schien’s home in 1996. The company, located in St. Louis, MO, is the recipient of numerous previous awards. Innoventor’s core competency is combining cross-industry experience and cutting edge technology to provide innovative solutions for a variety of customer demands. Its customers include the government, aerospace, military, automotive, commercial, industrial, agriculture, food and beverage, medical, pharmaceutical and power industries. It has been a prime contractor at Warner Robbins Air Force Base in Georgia for the cesium-based master regulating clock, a precision instrument that regulates secondary clocks in complicated systems, for the E-4B Advanced Airborne Command Post for the U.S. Air Force.”
“Meeting in Washington, DC, on May 17, 2011 US Secretary of State Hillary Rodham Clinton and EU Foreign Affairs & Security Policy High Rep./European Commission VP Catherine Ashton discussed a number of issues of common concern, including the situations in Libya, Syria, Egypt and Belarus. Following their meeting, Secretary of State Clinton and High Representative Ashton signed a Framework Agreement between the US and the EU, which provides a legal framework for US civilians to participate in EU crisis management missions.”
WASHINGTON, DC — Attorney General Janet Reno presented Hammer Awards to three employee working groups from Justice Department components as part of the Department’s “Justice Performance Review Lab Day,” an event showcasing the achievements of the Department’s 16 reinvention labs.
The Hammer Award is Vice President Gore’s special recognition to teams of employees which made significant contributions in support of the President’s National Performance Review (NPR) principles of improving customer service, cutting red tape, empowering employees, and getting back to basics.
“By accepting the challenge to re-invent government, these employees are making government more efficient and improving the way we perform our public responsibilities,” Reno said during theLab Day event in the Justice Department’s Great Hall. Deputy Attorney General Jamie Gorelick, who also attended, noted that the employees “have taken the concept of creating a government that works better and costs less and have made it a reality.”
The three Justice Department teams receiving the award are:
• The SENTRI Reinvention Lab, for developing a secure, high-tech, automated border inspection system at Otay Mesa, California;
• The Joint Automated Booking System (JABS) Lab, a multi-component effort which has significantly improved the prisoner booking process;
• The Justice Prisoner Alien Transportation System (JPATS), which combines the resources of several DOJ components to schedule[murder for hire] and transport prisoners more quickly, safely, and economically. Additional information on the awardees is attached. 96-523 ###”
“Byron York: Hillary Clinton BleachBits her past
BYRON YORK (@BYRONYORK) • 8/25/16 11:06 PM
While Hillary Clinton was preparing to deliver a big speech portraying Donald Trump as a racist, a figure from Clinton’s recent unhappy past — Rep. Trey Gowdy, chairman of the House Select Committee on Benghazi — added a new word to the 25-year vocabulary of Clinton scandals: BleachBit.
That is the name of a publicly-available utility used to delete material from a computer’s hard disk. And it’s not just for casual, quickie deletes of junk mail. It’s for when a user really wants to destroy material on a computer so that no one will be able to recover it.
According to Gowdy, BleachBit is what Clinton and her legal team used, or at least part of what her team used, to destroy the 30,000 or so emails on her secret system that she deemed “personal” from her years as secretary of state. On Thursday, after revelations that the FBI had perhaps worked its way around BleachBit to discover an additional 14,900 emails that Clinton did not hand over, Gowdy went on Fox News to discuss both that development and the FBI documents that underlay the Justice Department’s decision not to prosecute Clinton for mishandling classified information.
The public should be allowed to see those currently classified FBI documents, Gowdy said, adding that he has reviewed them all. If people were allowed to read the papers, Gowdy explained, they might well come away with questions about the wisdom of the FBI’s decision.
“I read every word of all of the witness interviews,” Gowdy told Fox. “My takeaway was this: Remember James Comey said [Clinton] was not indicted because he didn’t have sufficient evidence on the issue of intent. I didn’t see any questions on the issue of intent.”
And then there were those deleted emails. First, it’s long been known that Clinton and her lawyers — and no independent arbiter — decided what to hand over and what to destroy. Clinton famously explained that she destroyed only the emails that dealt with personal issues, like yoga or her daughter Chelsea’s wedding. But in light of new revelations about the close relationship between Clinton’s Secretary of State office and the Clinton Foundation, a question gaining urgency in recent days is whether Clinton destroyed foundation-related emails on the grounds that they were “personal.”
“That’s the $100 million question,” Gowdy told Fox’s Martha MacCallum. “I hope somebody in your line of work will ask [Clinton]: Did you consider foundation emails to be personal or work r elated? I have yet to see a single foundation email produced by the State Department that was sent by her.” Gowdy went on to reveal a few details about how Clinton destroyed the documents she did not want anyone to see. “If she considered them to be personal, then she and her lawyers had those emails deleted,” Gowdy said. “They didn’t just push the delete button. They had them deleted where even God can’t read them.”
“They were using something called BleachBit,” Gowdy continued. “You don’t use BleachBit for yoga emails or for bridesmaid’s emails. When you’re using BleachBit, it is something you really do not want the world to see.” Amid growing controversy over the Clinton Foundation, possible conflicts of interest, and allegations of access and pay-to-play, Gowdy’s words served to return the focus to what the New York Times’ Mark Landler recently called the “original sin” of the Clinton email affair: Clinton took it upon herself to decide which of her emails as Secretary of State would be preserved, and which would be destroyed.
“There wasn’t an independent authority that got to make that decision,” Landler said on NPR’s “Diane Rehm Show” Wednesday. “And by the time we found out about it, those emails were gone.”
With the help of BleachBit, we now know.
“Opened in 1994 as the successor to the Transitional Immigrant Visa Processing Center in Rosslyn, Va., the NVC centralizes all immigrant visa pre-processing and appointment scheduling for overseas posts. The NVC collects paperwork and fees before forwarding a case, ready for adjudication, to the responsible post.
The center also handles immigrant and fiancé visa petitions, and while it does not adjudicate visa applications, it provides technical assistance and support to visa-adjudicating consular officials overseas.
Only two Foreign Service officers, the director and deputy director, work at the center, along with just five Civil Service employees. They work with almost 500 contract employees doing preprocessing of visas, making the center one of the largest employers in the Portsmouth area.
The contractor, Serco, Inc., has worked with the NVC since its inception and with the Department for almost 18 years.
The NVC houses more than 2.6 million immigrant visa files, receives almost two million pieces of mail per year and received more than half a million petitions from the U.S. Citizenship and Immigration Service (USCIS) in 2011. Its file rooms’ high-density shelves are stacked floor-to-ceiling with files, each a collection of someone’s hopes and dreams and each requiring proper handling. ….
The NVC also preprocesses the chief of mission (COM) application required for the filing of a petition for a Special Immigrant Visa (SIV). Such visas, for foreign nationals who have performed services for the U.S. government in Iraq and Afghanistan, require COM concurrence before the applicant can file a petition with USCIS. The NVC collects the requisite documents from such applicants and, when complete, forwards the package to the U.S. embassies in Baghdad or Kabul for COM approval”
“Sued for Fraud by DOJ, Security Co That Cleared Snowden Works for U.S. Immigration
APRIL 08, 2014
The federal contractor sued by the Justice Department for failing to adequately conduct government security clearances—including NSA leaker Edward Snowden—is processing sensitive immigration applications for the Obama administration.
This astounding information comes from a high-ranking government source with detailed knowledge of the arrangement. Though it‘s being investigated by the Department of Justice (DOJ) for fraud, United States Investigations Services (USIS), has been taking over a lot of administrative processing of immigration benefit applications, the inside source told Judicial Watch. The scandal-plagued company is also handling sensitive immigration files, despite its well-documented transgressions.
It’s preposterous that a company under fraud investigation is still allowed to handle sensitive government applications, JW’s source logically points out. Here’s how it happens; Most of USIS’s executives are retired officials who worked for the influential Senior Executive Service at the U.S. Office of Personnel Management (OPM), the agency that operates and oversees nearly every government activity in dozens of federal agencies. Their connections help them land federal contracts, JW’s source says, and once they land the lucrative deals they convince the government to let them do their own quality assurance so they cut corners.
The serious corner cutting came to light after Snowden, a National Security Administration contractor, divulged thousands of classified documents to the media. USIS, which handles the bulk of background checks for government security clearances, had conducted Snowden’s background check as well as the clearance for Navy Yard shooter Aaron Alexis. Since the two breaches occurred, former USIS employees have come forward accusing the company of unrealistic deadlines and workloads, dumping cases and producing incomplete background checks to meet revenue goals.
As part of its fraud probe of USIS, which is based in Falls Church, Virginia, the DOJ filed a lawsuit in federal court earlier this year accusing the contractor of failing to adequately conduct security checks in 40% of the cases it handled for the government. USIS submitted at least 665,000 incomplete background checks to OPM, the agency that officially contracts firms to do government work, the complaint says. It further alleges that USIS dumped and flushed cases, falsely representing them as completed, to maximize the company’s revenues and profits.
Months before it filed the complaint, the DOJ announced that it had launched an investigation of USIS, which the agency revealed had been contracted by the U.S. government since 1996 to perform background investigations on individuals seeking employment with various federal agencies. In the announcement a high-ranking federal prosecutor said USIS’s shortcuts would not be tolerated and that the DOJ would take action against those who charge taxpayers for services they failed to provide, “services that could place our country’s security at risk.”
The top federal prosecutor in the Alabama district where the DOJ filed the USIS lawsuit added that “the increase in foreign and domestic terrorism places an increased responsibility on our government to ensure that unsuitable individuals are prohibited from government employment.” That means thorough, appropriate and accurate background checks are essential in the employment of government personnel, the assistant U.S. Attorney said. It appears from the written announcement that the feds get it, but their actions (letting a tainted company handle sensitive immigration files) tell a different story.”
“STAYED, TYPE-E U.S. District Court District of Columbia (Washington, DC) CIVIL DOCKET FOR CASE #: 1:14-cv-00726-RMC PERCIVAL v. U.S. INVESTIGATION SERVICES, LLC Assigned to: Judge Rosemary M. Collyer Case in other court: USDC for the Middle District of Alabama, 2:11cv00527-WKW Cause: 31:3729 False Claims Act Date Filed: 04/25/2014 Jury Demand: Plaintiff Nature of Suit: 890 Other Statutory Actions Jurisdiction: Federal Question … MINUTE ORDER. On consideration of Defendant’s 31 Notification of Bankruptcy pursuant to Title 11 of the United States Code, 11 U.S.C. § 101 et. seq. and in accordance with 11 U.S.C. § 362, the automatic stay provision, it is hereby ORDERED that this case is stayed. Signed by Judge Rosemary M. Collyer on February 13, 2015. (lcrmc1) (Entered: 02/13/2015)”
“First, the United States is a plaintiff in a pending False Claims Act, 31 U.S.C. §§ 3729-33 (“FCA”), lawsuit against debtor U.S. Investigations Services, Inc. (“USIS”). The lawsuit is based on false statements and claims related to background investigations that USIS knowingly presented to, or caused to be presented to, the United States that were not reviewed in accordance with the applicable contractual obligations (“FCA Lawsuit”). (See US FCA Complaint, attached hereto as Exhibit 1.) Specifically, the FCA Lawsuit alleges that USIS devised and executed a scheme — internally characterized as “dumping” or “flushing” — to deliberately circumvent contractually required quality reviews of completed background investigations in order to increase the company’s revenues and profits. (US FCA Complaint at ¶ 42.) In addition to USIS, Altegrity and certain non-debtor officers and directors of USIS (“Non-USIS Parties”) may have liability arising from the actions alleged in the FCA Lawsuit based on those parties’ involvement. The Plan impermissibly: (1) seeks a release of the Non-USIS Parties’ FCA liabilities; and (2) extinguishes the United States’ rights relating to setoff and recoupment; and (3) potentially precludes the United States from seeking a determination of non- 1 The United States reserves its rights to supplement or amend this Objection at any time. Case 15-10226-LSS Doc 654 Filed 06/19/15 Page 3 of 23 2 dischargeability of the Debtors’ fraud liability. … Third, USIS provided background investigation services to numerous federal agencies. As such, multiple statutory, regulatory and contractual obligations require USIS to safeguard the government data in its possession. The Plan should be amended to clarify that it does not affect the Debtors’ duty to comply with their data security obligations”
“FBI: ‘Hostile Actors’ Likely Hacked Clinton Email Secrets
Comey recommends not prosecuting presumed Democratic nominee
BY: Bill Gertz
July 6, 2016 5:00 am
An extensive FBI investigation found evidence that foreign government hackers accessed private emails sent by former secretary of state Hillary Clinton but no direct evidence spies hacked into the several unsecure servers she used.
FBI Director James Comey revealed Tuesday the 11-month probe into Clinton’s private email servers uncovered negligent handling of very sensitive classified information that was placed on several unsecure servers between 2009 and 2013, when Clinton served as secretary of state.
In an unusual public announcement, Comey outlined findings that included discovery of highly classified information sent and received on Clinton’s private email servers, and signs that “hostile actors” gained access to email accounts of people who were sharing emails with Clinton.”
“Serco farewell to NPL after 19 years of innovation 8 January 2015 Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco’s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade…. NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading [for Serco’s front running banks] in the City through NPL [Zulu] Time.”
“Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994.This file was obtained from the Secretary of State and has a file number of 1795583.”
“Serco’s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals.” http://www.dtic.mil/whs/directives/corres/pdf/100515p.pdf
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation