#2813: Trump Needs Five-Star General – Serco Lockheed Nukes On UK Zulu Bridge – Clinton’s 8(a) Coup de Pride
United States Marine Field McConnell
Plum City Online – (AbelDanger.net)
October 22, 2016
1. Abel Danger (AD) believes that Donald Trump needs to identify a future five-star general to begin to neutralize an alleged threat from Clinton Foundation donors and their allies to kill 25 million Americans after they failed to initiate a revolution with the 9/11 attacks.
2. AD claims that Serco and Lockheed Martin have developed dial-a-yield nuclear weapons at the U.K. Atomic Weapons Establishment which can be delivered by mentors of the US Federal Bridge Certification Authority to generate a predicted body count in Zulu time.
3. AD claims that Trump’s 5 star general will have to neutralize Serco’s shareholders, including the UK and Saudi governments, and Clinton’s associates in DOJ Pride before they can deploy an army of 8(a) insurrectionists in a nuclear coup d’état.
4. United States Marine Field McConnell – Abel Danger’s Global Operations Director – offers to serve as a five-star general in a Trump administration and help his military associates destroy a well-armed enemy within the gates.
OBAMA WANTS 25 MILLION DEAD
Hillary Clinton just TOLD THE WHOLE WORLD OUR NUCLEAR LAUNCH SECRETS!!!
“Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”
“AWE is formed of three equal shareholders – Lockheed Martin [allegedly extorted mentor of 8(a) companies on the FederalBridge], Serco and Jacobs Engineering Group in a contract that extends until March 2025.
AWE’s role is to manufacture and sustain the warheads for the Trident system, ensuring optimum safety and performance, but also to maintain a capability to produce a successor system should the Government require one in the future.
The work at AWE covers the entire life cycle of nuclear warheads; from initial concept, assessment and design, through to component manufacture and assembly, in-service support, and finally decommissioning and disposal.”
“Super Serco bulldozes ahead
By DAILY MAIL REPORTER UPDATED: 23:00 GMT, 1 September 2004
SERCO has come a long way since the 1960s when it ran the ‘four-minute warning’ system to alert the nation to a ballistic missile attack.
Today its £10.3bn order book is bigger than many countries’ defence budgets. It is bidding for a further £8bn worth of contracts and sees £16bn of ‘opportunities’.
Profit growth is less ballistic. The first-half pre-tax surplus rose 4% to £28.1m, net profits just 1% to £18m. Stripping out goodwill, the rise was 17%, with dividends up 12.5% to 0.81p.
Serco runs the Docklands Light Railway, five UK prisons, airport radar and forest bulldozers in Florida.”
“Hillary Reveals America’s Nuclear Response Time During The Debate
Hillary Clinton just TOLD THE WHOLE WORLD OUR NUCLEAR LAUNCH SECRETS!!!
BY: CHASE STEPHENS
OCTOBER 20, 2016
During the final presidential debate, the candidates got into a heated exchange about the use of nuclear weapons, in which Hillary Clinton trotted out her talking point that Donald Trump is unfit to have his finger on the button because of his lack of self-control. What made the internet go nuts, however, was when she added one specific detail to her argument that some are saying is a violation of operational security, a routine she knows well.
In the clip, after calling out Trump for being “casual about the use of nuclear weapons,” Hillary then casually pops off the exact response time our government would have during an attack.
“Here’s the deal,” Hillary tells Chris Wallace and the entire planet watching live, “The bottom line on nuclear weapons is that when the president gives the order it must be followed. There’s about four minutes between the order being given and the people responsible for launching nuclear weapons to do so.””
“Serco farewell to NPL after 19 years of innovation 8 January 2015 Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco’s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade…. NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading [for Serco’s front running banks] in the City through NPL [Zulu] Time.”
“UK Cabinet Office – Emergency Planning College – Serco …..Types of Exercise Workshop Exercises These are structured discussion events where participants can explore issues in a less pressurised environment. They are an ideal way of developing solutions, procedures and plans rather than the focus being on decision making. Table Top Exercises These involve a realistic scenario and will follow a time line, either in real-time or with time jumps to concentrate on the more important areas. The participants would be expected to be familiar with the plans and procedures that are being used although the exercise tempo and complexity can be adjusted to suit the current state of training and readiness. Simulation and media play can be used to support the exercise. Table-top exercises help develop teamwork and allow participants to gain a better understanding of their roles and that of other agencies and organisations. Command/Control Post Exercises These are designed primarily to exercise the senior leadership and support staff in collective planning and decision making within a strategic grouping. Ideally such exercises would be run from the real command and control locations and using their communications and information systems [Feeling lucky, Punk?]. This could include a mix of locations and varying levels of technical simulation support. The Gold Standard system is flexible to allow the tempo and intensity to be adjusted to ensure maximum training benefit, or to fully test and evaluate the most important aspects of a plan. Such exercises also test information flow, communications, equipment, procedures, decision making and coordination. Live Exercises These can range from testing individual components of a system or organisation through to a full-scale rehearsal. They are particularly useful where there are regulatory requirements or with high-risk situations. They are more complex and costly to organise and deliver but can be integrated with Command Post Exercises as part of a wider exercising package.”
“SEPTEMBER 11, 2001 – WHAT A REAL PRESIDENT WOULD HAVE SAID We now leave the terrain of what actually happened, and move to a hypothetical sphere in which we can best try to shed further light on the events of 9/11. At this point a detailed account and timelines of what really happened behind the scenes on 9/11 cannot be attempted. However, we can speculate as to what an honest and courageous president might have done. Such a president might not have immediately understood the full scope of the 9/11 plot, but he would have insisted upon political accountability for appointed officials and on an immediate and thorough investigation. Some guidance might have come from an examination of the Ed Meese press conference of November 1986 which blew the lid off the Iran-contra scandal, and which was accompanied by the firing of Oliver North and John Poindexter, then the NSC director.
The speech on the evening of 9/11 might have sounded something like this:
“My fellow citizens:
Today our country and our political system have been targeted by large-scale acts of terrorism. These are monstrous crimes against humanity, and they will not go unpunished. We send our solidarity to the brave firemen, policemen, military people, and office workers who have borne the brunt of this assault. We promise an equitable and equal compensation for the human losses of this day. Insistent and irresponsible voices have been raised in my own White House and in the intelligence agencies, and have inspired media reports attributing these attacks to Arab or Islamic terrorists of the al Qaeda Bin Laden organization. But this is no time for snap decisions or a rush to judgment when we are dealing with the present and future peace of the world. It is true that we have bitter enemies around the world, but the capabilities displayed today appear to go far beyond the technical and physical means available to al Qaeda. We must also recall that, under the reckless and irresponsible policies of my predecessors, the CIA had been one of the main sponsors of Bin Laden and al Qaeda. If we think back to the attack on the federal building in Oklahoma City in 1995, we remember that media voices attempted in the first hours to attribute that tragedy to the Arab world. Although I am convinced that we still do not know the full story of Oklahoma City, it is clear that the Arab world was not involved. There are too many unanswered questions at this point. How were the terrorists who seem to have been involved allowed to enter the United States and operate freely in this country? Why was there no air defense over a period of one hour and fifteen minutes? I have ordered an immediate inquiry into this question, and in the meantime I have accepted the resignations of Gen. Myers of the Air Force, the deputy chairman of the Joint Chiefs of Staff, and of Gen. Bernhard of NORAD, whose agency failed the people today. There is also evident reason to believe that the CIA, the FBI, the NSA, and the Immigration and Naturalization Service have not performed satisfactorily, based on the fragmentary accounts available so far. I have therefore accepted the resignations of the leaders of those agencies, and of their principal deputies. I have furthermore accepted the resignation of the Secretary of Defense and his deputy, the Attorney General, the Secretary of Transportation, and of my National Security Adviser, since it is evident to me that they could not continue to serve the nation effectively because of the immense tragedy which has occurred on their watch. We rightly demand accountability from teachers, from railroad engineers, and from physicians. We therefore have all the more reason to demand accountability and responsibility from those who have been entrusted with the management of the executive departments, several of which have not served us well today. Another question involves the collapse of the World Trade Center towers many minutes after they had been impacted by the airplanes. These events, as you know, represent an absolute anomaly in the history of skyscrapers. In particular, there is no explanation whatsoever for the collapse of building seven at five o’clock in the afternoon. Accordingly, and consistent with our urgent measures to save any victims remaining in the rubble, I am ordering the Seventh Mountain Division of Fort Drum, New York, to seize control of the site of the World Trade Center, cordoning it off as a crime scene and taking immediate measures for preserving the evidence we must have to determine what really happened. Not one scrap of metal will be removed before a full forensic survey has been carried out. Contrary to media accounts, we have not been able to identify the flying object which apparently hit the Pentagon, although it seems likely that it was not a Boeing 757, and thus could hardly have been United flight 73. As for the tragedy over Shanksville, we are investigating whether this aircraft was shot down by our own forces, and why. All crash sites are being secured by military units, acting under my direct orders, whose loyalty to the Constitution is beyond question. The overriding question is whether the criminals who acted today enjoyed support or collaboration from within our own country and even within our own government. I have created a special unit of federal investigators which will act under my direct orders and which will report to me and to me alone. The first task of that unit will be to determine why there was no air defense, in violation of the standard operating procedures of NORAD and the FAA. Another task will be to examine the entire roster of FBI and CIA double agents presently infiltrating terrorist groups and how they are managed, with a view to identifying possible factors of collusion. Another task will be to determine why our watch list procedures and other forms of vigilance were not effective in screening the criminals out. As far as the FBI is concerned, I urge the Congress to join me in breaking up this tragically dysfunctional agency. After Ruby Ridge, Waco, the FBI crime lab, Wen Ho Lee, the Atlanta Olympics and Richard Jewel, the withheld documents in the McVeigh case, we now have September 11, 2001. The FBI has never recovered from the corruption and mismanagement instilled during the fifty year reign of J. Edgar Hoover, a man whom we know today to have been unfit for public office. The FBI has many dedicated public servants, but they are trapped today in a structure of incompetence, corruption, and worse. Accordingly, I am placing the FBI into receivership by executive order with immediate effect; this agency will operate for the time being under the direction of my special assistant for internal security. In determining the full scope of what happened today, I need the help of all our citizens. If you know something important about what happened today, I want to hear it. Call the White House and talk with one of my staff, who are mobilized to take your calls. If you see anyone, including especially federal agents, attempting to tamper with evidence, or if a federal agent attempts to intimidate you into saying you saw or heard something you did not see, I want to know about that, too. I am also determined to find out if foreign intelligence agencies or foreign citizens were involved in today’s events. I am appointing myself as temporary Director of the CIA, and in that capacity I will undertake a comprehensive review of foreign operations on American soil. No foreign agency will be exempted, and I promise you a full initial progress report. In addition to the immediate investigations I have mentioned so far, I am also empanelling a board of inquiry to study today’s events and offer a second opinion on what may have gone wrong. I am asking Senator Byrd to be the chairman of this body, and Lawrence Walsh, a Republican, the former Iran-contra prosecutor, to be the vice chairman. I have invited former Secretary of the Treasury O’Neill, former President Carter, General Zinni, former Governor Ryan of Illinois to serve. I am also actively soliciting participation by outsiders and academics who have been critics of our government policies of recent years. I am inviting Susan Sontag, Eric Foner, Noam Chomsky, Chalmers Johnson, Howard Zinn, and Seymour Hersh to become members of the board of inquiry. Let them play the devil’s advocates, if they will, so long as we obtain truth and justice. They will all receive the necessary security clearances directly from me personally, if necessary. I will personally supervise the rapid declassification of documents as recommended by the board of inquiry in order to educate the public about the board’s findings. We all remember the failure of the Warren Commission; that failure will not be repeated during my presidency. I recall the words of President Eisenhower in the wake of the Kennedy assassination: the American people, he commented will not be stampeded. I ask you to support your government and its constitutional institutions, and not to give way to the voices of hatred, fear, aggression, and paranoia. I promise that swift justice will be rendered for those who have struck us today, no matter who they turn out to be. These dastardly attacks will not force this great nation off course; they will not force us to become something we are not. We will remain ourselves. We will go forward in the great American tradition of the Monroe Doctrine, the Good Neighbor Policy, the Bretton Woods system, the Marshall Plan, and the Four Freedoms of the Atlantic Charter, starting with the freedom from fear. Further attacks cannot be ruled out in the coming days and weeks. Because of the office I hold, and because of the constitutional responsibilities I must meet, I ask for your support – no matter what may happen during the coming days and weeks. Good night””
“Christopher Rajendran Hyman CBE (born 5 July 1963 in Durban, South Africa) was Chief Executive of Serco Group plc from 2002 to October 2013. … On graduation, he worked for Arthur Andersen. In 1989, he won an 18-month exchange with Ernst & Young in London, who employed him after four months. Head hunted in 1994 by Serco, Hyman became European finance director, and in 1999 was made group finance director. In 2002, Hyman became chief executive. .. Hyman resigned from his role of Chief Executive of Serco on 25 October 2013 following allegations that Serco had overcharged government customers. .. He was [making a presentation to Serco shareholder, including British and Saudi governments] on the 47th floor of the World Trade Center [North Tower] at the time of the September 11 attacks in 2001.”
“July 7, 2016 Developments in PKI occurred in the early 1970s at the British intelligence agency GCHQ, where James Ellis, Clifford Cocks and others made important discoveries related to encryption algorithms and key distribution. However, as developments at GCHQ are highly classified, the results of this work were kept secret and not publicly acknowledged until the mid-1990s.
The public disclosure of both secure key exchange and asymmetric key algorithms in 1976 by Diffie, Hellman, Rivest, Shamir, and Adlemanchanged secure communications entirely. With the further development of high-speed digital electronic communications (the Internet and its predecessors), a need became evident for ways in which users could securely communicate with each other, and as a further consequence of that, for ways in which users could be sure with whom they were actually interacting.
Assorted cryptographic protocols were invented and analyzed within which the new cryptographic primitives could be effectively used. With the invention of the World Wide Web and its rapid spread, the need for authentication and secure communication became still more acute. Commercial reasons alone (e.g., e-commerce, online access to proprietary databases from web browsers) were sufficient. Taher Elgamal and others at Netscape developed the SSL protocol (‘https’ in Web URLs); it included key establishment, server authentication (prior to v3, one-way only), and so on. A PKI structure was thus created for Web users/sites wishing secure communications.
Vendors and entrepreneurs saw the possibility of a large market, started companies (or new projects at existing companies), and began to agitate for legal recognition and protection from liability. An American Bar Association technology project published an extensive analysis of some of the foreseeable legal aspects of PKI operations (see ABA digital signature guidelines), and shortly thereafter, several U.S. states (Utah being the first in 1995) and other jurisdictions throughout the world began to enact laws and adopt regulations. Consumer groups raised questions about privacy, access, and liability considerations, which were more taken into consideration in some jurisdictions than in others.
The enacted laws and regulations differed, there were technical and operational problems in converting PKI schemes into successful commercial operation, and progress has been much slower than pioneers had imagined it would be.
By the first few years of the 21st century, the underlying cryptographic engineering was clearly not easy to deploy correctly. Operating procedures (manual or automatic) were not easy to correctly design (nor even if so designed, to execute perfectly, which the engineering required). The standards that existed were insufficient.
PKI vendors have found a market, but it is not quite the market envisioned in the mid-1990s, and it has grown both more slowly and in somewhat different ways than were anticipated. PKIs have not solved some of the problems they were expected to, and several major vendors have gone out of business or been acquired by others. PKI has had the most success in government implementations; the largest PKI implementation to date is the Defense Information Systems Agency (DISA) PKI infrastructure for the Common Access Cards program.”
Base One Technologies – Corporate Strategy – We are a Government Certified Women-Owned Business
We practice Diversity Recruitment and Staffing for IT positions Base One was founded in 1994 by a women engineer who had made a career in technology research for many years. Base One has been very successful in focusing on diversity recruiting and staffing for IT projects. It has been our experience that the greater the diversity mix, the more creative the solution. As in any field the more diverse the viewpoint the more thorough your analysis. Our engineers can think out of the box.
Because of our affiliations we have access to pools of resources among more diverse groups & individuals. We work with a large pool of minority professionals who specialize in IT skills. We are able to have access to these resources through our status as a D/MWBD firm and our affiliations. These affiliations assist us in working with resources among more diverse groups & individuals. We are also partnered with firms that are 8A certified as Minority firms, Disabled Veteran firms, Native American firms, Vietnam veteran firms, women owned firms.
Our hub zone location keeps us close to the professional organizations of great diversity. We are active in recruiting from and networking with these community organizations of local IT professionals. This has given us access to a large pool of diversity talent.
Base One’s staff of engineers are a diverse group of professionals. This diverse network of engineers helps us to branch out to other engineers and creates an even larger network of resources for us to work with.
The greater the diversity the more complete & thorough the analysis. The broader the spectrum of points of view the broader the scope of the analysis. We feel that a diverse team gives us a greater advantage in creating cutting edge solutions. To that end we will continue to nurture these relationships to further extend our talent pool.
The greater the diversity mix, the more creative the solution.
The more diverse the viewpoint, the more thorough the analysis.
The more diverse our team, the more our engineers can think out of the box.
This is why Base One Technologies concentrates on diversity recruitment in the belief that a diverse team gives us a greater advantage in creating cutting edge solutions.”
Information Security Planning is the process whereby an organization seeks to protect its operations and assets from data theft or computer hackers that seek to obtain unauthorized information or sabotage business operations.
Key Clients Benefiting From Our Information Security Expertise: Pentagon Renovation Program, FAA, Citigroup, MCI.
Base One Technologies
Expertly researches, designs, and develops information security policies that protect your data and manage your firm’s information technology risk at levels acceptable to your business.
Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report.
Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions.”
“Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994.This file was obtained from the Secretary of State and has a file number of 1795583.”
“Serco’s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals.”http://www.dtic.mil/whs/directives/corres/pdf/100515p.pdf
“Opened in 1994 as the successor to the Transitional Immigrant Visa Processing Center in Rosslyn, Va., the NVC centralizes all immigrant visa pre-processing and appointment scheduling for overseas posts. The NVC collects paperwork and fees before forwarding a case, ready for adjudication, to the responsible post.
The center also handles immigrant and fiancé visa petitions, and while it does not adjudicate visa applications, it provides technical assistance and support to visa-adjudicating consular officials overseas.
Only two Foreign Service officers, the director and deputy director, work at the center, along with just five Civil Service employees. They work with almost 500 contract employees doing preprocessing of visas, making the center one of the largest employers in the Portsmouth area.
The contractor, Serco, Inc., has worked with the NVC since its inception and with the Department for almost 18 years.
The NVC houses more than 2.6 million immigrant visa files, receives almost two million pieces of mail per year and received more than half a million petitions from the U.S. Citizenship and Immigration Service (USCIS) in 2011. Its file rooms’ high-density shelves are stacked floor-to-ceiling with files, each a collection of someone’s hopes and dreams and each requiring proper handling. ….
The NVC also preprocesses the chief of mission (COM) application required for the filing of a petition for a Special Immigrant Visa (SIV). Such visas, for foreign nationals who have performed services for the U.S. government in Iraq and Afghanistan, require COM concurrence before the applicant can file a petition with USCIS. The NVC collects the requisite documents from such applicants and, when complete, forwards the package to the U.S. embassies in Baghdad or Kabul for COM approval”
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation