#2826: Does Clinton’s 8(a) Bridge Link A JonBenét Snuff Film To Mentor-Patented Zulu Tor?
United States Marine Field McConnell
Plum City Online – (AbelDanger.net)
November 6, 2016
1. Abel Danger (AD) claims that Hillary Clinton’s aides used Federal Bridge Certification Authority servers installed by SBA 8(a) companies to transmit images of the JonBenét Ramsey snuff-film murder on Christmas Day 1996 over mentor-patented communications devices in Zulu time.
2. AD claims that the snuff-film images were relayed over a Sun Microsystem wireless (US 5371794 A) device to former director of Lockheed Martin Lynne Cheney and were later archived on patented onion router (Tor) servers installed by 8(a) companies in the Pentagon’s U.S. Navy Command Center and the Clinton’s Whitehaven home in Washington, D.C.
3. AD claims that Hillary Clinton lied about her presence in New York on 9/11 when she was allegedly watching the “first live-broadcast mass snuff film in human history” on a mentor-patented Tor server in her Whitehaven home with her 8(a) ethnically-disadvantaged Filipino maid Marina Santos.
4. United States Marine Field McConnell – Global Operations Director of Abel Danger –has offered to serve as a five-star general in a Trump administration to neutralize the mentor-patented Clinton bridge and avenge the snuff-film deaths of JonBenét in 1996 and 71 officers of the NYPD et al in the demolition of the WTC Twin Towers on 9/11.
“Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”
“Hillary Clinton Says She Was in New York City on 9/11 (She Wasn’t)
by CHARLIE SPIERING
1 Nov 20167,930 SIGN UP FOR OUR NEWSLETTER
Campaigning in Florida on Tuesday, Democratic presidential nominee Hillary Clinton claimed that she was in New York City on 9/11, when terrorists flew planes into the World Trade Center. She made her claim while discussing terrorism and the threat posed by ISIS.
“I know what happened not far from here at Pulse night club in Orlando,” she said. “I was in New York City on 9/11 as one of the two senators. I will defeat ISIS. I will protect America.”
Hillary says she was in New York City on 9/11 (She wasn’t) But Clinton wasn’t in New York on 9/11, according to Politico.
As a United States Senator she was in Washington D.C. at her home in Whitehaven when the first plane hit the World Trade Center. She spent most of the day reacting to the attacks in media interviews and joined her colleagues singing “God Bless America” on the Capitol Hill steps.
Clinton flew to New York on September 12, after making a speech on the Senate Floor in the morning. She traveled with her fellow New York Senator Chuck Schumer and Democratic Congressman Charlie Rangel.
Clinton toured the disaster site with New York mayor Rudy Giuliani before leaving the city that evening to travel back to Capitol Hill.”
“Clinton directed her maid to print out classified materials
By Paul Sperry November 6, 2016 | 4:53am | Updated
As secretary of state, Hillary Clinton routinely asked her maid to print out sensitive government e-mails and documents — including ones containing classified information — from her house in Washington, DC, e-mails and FBI memos show. But the housekeeper lacked the security clearance to handle such material.
In fact, Marina Santos was called on so frequently to receive e-mails that she may hold the secrets to E-mailgate — if only the FBI and Congress would subpoena her and the equipment she used.
Clinton entrusted far more than the care of her DC residence, known as Whitehaven, to Santos. She expected the Filipino immigrant to handle state secrets, further opening the Democratic presidential nominee to criticism that she played fast and loose with national security.
Clinton would first receive highly sensitive e-mails from top aides at the State Department and then request that they, in turn, forward the messages and any attached documents to Santos to print out for her at the home.
Among other things, Clinton requested Santos print out drafts of her speeches, confidential memos and “call sheets” — background information and talking points prepared for the secretary of state in advance of a phone call with a foreign head of state.
“Pls ask Marina to print for me in am,” Clinton e-mailed top aide Huma Abedin regarding a redacted 2011 message marked sensitive but unclassified.
In a classified 2012 e-mail dealing with the new president of Malawi, another Clinton aide, Monica Hanley, advised Clinton, “We can ask Marina to print this.”
“Revisions to the Iran points” was the subject line of a classified April 2012 e-mail to Clinton from Hanley. In it, the text reads, “Marina is trying to print for you.”
Both classified e-mails were marked “confidential,” the tier below “secret” or “top secret.”
Santos also had access to a highly secure room called an SCIF (sensitive compartmented information facility) that diplomatic security agents set up at Whitehaven, according to FBI notes from an interview with Abedin.
From within the SCIF, Santos — who had no clearance — “collected documents from the secure facsimile machine for Clinton,” the FBI notes revealed.
Just how sensitive were the papers Santos presumably handled? The FBI noted Clinton periodically received the Presidential Daily Brief — a top-secret document prepared by the CIA and other US intelligence agencies — via the secure fax.
A 2012 “sensitive” but unclassified e-mail from Hanley to Clinton refers to a fax the staff wanted Clinton “to see before your Netanyahu mtg. Marina will grab for you.”
Yet it appears Clinton was never asked by the FBI in its yearlong investigation to turn over the iMac Santos used to receive the e-mails, or the printer she used to print out the documents, or the printouts themselves.
Hillary’s 33,000 emails might not be ‘missing’ after all
As The Post first reported, copies of Clinton’s 33,000 allegedly destroyed e-mails still exist in other locations and could be recovered if investigators were turned loose to seize them. Higher-ups at the Justice Department reportedly have blocked them from obtaining search warrants to obtain the evidence.
It also appears the FBI did not formally interview Santos as a key witness in its investigation.
This is a major oversight: Santos may know the whereabouts of a missing Apple MacBook laptop and USB flash drive that contain all of Clinton’s e-mails archived over her four years in office.
In 2013, Hanley downloaded Clinton’s e-mails from her private server to the MacBook and flash drive.
“The two copies of the Clinton e-mail archive (one on the archive laptop and one on the thumb drive) were intended to be stored in Clinton’s Chappaqua and Whitehaven residences,” the FBI said in its case summary.
But Hanley says the devices were “lost,” and the FBI says it “does not have either item in its possession.”
In addition to Abedin, Santos worked closely with Hanley at Whitehaven and could shed light on the mystery — if only she were asked about it.
When a Post reporter confronted Santos at her DC apartment Friday, she would say only, “I don’t speak to reporters.”
According to a 2010 profile in The Philippine Star, close Clinton friend Vernon Jordan recommended Santos to the Clintons after she worked part-time for him.
Bill Clinton gave a speech in Manila as part of his foundation and took time to visit with the family of the “mayordoma [housekeeper] of his Washington, DC, home — Marina Santos.”
He was quoted as describing Santos as the “wonderful woman who runs our home in Washington, without whom Hillary will not be able to serve as secretary of state.” The article ended remarking, without a hint of irony: “Marina now runs his house so that he and his wife can better serve interests higher than their own.”
Santos could turn out to be the Betty Currie of the Clinton e-mail scandal. Currie was the secretary for President Clinton. She also came recommended by Jordan, and became famous as a central witness in the Monica Lewinsky scandal for her handling of gifts given to Clinton’s mistress.
Investigators had sought the gifts, allegedly hidden under Currie’s bed on orders from Clinton, as evidence. The State Department and Clinton campaign did not respond to requests for comment.
Paul Sperry, a former DC bureau chief for Investor’s Business Daily and a Hoover Institution media fellow, is the author of “Infiltration.””
“Whitehaven was sold to the Clintons by Henderson in 2000 for $2.85 million, below the $3.5 million list price, and had an assessed value, in 2016, of $5.3 million. The purchase of the house by Bill and Hillary Clinton marked the first time a former United States president had owned a property in Washington since Woodrow Wilson. In 2006, Hillary Clinton’s mother, Dorothy Howell Rodham, moved into Whitehaven.
Friends and colleagues of the Clintons have said Whitehaven has typically been reserved for the exclusive use of Hillary Clinton and invitations to visit the property are considered a high privilege reserved for close confidantes. Clinton used the house as a “fortress of solitude” while working on her book Hard Choices and has hosted important gatherings at the property with advisors. She reportedly made the decision to enter the 2016 presidential race, in part, at Whitehaven.”
“Lockheed purchased Sanders, and thus acquired CalComp, in 1986
— In 1991, Access Graphics obtained a major contract with Sun Microsystems and needed financing to increase production in order to cope with the added workload. Heavily-regulated banks declined to make loans for relatively high risk investments. “Access had a heavy demand for cash flow and thin profit margin.”
— In May, 1991, CalComp offered to exercise its 25% equity option, purchase Access Graphics (its largest distributor), and provide funds for expansion. The deal gave John Ramsey $8 million and ousted Jim Hudson (the partner whose company, CAD Distributors, had been based in Boulder and who presumably was the reason AG was located in Boulder). AG became a wholly-owned subsidiary with its same management and about 120 employees.
— CalComp’s president, William P. Conlin, described the acquisition as “an attractive financial investment”; AG accounted for 4% of CalComp’s $400 million in revenue in 1990 and posted revenue of about $120 million for all of 1991 and as a result of the acquisition, CalComp’s sales were boosted by about $80 million for all of 1991
— In 1993, Access Graphics was separated into a distinct unit. Daniel M. Tellep, Lockheed’s chairman and chief executive officer, said the decision reflected a careful review of CalComp and Access Graphics’ business performance and potential. “Separating out Access Graphics permits us to provide the focus necessary for this rapidly growing and profitable business to realize its substantial potential,” Tellep said. Access Graphics became a stand-alone subsidiary, one of six companies in Lockheed’s electronics systems group; CalComp was another of the six.
— Evidently, CalComp was not happy about the separation; William P. Conlin, president, and Larry Sanders, senior vice president of field operations, left CalComp “to pursue other interests.” This left CalComp without any top management; Val P. Peline, Lockheed group president of electronic systems, was appointed interim CalComp president.
— CalComp and Summagraphics merged in July 1996 and became CalComp Technology Inc. It assumed the Summagraphics seat on NASDAQ. Lockheed Martin owned about 90 percent of the new company. (Some sources say that Lockheed acquired Summagraphics and combined it with CalComp to form the new company.)
— Also in 1996, Lockheed Martin acquired Loral Corporation’s defense electronics and systems integration businesses for $9.1 billion (FYI, Loral is the company which, in Feb. 1996, was accused of the illegal transfer of technology to China) and eliminated 1,600 jobs as it looked for savings; the layoffs were announced in November. ..
Access Graphics and the Paughs represented a “second life” for John Ramsey. He met Patsy when he was nearly 40, divorced, unsuccessful. She was 13 years younger, a vivacious 23-year-old Miss America runner-up, full of ambition. Neither of them were truly naive. He’d been in the navy overseas, married for 12 years and had 3 children. She had been through the pageant wringer and was in the world of competitive advertising.
Something happened at the end of 1996 that the Ramseys don’t want known. Maybe it didn’t happen in 1996; maybe whatever the secret is happened earlier but the intense investigation after the murder threatens to expose whatever it is.
The “ransom document” points a finger at John and his business. Two gentlemen had his daughter in their possession and they didn’t particularly like John; they respect his business but not the country it represents. The document said, essentially, we’re [8(a)] foreigners who know a lot about you and your company; we don’t like you but we want you to be rested and able to follow a complicated series of actions required to give us your bonus amount for that year; we’re watching you and the “authorities” (law enforcement and financial) so don’t try to grow a brain (which implies “they” think John is stupid). If you mess with us, there’s a 1% chance you’ll get your daughter back; don’t mess with us and you will certainly get her back.
So what happened? Was his daughter kidnapped, held by two gentlemen? No evidence of that. Was his daughter beheaded, even though he disobeyed orders? No, although a cord was wrapped very tightly around her throat and her skull was nearly split in half. Did he get his daughter back, even though he messed with the gentlemen by disobeying? Yes, he did. She was dead but he got her back and showed her to his close friends and the police.
“Tomorrow” and the percentages didn’t seem to matter to John. The threat of close observation didn’t deter him from contacting the police (he has said he told Patsy to call them). He wasn’t worried about the note or the 911 call (he was cordial and joking that morning). He didn’t show any emotion until he “found the body at 11:00” (according to reported statements he made to John Andrew). Then he seemed to be worried, focused on a puzzle. He wandered around, examined his mail, ignored Patsy and the friends gathered around her. Until the detective decided to give him and his two men friends something to keep them busy (her stated intention). Then he sprang into action.
Fernie didn’t go along but stayed behind. White followed John into the basement, tagged along while John showed him evidence of an intruder, knelt beside John when he saw the body, then ran off yelling for someone to call 911. John picked up the body and carried it upstairs to the foyer, where the detective told him to set it down. Then he seemed to guide the detective to observe the body, then guided the handling of the body by covering it.
That day John made several calls that we know about. He called Access Graphics twice and spoke to Gary Merriman each time (possibly the only employee in the management suite). He called his pilot — in the morning to stop the plan to fly to Charlevoix and to arrange for calls to Minneapolis to tell the older kids to come to Boulder, and then in the afternoon (30 minutes after he brought the body out) to arrange a flight to Atlanta.”
“Onion routing network for securely moving data through communication networks
US 6266704 B1
The onion routing network is used to protect Internet initiators and responders against both eavesdropping and traffic analysis from other users of the Internet. In the onion routing of the invention, instead of making connections directly to a responding machine, users make connections through onion routers. The onion routing network allows the connection between the initiator and responder to remain anonymous. Anonymous connections hide who is connected to whom and for what purpose from outside eavesdroppers.
Publication number: US6266704 B1
Publication type: Grant
Application number: US 09/086,541
Publication date: Jul 24, 2001
Filing date: May 29, 1998
Priority date: May 30, 1997
Fee status: Lapsed
Inventors: Michael G. Reed, Paul F. Syverson, David M. Goldschlag
Original Assignee: The United States Of America As Represented By The Secretary Of The Navy Export Citation: BiBTeX, EndNote, RefMan Patent Citations (11), Non-Patent Citations (16), Referenced by (107), Classifications (15), Legal Events (6)”
“Method and apparatus for privacy and authentication in wireless networks
US 5371794 A
A method and apparatus is disclosed for providing a secure wireless communication link between a mobile nomadic device and a base computing unit. A mobile sends a host certificate (Cert– Mobile) to the base along with a randomly chosen challenge value (CH1) and a list of supported shared key algorithms (“SKCS”). The base determines if the Cert– Mobile is valid. If the Cert– Mobile is not valid, then the base unit rejects the connection attempt. The base then sends a Cert– Base, random number (RN1) encrypted in mobile’s public key and an identifier for the chosen SKCS to the mobile. The base saves the RN1 value and adds the CH1 value and the chosen SKCS to messages sent to the base. The mobile unit then validates the Cert– Base, and if the certificate is valid, the mobile verifies under the public key of the base (Pub– Base) the signature on the message. The signature is verified by taking the base message and appending it to CH1 and the list of shared key algorithms that the mobile provided in the first message. If the base signature is not valid, then the communication attempt is aborted. In the event that the base signature is valid, the mobile determines the value of RN1 by decrypting Pub– Mobile, RN1 under the private key of the mobile. The mobile then generates RN2 and the session key, and encrypts RN2 under the Pub– Base. The mobile sends the encrypted RN2 and E(Pub– Mobile, RN1) to the base. The base then verifies the mobile signature using the Pub–Mobile obtained from the Cert– Mobile. If the mobile signature is verified, the base decrypts E(Pub– Base, RN2) using its private key. The base then determines the session key. The mobile and base may then enter a data transfer phase using encrypted data which is decrypted using the session key which is RN1 ⊕RN2.”
Publication number: US5371794 A
Publication type: Grant
Application number: US 08/147,661
Publication date: Dec 6, 1994
Filing date: Nov 2, 1993
Priority date: Nov 2, 1993
Fee status: Paid
Also published as: DE69433771D1, 5 More »
Inventors: Whitfield Diffie, Ashar Aziz
Original Assignee: Sun Microsystems, Inc.
Export Citation: BiBTeX, EndNote, RefMan Patent Citations (24), Non-Patent Citations (7), Referenced by (580), Classifications (21), Legal Events (5)
External Links: USPTO, USPTO Assignment, Espacenet
“Serco Processes 2 Millionth Patent Application for U.S. Patent and Trademark
Office Date: 18 Mar 2013 Serco Inc., a leading provider of professional, technology, and management services to the federal government, announced today that their Pre-Grant Publication (PGPubs) Classification Services team recently processed their 2 millionth patent application for the U.S. Patent & Trademark Office (USPTO). Each application was also processed within the contractually required 28-day window.”
“3.4.1 Federal Public Key Infrastructure Policy Authority (FPKIPA)
Any infrastructure which cuts across multiple agencies requires the cooperation of the affected agencies to make it work. The Federal PKI is no different. While agencies may run their own agency-specific PKI domains to serve their own agency-specific needs, interoperating with other agencies imposes unique requirements and obligations. The model of governance reflects the fact that the Federal PKI has evolved from the bottom up, from agencies adopting this technology to serve their specific needs rather than having its use prescribed for them. In 1996, the Federal PKI Steering Committee was formed under the Government Information Technology Services Board, co-chaired by OMB and the National Partnership for Reinventing Government (NPR). The Steering Committee, comprising over 50 members representing over two dozen agencies, has as its focus the promotion of interoperable PKI solutions, the development of common guidance, and the sharing of information so that agencies considering or deploying PKI solutions can benefit from those who have already done so. Participation in the Steering Committee is voluntary. Its activities are published at http://gits-sec.treas.gov.”
“Super Serco bulldozes ahead
By DAILY MAIL REPORTER UPDATED: 23:00 GMT, 1 September 2004
SERCO has come a long way since the 1960s when it ran the ‘four-minute warning’ system to alert the nation to a ballistic missile attack.
Today its £10.3bn order book is bigger than many countries’ defence budgets. It is bidding for a further £8bn worth of contracts and sees £16bn of ‘opportunities’.
Profit growth is less ballistic. The first-half pre-tax surplus rose 4% to £28.1m, net profits just 1% to £18m. Stripping out goodwill, the rise was 17%, with dividends up 12.5% to 0.81p.
Serco runs the Docklands Light Railway, five UK prisons, airport radar and forest bulldozers in Florida.”
“Serco farewell to NPL after 19 years of innovation 8 January 2015 Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco’s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade…. NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading [for Serco’s front running banks] in the City through NPL [Zulu] Time.”
“UK Cabinet Office – Emergency Planning College – Serco …..Types of Exercise Workshop Exercises These are structured discussion events where participants can explore issues in a less pressurised environment. They are an ideal way of developing solutions, procedures and plans rather than the focus being on decision making. Table Top Exercises These involve a realistic scenario and will follow a time line, either in real-time or with time jumps to concentrate on the more important areas. The participants would be expected to be familiar with the plans and procedures that are being used although the exercise tempo and complexity can be adjusted to suit the current state of training and readiness. Simulation and media play can be used to support the exercise. Table-top exercises help develop teamwork and allow participants to gain a better understanding of their roles and that of other agencies and organisations. Command/Control Post Exercises These are designed primarily to exercise the senior leadership and support staff in collective planning and decision making within a strategic grouping. Ideally such exercises would be run from the real command and control locations and using their communications and information systems [Feeling lucky, Punk?]. This could include a mix of locations and varying levels of technical simulation support. The Gold Standard system is flexible to allow the tempo and intensity to be adjusted to ensure maximum training benefit, or to fully test and evaluate the most important aspects of a plan. Such exercises also test information flow, communications, equipment, procedures, decision making and coordination. Live Exercises These can range from testing individual components of a system or organisation through to a full-scale rehearsal. They are particularly useful where there are regulatory requirements or with high-risk situations. They are more complex and costly to organise and deliver but can be integrated with Command Post Exercises as part of a wider exercising package.”
“Christopher Rajendran Hyman CBE (born 5 July 1963 in Durban, South Africa) was Chief Executive of Serco Group plc from 2002 to October 2013. … On graduation, he worked for Arthur Andersen. In 1989, he won an 18-month exchange with Ernst & Young in London, who employed him after four months. Head hunted in 1994 by Serco, Hyman became European finance director, and in 1999 was made group finance director. In 2002, Hyman became chief executive. .. Hyman resigned from his role of Chief Executive of Serco on 25 October 2013 following allegations that Serco had overcharged government customers. .. He was [making a presentation to Serco shareholder, including British and Saudi governments] on the 47th floor of the World Trade Center [North Tower] at the time of the September 11 attacks in 2001.”
“Serco’s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals.”
“Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994.This file was obtained from the Secretary of State and has a file number of 1795583.”
“Base One Technologies – Corporate Strategy – We are a Government Certified Women-Owned Business
We practice Diversity [Pride] Recruitment and Staffing for IT positions .. We are also partnered with firms that are 8A certified as Minority firms, Disabled Veteran firms, Native American firms, Vietnam veteran firms, women owned firms. .. Information Security Planning is the process whereby an organization seeks to protect its operations and assets from data theft or computer hackers that seek to obtain unauthorized information or sabotage business operations. Key Clients Benefiting From Our Information Security Expertise: Pentagon Renovation Program, FAA, Citigroup [Federal Bridge], MCI. .. Base One Technologies … Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions.”
“Opened in 1994 as the successor to the Transitional Immigrant Visa Processing Center in Rosslyn, Va., the NVC centralizes all immigrant visa pre-processing and appointment scheduling for overseas posts. The NVC collects paperwork and fees before forwarding a case, ready for adjudication, to the responsible post.
The center also handles immigrant and fiancé visa petitions, and while it does not adjudicate visa applications, it provides technical assistance and support to visa-adjudicating consular officials overseas.
Only two Foreign Service officers, the director and deputy director, work at the center, along with just five Civil Service employees. They work with almost 500 contract employees doing preprocessing of visas, making the center one of the largest employers in the Portsmouth area.
The contractor, Serco, Inc., has worked with the NVC since its inception and with the Department for almost 18 years.
The NVC houses more than 2.6 million immigrant visa files, receives almost two million pieces of mail per year and received more than half a million petitions from the U.S. Citizenship and Immigration Service (USCIS) in 2011. Its file rooms’ high-density shelves are stacked floor-to-ceiling with files, each a collection of someone’s hopes and dreams and each requiring proper handling. ….
The NVC also preprocesses the chief of mission (COM) application required for the filing of a petition for a Special Immigrant Visa (SIV). Such visas, for foreign nationals who have performed services for the U.S. government in Iraq and Afghanistan, require COM concurrence before the applicant can file a petition with USCIS. The NVC collects the requisite documents from such applicants and, when complete, forwards the package to the U.S. embassies in Baghdad or Kabul for COM approval”
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation