#2823: Huma Pimps For 8(a) Mentors – Clinton’s Bridge To Zulu Patents – Serco Lockheed Rocket Bomb
United States Marine Field McConnell
Plum City Online – (AbelDanger.net)
November 2, 2016
1. Abel Danger (AD) claims that Huma Abedin has pimped children to erstwhile directors of 8(a) company mentors including Serco (Chris Hyman), Lockheed Martin (Lynne Cheney), Boeing (late John Shalikashvilli), Raytheon (John Deutsch) and Northrop Grumman (Richard Myers).
2. AD claims that on 9/11, aides to Abedin’s alleged lesbian mentor Hillary Clinton launched an 8(a) man-in-the-middle attack on the Federal Bridge Certification Authority network using mentor-patented devices which had to be synchronized in Zulu time for “the first live-broadcast mass snuff film in human history”.
3. AD claims that on 9/11, 8(a) mentors, Serco and Lockheed Martin, used patented devices (US 6276277 B1) to align bombs on dive lines with guidance and control units, fire rocket boosters to accelerate bombs to targets and ignite explosives after target penetration.
4. United States Marine Field McConnell – Global Operations Director of Abel Danger – first exposed the existence of a Washington-based pedophile ring linked to Hillary Clinton’s aides on Thursday, 21 August, 2014 in a statement under oath to a Judge in the Pierce County Court in Ellsworth, WI – McConnell has subsequently offered to serve as a five-star general in a Trump administration to help destroy the Clinton bridge of patents and avenge the victims of Abedin’s pimps and ‘death by plane’.
All known photos and videos of AA Flight 11 crashing into the original 1 WTC in New York on 9/11
“Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”
“Serco’s Enterprise Architecture Center of Excellence is based in Colorado Springs, CO. The team provides a variety of services in support of Boeing’s business units as well as research and development efforts. Serco’s architecture employs object-oriented (OO)/Unified Modeling Language (UML) to define, design and satisfy defense agencies’ mission-critical requirements, including Command, Control, Communications, Computers and Intelligence (C4I). This approach improves system developer’s understanding of operational requirements and how best to integrate enterprise operations and systems for the optimal fulfillment of C4I and other operational needs.”
“Serco Processes 2 Millionth Patent Application for U.S. Patent and Trademark
Office Date: 18 Mar 2013 Serco Inc., a leading provider of professional, technology, and management services to the federal government, announced today that their Pre-Grant Publication (PGPubs) Classification Services team recently processed their 2 millionth patent application for the U.S. Patent & Trademark Office (USPTO). Each application was also processed within the contractually required 28-day window.”
“Its The Flash! – By Dave vonKleist
July 21, 2007 The controversies over the events of 9/11 have come to a full boil with the publication of the cover story “Debunking 9/11 LIES” in the March, 2005, edition of Popular Mechanics magazine (PM). The interview with editor in chief James Meigs on CNN‘s “Anderson Cooper’s 360,” and the March 5th interview with Ben Chertoff on the Art Bell radio program, represent perfect examples for the continuing controversy. The fact that the mainstream media has completely ignored some of the most significant photos and video clips that irrefutably challenges the “official story” of 9/11 has simply added more fuel to the fire. The increase of support for “911 In Plane Site” has been overwhelming and Popular Mechanics is now being referred to as “Unpopular” Mechanics! The “Pod”
The pod issue has been a source of debate and division and received top billing in PM magazine. The blatant contradictions made by Ben Chertoff and the PM article should raise red flags with anyone with cognitive skills.
For example, the PM article claims that the “pod” is nothing more that a reflection of the sun glistening off of the “fairing.” Yet Mr. Chertoff said on the Art Bell program that it was mostly caused by a shadow cast by the engine (the Rob Howard photo published in PM clearly shows the shadow moving toward the front of the plane and off the wing.) How can the “pod” be a reflection and a shadow at the same time? This textbook example of double speak designed to confuse the general public is the very reason why this issue will not go away, and will continue to escalate. However, the “pod” is secondary in importance to the “flash” issue, which has been completely ignored.
The “flash” is clearly seen in four video clips in the video “911 In Plane Site”. CNN’s video clip of the plane hitting the south tower is the most widely available and has not been addressed for reasons that will soon become obvious.
There should be no debate that there indeed was a flash that occurred before the plane burrowed into the building. Two questions are raised that alone challenge the official story. First, what does the “flash” have to do with a terrorist inside the cabin brandishing a plastic knife or a box-cutter? Answer: Obviously nothing, and that leads us to the second question. What caused the Flash? There are four possibilities that come to mind:
a.) A reflection
b.) Sparks from the fuselage striking the building.
c.) Static discharge
d.) Some type of incendiary (bomb or missile) The photos above have never been shown or discussed in the mainstream media.
Using logical deduction, (Occam’s Razor) let’s examine each possibility.
Reflection. There are two reasons that it could not have been a reflection. First, a reflection is only seen from one angle, not four. Secondly, the flash occurred on the shaded side of the building. Rule out the reflection. Sparks. As seen in the video clips, the flash occurred to the right and below center of the contact point of the fuselage and is clearly seen in the Camera Planet footage. Rule out sparks.
Static discharge. A static discharge would have arced from the nose of the fuselage to the building at the point of impact. As mentioned above, the flash was seen 6 to ten feet away from the fuselage and in fact is reflected off the fuselage as seen in angle four (bottom right) of the above photos. Additionally, an electric spark travels at the speed of light and would not likely be captured on several frames on each of the four video clips. Rule out static discharge.
Incendiary (bomb or missile). It is not likely that a bomb could have been placed outside the building so close to the point of impact and timed to detonate at the exact time the plane struck the tower. That leaves a missile. If it was a missile, from where could it have been launched? The flash occurred to the right and below center of the fuselage, directly in line with the anomaly called the “pod”.
A flash is also seen in the video clip of the plane hitting the north tower, which indicates that there was indeed an event that could not in any way be consistent with a simple hijacking. The entire “hijacking” story comes into serious question and cannot stand when factoring the the flash.
It should be obvious to the casual observer that the flash issue is by itself devastating to the official story as it not only supports the “pod” issue, but indicates that there is yet another cover-up and a patsy story in place. Until the “flash” issue is acknowledged, honestly debated and explained, the controversy will continue to escalate. The “flash” issue isn’t the only issue that has been ignored. The Pentagon issue also continues to boil and will continue to do so until the media addresses the photos taken before the collapse.
PM magazine and the networks have yet, to the best of my knowledge, published or broadcast any of the photos that are the entire reason for the controversy.
The video footage and series of photographs taken before the collapse clearly show no crater, no divot in the lawn, no recognizable wreckage (wings, engines, tail, fuselage, wheels, luggage, seats, etc.) and no hole large enough to accommodate a Boeing 757. “From my close up inspection, there is no evidence of a plane having crashed anywhere near the Pentagon…”Jamie McIntyre, September 11th, 2001.
The presentation of the “truth” on broadcasts like “Anderson Coopers 360″ or “The Art Bell Show” is at best disingenuous but let’s call it what it is: A calculated and deliberate fabrication designed to deflect real issues while ridiculing anyone who dares to think outside their “cage”. Ben Chertoff stated, “The wing hit the ground and broke off…” If the engine hangs down from the wing, it would have hit the ground first but no mention of this fact was made and the above photo refutes his statement. He also stated that the plane “liquefied” as it entered the building. If that were the case, how would it have pierced three of the rings so cleanly? The PM report is rife with contradictions as are many of the mainstream media reports.
Numerous times the American Society of Civil Engineers video analysis was cited as the authority when it came to the of the Pentagon’s collapse. However, the computer-generated video has three glaring errors or omissions. First, they forgot to factor in the 18 ½” steel re-enforced exterior wall of the outer ring. Secondly, the tail section remains intact as it enters the building despite numerous photos that show no entry hole. And thirdly, the computer analysis omitted the heaviest, densest and hardest pieces of the aircraft- the engines! With “expert” analysis like this is there any wonder that the “official” story is being questioned at almost every turn? What is truly a shame is that there are those in the broadcast media that for whatever reason, continue the farce by labeling those asking these questions as “wingnuts” and hide behind a false veil of fairness while citing these “authorities” as the be all and end all of the “truth.” Why is an open debate and a presentation of this suppressed evidence not an option for those claiming a righteous demonstration of “freedom of the press?” I would have welcomed anyone with an opposing viewpoint when I was a guest on the George Noorey program and would do so today. In fact, I would challenge James Meigs, Ben Chertoff or anyone else recognized as an “authority” to debate these issues live on the air on any radio or television program of their choosing. I commend George Noory for having the courage to bring me on the air to bring these issues to the attention of the American people and if invited again, would certainly not oppose debate with any “authority.” It’s not only good radio, it’s a way for the people to judge for themselves who is telling the truth and who is not. Art, do you hear me?
America and the world are not as dumb as these people apparently think. The stakes are the highest imaginable and this game is for keeps. Unless this subterfuge ceases immediately the rest of the world will no doubt see the United States as the most manipulated, controlled and dangerous country on earth. God help us.
The issues raised in this article are barely a scratch in the surface of the many inconsistencies in the official story of 9/11.
Until these photographs and video clips are presented to the American people and discussed openly and honestly, the controversy will continue to grow! CNN, Fox, CBS, NBC, ABC and all news agencies must deal with these issues! They will not go away and neither will those of us demanding honesty from the news networks that claim they can be trusted! It is their integrity that is now in serious question, not those of us asking legitimate questions!
“Rocket-boosted guided hard target penetrator
A target-penetrating aerial bomb includes a penetrator of hard steel or similar material that contains an explosive charge. A rocket motor is formed as an annular chamber and surrounds the penetrator. The bomb includes a guidance and control unit that guides the bomb on a glide path after release from the delivery aircraft, and steers the bomb onto a dive line. Once the bomb is aligned on the dive line, the guidance and control unit fires the rocket booster to accelerate the bomb to the target. A fuse ignites the explosive after target penetration.
Veröffentlichungsnummer: US6276277 B1
Anmeldenummer: US 09/295,594
Veröffentlichungsdatum: 21. Aug. 2001
Eingetrage: 22. Apr. 1999
Prioritätsdatum: 22. Apr. 1999
Erfinder: Bruce E. Schmacker
Ursprünglich Bevollmächtigter: Lockheed Martin Corporation
Zitat exportieren: BiBTeX, EndNote, RefMan
Patentzitate (30), Nichtpatentzitate (3), Referenziert von (90), Klassifizierungen (22), Juristische Ereignisse (5)
Externe Links: USPTO, USPTO-Zuordnung, Espacenet”
“3.4.1 Federal Public Key Infrastructure Policy Authority (FPKIPA)
Any infrastructure which cuts across multiple agencies requires the cooperation of the affected agencies to make it work. The Federal PKI is no different. While agencies may run their own agency-specific PKI domains to serve their own agency-specific needs, interoperating with other agencies imposes unique requirements and obligations. The model of governance reflects the fact that the Federal PKI has evolved from the bottom up, from agencies adopting this technology to serve their specific needs rather than having its use prescribed for them. In 1996, the Federal PKI Steering Committee was formed under the Government Information Technology Services Board, co-chaired by OMB and the National Partnership for Reinventing Government (NPR). The Steering Committee, comprising over 50 members representing over two dozen agencies, has as its focus the promotion of interoperable PKI solutions, the development of common guidance, and the sharing of information so that agencies considering or deploying PKI solutions can benefit from those who have already done so. Participation in the Steering Committee is voluntary. Its activities are published at http://gits-sec.treas.gov.”
“Did Huma Abedin Blackmail Hillary Clinton?
Posted on October 30, 2016
by R. A. Romero in Opinion, Politics // 0 Comments
With the new revelation of the computer found at Disgraced Anthony Weiner’s house during an unrelated investigation, and the reopening of the Clinton Email case by the FBI, we can presume a few things that will soon be revealed when the investigation is complete.
While under criminal investigation of Anthony Weiner by the New York Police Department, a computer found at Anthony Weiner’s home was found which belonged to his former wife, Huma Abedin. This computer was found to contain approximately 1000 emails belonging to Huma, and saved in a folder labeled: “Life Insurance”
The content of those emails were so intriguing, that the FBI sent a letter to Congress, announcing that the FBI were in possession of new emails, relating to the Hillary Clinton investigation, and the process of investigating the new emails found in Congressman Weiners Home.
Though James Comey stated that, “…the FBI cannot yet assess whether or not this material may be significant” The contents of those emails certainly are known by Director Comey based on the list of Representatives’ departments who received the letter:
The Select committee on Intelligence Committee on the Judiciary Subcommittee on Justice, Science and Related Agencies Homeland Security Committee on Oversight and Government Reform.
We can certainly assess, that these emails are a treasure trove of information vital to our countries financial and security interests — Information about misappropriation of funds; Information about how the security of our country is at risk; and Information about political Fraud.
So, what do we know about this computer. We know that the emails were contained in a folder called “Life Insurance”, but life insurance for whom? Certainly, Anthony Weiner would not have any reason to collect 1000 emails about Hillary Clinton, nor would he have direct access of them since he was not directly involved with the Hillary Clinton during the time she was Secretary of State, which is what these emails pertain to, since it prompted the reopening of that particular investigation.
But Huma, being close to Hillary Clinton would have a reason to collect these emails, and in fact, it turned out this computer did belonged to Huma Abedin, and not Anthony Weiner, so more than likely, this was a folder containing emails that would assure Humas protection against an individual on those emails.
Now, one has to ask, why would she collect such emails? It is likely because Huma was, at one time, threatened by someone, and therefore made sure she collected and hid 1000 of the most incriminating emails she could collect, and gave it to Anthony Weiner to hold on to so the person that threatened her wouldn’t find it.
At this point we can deduce the situation into two scenarios, one: Humana Abedin was threatened by Hillary Clinton, and so she came back with the threat: “I’ve hidden 1000 of your most incriminating emails, to assure my protection” or “Humana blackmaled Hillary Clinton with an agenda and a threat of exposing Hillary Clinton if she didn’t get her way.” Now which is more likely?
Why do I suspect Hillary Clinton? becuase Abedin and Weiner announced their separation in late 2016, after the sexting scandal in 2013, but was actually separated since 2015. Congress sent a subpoena to Hillary Clinton March 4th, 2015 to obtain the emails on Hillary’s Personal email server she used as Secretary of State, Regarding the Benghazi hearing, which would have been the time Huma began collecting these emails to assure her protection.
Huma would have given this to Anthony Weiner after the “Weiner Scandal” broke out, becuase if she wanted to hide this “Insurance Policy” from Hillary for her own protection, then certainly, Hillary would not have suspected that Huma would have given him the emails to her estranged husband after the humiliating scandal. If it was before the scandal then that would be the first place the Clintons would look for such an insurance policy. Conclusion:
Hillary threatened Huma to work with her by destroying the emails, or else. In a comeback, Abadin, being a smart woman, collected and hid the emails and told Hillary that she has an insurance policy of 1000 incriminating emails that will be exposed if anything happened to her.
So what role does Anthony Weiner have in this? Well… Weiner is just a Weiner. But in any case, these emails should certainly implicate Hillary Clinton in the biggest scandals in our countries history.”
“Super Serco bulldozes ahead
By DAILY MAIL REPORTER UPDATED: 23:00 GMT, 1 September 2004
SERCO has come a long way since the 1960s when it ran the ‘four-minute warning’ system to alert the nation to a ballistic missile attack.
Today its £10.3bn order book is bigger than many countries’ defence budgets. It is bidding for a further £8bn worth of contracts and sees £16bn of ‘opportunities’.
Profit growth is less ballistic. The first-half pre-tax surplus rose 4% to £28.1m, net profits just 1% to £18m. Stripping out goodwill, the rise was 17%, with dividends up 12.5% to 0.81p.
Serco runs the Docklands Light Railway, five UK prisons, airport radar and forest bulldozers in Florida.”
“Serco farewell to NPL after 19 years of innovation 8 January 2015 Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco’s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade…. NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading [for Serco’s front running banks] in the City through NPL [Zulu] Time.”
“UK Cabinet Office – Emergency Planning College – Serco …..Types of Exercise Workshop Exercises These are structured discussion events where participants can explore issues in a less pressurised environment. They are an ideal way of developing solutions, procedures and plans rather than the focus being on decision making. Table Top Exercises These involve a realistic scenario and will follow a time line, either in real-time or with time jumps to concentrate on the more important areas. The participants would be expected to be familiar with the plans and procedures that are being used although the exercise tempo and complexity can be adjusted to suit the current state of training and readiness. Simulation and media play can be used to support the exercise. Table-top exercises help develop teamwork and allow participants to gain a better understanding of their roles and that of other agencies and organisations. Command/Control Post Exercises These are designed primarily to exercise the senior leadership and support staff in collective planning and decision making within a strategic grouping. Ideally such exercises would be run from the real command and control locations and using their communications and information systems [Feeling lucky, Punk?]. This could include a mix of locations and varying levels of technical simulation support. The Gold Standard system is flexible to allow the tempo and intensity to be adjusted to ensure maximum training benefit, or to fully test and evaluate the most important aspects of a plan. Such exercises also test information flow, communications, equipment, procedures, decision making and coordination. Live Exercises These can range from testing individual components of a system or organisation through to a full-scale rehearsal. They are particularly useful where there are regulatory requirements or with high-risk situations. They are more complex and costly to organise and deliver but can be integrated with Command Post Exercises as part of a wider exercising package.”
“Christopher Rajendran Hyman CBE (born 5 July 1963 in Durban, South Africa) was Chief Executive of Serco Group plc from 2002 to October 2013. … On graduation, he worked for Arthur Andersen. In 1989, he won an 18-month exchange with Ernst & Young in London, who employed him after four months. Head hunted in 1994 by Serco, Hyman became European finance director, and in 1999 was made group finance director. In 2002, Hyman became chief executive. .. Hyman resigned from his role of Chief Executive of Serco on 25 October 2013 following allegations that Serco had overcharged government customers. .. He was [making a presentation to Serco shareholder, including British and Saudi governments] on the 47th floor of the World Trade Center [North Tower] at the time of the September 11 attacks in 2001.”
“Serco’s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals.”
“Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994.This file was obtained from the Secretary of State and has a file number of 1795583.”
“Base One Technologies – Corporate Strategy – We are a Government Certified Women-Owned Business
We practice Diversity [Pride] Recruitment and Staffing for IT positions .. We are also partnered with firms that are 8A certified as Minority firms, Disabled Veteran firms, Native American firms, Vietnam veteran firms, women owned firms. .. Information Security Planning is the process whereby an organization seeks to protect its operations and assets from data theft or computer hackers that seek to obtain unauthorized information or sabotage business operations. Key Clients Benefiting From Our Information Security Expertise: Pentagon Renovation Program, FAA, Citigroup [Federal Bridge], MCI. .. Base One Technologies … Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions.”
“Opened in 1994 as the successor to the Transitional Immigrant Visa Processing Center in Rosslyn, Va., the NVC centralizes all immigrant visa pre-processing and appointment scheduling for overseas posts. The NVC collects paperwork and fees before forwarding a case, ready for adjudication, to the responsible post.
The center also handles immigrant and fiancé visa petitions, and while it does not adjudicate visa applications, it provides technical assistance and support to visa-adjudicating consular officials overseas.
Only two Foreign Service officers, the director and deputy director, work at the center, along with just five Civil Service employees. They work with almost 500 contract employees doing preprocessing of visas, making the center one of the largest employers in the Portsmouth area.
The contractor, Serco, Inc., has worked with the NVC since its inception and with the Department for almost 18 years.
The NVC houses more than 2.6 million immigrant visa files, receives almost two million pieces of mail per year and received more than half a million petitions from the U.S. Citizenship and Immigration Service (USCIS) in 2011. Its file rooms’ high-density shelves are stacked floor-to-ceiling with files, each a collection of someone’s hopes and dreams and each requiring proper handling. ….
The NVC also preprocesses the chief of mission (COM) application required for the filing of a petition for a Special Immigrant Visa (SIV). Such visas, for foreign nationals who have performed services for the U.S. government in Iraq and Afghanistan, require COM concurrence before the applicant can file a petition with USCIS. The NVC collects the requisite documents from such applicants and, when complete, forwards the package to the U.S. embassies in Baghdad or Kabul for COM approval”
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation