#2828: Did Clinton’s Pedophile Maids Use Serco 8(a) Visas On A Snuff Film Bridge To Zulu JonBenet?
United States Marine Field McConnell
Plum City Online – (AbelDanger.net)
November 8, 2016
1. Abel Danger (AD) believes that Serco shareholders including the British and Saudi Arabian governments, launched an 8(a) visa program in 1994 to place alien, pedophile maids in the households of Hillary Clinton’s friends and/or enemies to be entrapped, blackmailed and extorted if and when the need arose.
2. AD alleges that Clinton aides sent one or more of these 8(a) maids to JonBenet Ramsey’s home in Boulder Colorado on Christmas Day 1996 to broadcast a “Small Business Torture Club – S.B.T.C” snuff film in Zulu time over the private servers of the Federal Bridge Certification Authority network.
3. AD claims that Clinton used the federal bridge and an 8(a) maid in the home of former CIA Director John Deutch to broadcast a real-time snuff film of the Khobar Towers bombings of June 25, 1996 and used her own 8(a) maid to broadcast a real-time snuff film of the 9/11 attacks.
4. United States Marine Field McConnell – Global Operations Director of Abel Danger –has offered to serve as a five-star general in a Trump administration to destroy weapons deployed by the Clinton Foundation on the federal bridge and arrest the 8(a) maids who allegedly use the bridge to broadcast S.B.T.C snuff-film images of victim deaths in Zulu time.
Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! [Note British and Saudi Governments, AXA, HSBC, Teachers’ andGoldman Sachs]
“Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”
Registered User Join Date Jul 2006 Posts 71
What if it was a private snuff movie broadcast over the internet?
This is a grisly theory, but it would explain a lot. Karr was there, yet he was also at home. “A small foreign faction” — forget the “foreign,” it could be a ring of pedophiles who conspired for two to film the rape and murder of JonBenet. There were two unidentified foot prints in the wine cellar room. One rapes and kills while the other runs the video camera, to give the members a feeling as though they were participating. This would also explain Karr’s initimate knowledge of the condition of the bruised body.
You know those pedophiles most probably haunt the child beauty pageants undercover. They probably felt taunted and outraged and envious of the parents of pretty singing and dancing JonBenet. If Karr is privy to a “home movie,” it was probably broadcast on a web private channel on the internet for a small, elite, silent, and highly paying pedophile club. Karr does not look capable of squashing a bug, let alone being brutal enough to do the real killing the way it was done. But he does look he is capable of being a stool pigeon. This pedophile ring would have had a possessive attitude toward JonBenet, as though they owned her.
The media would totally freak on something like this, which might explain the great secrecy. If prosecutors have gotten wind that a film exists, they would have to make sure that film is totally secure from the media, and so that is why no one has brought this subject up or come even close to it.
There’s my theory. I hope I didn’t repeat someone else’s theory unknowingly. If so, I apologize; I’ve been away from the forum for awhile.”
“The Khobar Towers bombing was a terrorist attack on part of a housing complex in the city of Khobar, Saudi Arabia, located near the national oil company (Saudi Aramco) headquarters of Dhahran and nearby King Abdulaziz Air Base on June 25, 1996. At that time, Khobar Towers was being used as quarters for Coalition forces who were assigned to Operation Southern Watch, a no-fly zone operation in southern Iraq, as part of the Iraqi no-fly zones. A truck bomb was detonated adjacent to Building #131, an eight-story structure housing members of the United States Air Force’s 4404th Wing (Provisional), primarily from a deployed rescue squadron and deployed fighter squadron. In all, 19 U.S. servicemen were killed and 498 of many nationalities were wounded. The official June 25, 1996 statement by the United States named members of Hezbollah Al-Hejaz (English: Party of God in the Hijaz) as responsible. In 2006, a U.S. court found Iran and Hezbollah guilty of orchestrating the attack.”
“Hillary Clinton Says She Was in New York City on 9/11 (She Wasn’t)
by CHARLIE SPIERING
1 Nov 20167,930 SIGN UP FOR OUR NEWSLETTER
Campaigning in Florida on Tuesday, Democratic presidential nominee Hillary Clinton claimed that she was in New York City on 9/11, when terrorists flew planes into the World Trade Center. She made her claim while discussing terrorism and the threat posed by ISIS.
“I know what happened not far from here at Pulse night club in Orlando,” she said. “I was in New York City on 9/11 as one of the two senators. I will defeat ISIS. I will protect America.”
Hillary says she was in New York City on 9/11 (She wasn’t) But Clinton wasn’t in New York on 9/11, according to Politico.
As a United States Senator she was in Washington D.C. at her home in Whitehaven when the first plane hit the World Trade Center. She spent most of the day reacting to the attacks in media interviews and joined her colleagues singing “God Bless America” on the Capitol Hill steps.
Clinton flew to New York on September 12, after making a speech on the Senate Floor in the morning. She traveled with her fellow New York Senator Chuck Schumer and Democratic Congressman Charlie Rangel.
Clinton toured the disaster site with New York mayor Rudy Giuliani before leaving the city that evening to travel back to Capitol Hill.”
“UNCLASSIFIED/ /FOUO Central Intelligence Agency Inspector General REPORT OF INVESTIGATION IMPROPER HANDLING OF CLASSIFIED INFORMATION BY JOHN M. DEUTCH (1998-0028-IG)
February 18, 2000
What was the physical vulnerability of Deutch’s magnetic media? 77. (U/ /FOUO) Deutch’s government-issued computer at his primary residence in Maryland contained an internal hard drive and was lacking password protection. The drive was not configured for removal and secure storage when unattended even though classified information resided on the drive. Additionally, at the time of the December 17, 1996 security inspection, three of the four unsecured PCMCIA cards yielded classified information: two in PCMCIA readers and one on the desk in Deutch’s study. An empty safe was also found with its drawer open. 80. (U/ /FOUO) According to the first Security Chief assigned to Deutch, the alarm deactivation [was provided] code to a resident alien who performed domestic work at the Maryland residence. The alien [was permitted] independent access to the residence while the Deutch’s were away. CIA security database records do not reflect any security clearances being issued to the alien. The resident alien obtained U.S. citizenship during 1998. 82. (U/ /FOUO) On May 2,1997, the Chief, SIB wrote in a memorandum to the Director of OPS:
In consultation with technical experts, OPS investigators determined the likelihood of compromise was actually greater via a hostile entry operation into one of Mr. Deutch’s two homes (Bethesda, Maryland and Boston, Massachusetts) to “image” the contents of the affected hard drives …. Due to the paucity of physical security, it is stipulated that such an entry operation would not have posed a particularly difficult challenge had a sophisticated operation been launched by opposition forces …. The Agency computer experts advised that, given physical access to the computers, a complete “image” of the hard drives could be made in [a short amount of time].”
“Clinton directed her maid to print out classified materials
By Paul Sperry
November 6, 2016 | 4:53am | Updated
As secretary of state, Hillary Clinton routinely asked her maid to print out sensitive government e-mails and documents — including ones containing classified information — from her house in Washington, DC, e-mails and FBI memos show. But the housekeeper lacked the security clearance to handle such material.
In fact, Marina Santos was called on so frequently to receive e-mails that she may hold the secrets to E-mailgate — if only the FBI and Congress would subpoena her and the equipment she used.
Clinton entrusted far more than the care of her DC residence, known as Whitehaven, to Santos. She expected the Filipino immigrant to handle state secrets, further opening the Democratic presidential nominee to criticism that she played fast and loose with national security.
Clinton would first receive highly sensitive e-mails from top aides at the State Department and then request that they, in turn, forward the messages and any attached documents to Santos to print out for her at the home.
Among other things, Clinton requested Santos print out drafts of her speeches, confidential memos and “call sheets” — background information and talking points prepared for the secretary of state in advance of a phone call with a foreign head of state.
“Pls ask Marina to print for me in am,” Clinton e-mailed top aide Huma Abedin regarding a redacted 2011 message marked sensitive but unclassified.
In a classified 2012 e-mail dealing with the new president of Malawi, another Clinton aide, Monica Hanley, advised Clinton, “We can ask Marina to print this.”
“Revisions to the Iran points” was the subject line of a classified April 2012 e-mail to Clinton from Hanley. In it, the text reads, “Marina is trying to print for you.”
Both classified e-mails were marked “confidential,” the tier below “secret” or “top secret.”
Santos also had access to a highly secure room called an SCIF (sensitive compartmented information facility) that diplomatic security agents set up at Whitehaven, according to FBI notes from an interview with Abedin.
From within the SCIF, Santos — who had no clearance — “collected documents from the secure facsimile machine for Clinton,” the FBI notes revealed.
Just how sensitive were the papers Santos presumably handled? The FBI noted Clinton periodically received the Presidential Daily Brief — a top-secret document prepared by the CIA and other US intelligence agencies — via the secure fax.
A 2012 “sensitive” but unclassified e-mail from Hanley to Clinton refers to a fax the staff wanted Clinton “to see before your Netanyahu mtg. Marina will grab for you.”
Yet it appears Clinton was never asked by the FBI in its yearlong investigation to turn over the iMac Santos used to receive the e-mails, or the printer she used to print out the documents, or the printouts themselves.
Hillary’s 33,000 emails might not be ‘missing’ after all
As The Post first reported, copies of Clinton’s 33,000 allegedly destroyed e-mails still exist in other locations and could be recovered if investigators were turned loose to seize them. Higher-ups at the Justice Department reportedly have blocked them from obtaining search warrants to obtain the evidence.
It also appears the FBI did not formally interview Santos as a key witness in its investigation.
This is a major oversight: Santos may know the whereabouts of a missing Apple MacBook laptop and USB flash drive that contain all of Clinton’s e-mails archived over her four years in office.
In 2013, Hanley downloaded Clinton’s e-mails from her private server to the MacBook and flash drive.
“The two copies of the Clinton e-mail archive (one on the archive laptop and one on the thumb drive) were intended to be stored in Clinton’s Chappaqua and Whitehaven residences,” the FBI said in its case summary.
But Hanley says the devices were “lost,” and the FBI says it “does not have either item in its possession.”
In addition to Abedin, Santos worked closely with Hanley at Whitehaven and could shed light on the mystery — if only she were asked about it.
When a Post reporter confronted Santos at her DC apartment Friday, she would say only, “I don’t speak to reporters.”
According to a 2010 profile in The Philippine Star, close Clinton friend Vernon Jordan recommended Santos to the Clintons after she worked part-time for him.
Bill Clinton gave a speech in Manila as part of his foundation and took time to visit with the family of the “mayordoma [housekeeper] of his Washington, DC, home — Marina Santos.”
He was quoted as describing Santos as the “wonderful woman who runs our home in Washington, without whom Hillary will not be able to serve as secretary of state.” The article ended remarking, without a hint of irony: “Marina now runs his house so that he and his wife can better serve interests higher than their own.”
Santos could turn out to be the Betty Currie of the Clinton e-mail scandal. Currie was the secretary for President Clinton. She also came recommended by Jordan, and became famous as a central witness in the Monica Lewinsky scandal for her handling of gifts given to Clinton’s mistress.
Investigators had sought the gifts, allegedly hidden under Currie’s bed on orders from Clinton, as evidence.
The State Department and Clinton campaign did not respond to requests for comment.
Paul Sperry, a former DC bureau chief for Investor’s Business Daily and a Hoover Institution media fellow, is the author of “Infiltration.””
“Spies In The Government
by Reed Irvine and Cliff Kincaid on March 13, 2000
By the time you hear this, Madeleine Albright may be completing a trip to her homeland, the Czech Republic. America?s Czech-born Secretary of State made the trip as reports surfaced in the U.S. media that she might seek the presidency of that Eastern European, former Soviet-bloc nation, after the Clinton Administration is finished. One would think, based on such flattering coverage of Albright, that she has done a tremendous job as Secretary of State. The reality is that major security lapses at the State Department have gone unpunished, a problem that seems to infect the Clinton Administration like a deadly disease.
Most people are familiar with the indictment of Taiwan-born former Los Alamos scientist Wen Ho Lee on charges of improperly handling classified information. The investigation focused on the Energy Department, which has oversight of the nuclear labs. But an inspector general?s investigation of the State Department found poor security practices stretching over a period of several years.
The public got a taste of the problem when it was disclosed that a listening device had been installed in a State Department conference room. A Russian diplomat who was using the listening device to spy on the State Department was subsequently kicked out of the United States. But the truth about how the device was installed—and by whom—has still not been disclosed.
Over at the CIA, the scandal over former CIA director John Deutch’s security lapses has drawn the attention of the media and the Senate Intelligence Committee. But the coverage still pales in comparison to the controversy that was generated back in 1996 when left-wing news organizations and black radicals falsely accused the CIA of dealing crack cocaine in Los Angeles in the 1980s. Then-CIA director Deutch appeared at a town hall meeting in Los Angeles to answer the phony charges.
In the current case, which is real and much more serious, an inspector general investigation has also been conducted. It says that Deutch, who left the CIA in December 1996, violated security rules by working on highly classified information on his home computers, which were also connected to the Internet. The inspector general’s report says that classified information on his computers “was vulnerable to possible electronic access and exploitation,” adding, “Deutch did receive e-mail on unclassified computers. One such message from France, dated July 11, 1995, was apparently from a former academic colleague who claimed to be a Russian.”
Deutch didn’t want a security presence in his home, citing concerns for personal privacy, and so CIA security personnel and local police simply drove by his residence occasionally. Deutch had an alarm system, but he gave the deactivation code to a resident alien who did housework at the place while the Deutchs were away. The inspector general’s report notes that the alien did not have a security clearance. Was the material on his computer provided to the enemy? At this early stage in the investigation, the report says there is “no clear evidence” of that but it would take “many months or longer” to determine for sure. And even then, it might not be possible to prove one way or another.”
“Investigators find Internet porn hits on ex-CIA director’s home computer
TOM RAUM Associated Press Writer Published Thursday, February 03, 2000
WASHINGTON — Former CIA Director John Deutch stored some of the nation’s most sensitive national security secrets on a home computer that also was used to access pornographic Internet sites and to routinely receive and send e-mail.
That’s the conclusion of CIA investigators in a case that is generating alarm among congressional intelligence overseers and throughout the intelligence community.
CIA Director George Tenet, in a public hearing on Wednesday before the Senate Intelligence Committee and later in a private session with members, said there was no evidence that Deutch’s unsecured home computer had been hacked into by foreign adversaries.
But neither was there any sure way to tell that it hadn’t been, given that the technology exists for such intrusions, he said.
“There was enormously sensitive material on this computer, at the highest levels of classification,” Tenet conceded at the public session.”
“Serco Processes 2 Millionth Patent Application for U.S. Patent and Trademark
Office Date: 18 Mar 2013 Serco Inc., a leading provider of professional, technology, and management services to the federal government, announced today that their Pre-Grant Publication (PGPubs) Classification Services team recently processed their 2 millionth patent application for the U.S. Patent & Trademark Office (USPTO). Each application was also processed within the contractually required 28-day window.”
“3.4.1 Federal Public Key Infrastructure Policy Authority (FPKIPA)
Any infrastructure which cuts across multiple agencies requires the cooperation of the affected agencies to make it work. The Federal PKI is no different. While agencies may run their own agency-specific PKI domains to serve their own agency-specific needs, interoperating with other agencies imposes unique requirements and obligations. The model of governance reflects the fact that the Federal PKI has evolved from the bottom up, from agencies adopting this technology to serve their specific needs rather than having its use prescribed for them. In 1996, the Federal PKI Steering Committee was formed under the Government Information Technology Services Board, co-chaired by OMB and the National Partnership for Reinventing Government (NPR). The Steering Committee, comprising over 50 members representing over two dozen agencies, has as its focus the promotion of interoperable PKI solutions, the development of common guidance, and the sharing of information so that agencies considering or deploying PKI solutions can benefit from those who have already done so. Participation in the Steering Committee is voluntary. Its activities are published at http://gits-sec.treas.gov.”
“Super Serco bulldozes ahead
By DAILY MAIL REPORTER UPDATED: 23:00 GMT, 1 September 2004
SERCO has come a long way since the 1960s when it ran the ‘four-minute warning’ system to alert the nation to a ballistic missile attack.
Today its £10.3bn order book is bigger than many countries’ defence budgets. It is bidding for a further £8bn worth of contracts and sees £16bn of ‘opportunities’.
Profit growth is less ballistic. The first-half pre-tax surplus rose 4% to £28.1m, net profits just 1% to £18m. Stripping out goodwill, the rise was 17%, with dividends up 12.5% to 0.81p.
Serco runs the Docklands Light Railway, five UK prisons, airport radar and forest bulldozers in Florida.”
“Serco farewell to NPL after 19 years of innovation 8 January 2015 Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco’s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade…. NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading [for Serco’s front running banks] in the City through NPL [Zulu] Time.”
“UK Cabinet Office – Emergency Planning College – Serco …..Types of Exercise Workshop Exercises These are structured discussion events where participants can explore issues in a less pressurised environment. They are an ideal way of developing solutions, procedures and plans rather than the focus being on decision making. Table Top Exercises These involve a realistic scenario and will follow a time line, either in real-time or with time jumps to concentrate on the more important areas. The participants would be expected to be familiar with the plans and procedures that are being used although the exercise tempo and complexity can be adjusted to suit the current state of training and readiness. Simulation and media play can be used to support the exercise. Table-top exercises help develop teamwork and allow participants to gain a better understanding of their roles and that of other agencies and organisations. Command/Control Post Exercises These are designed primarily to exercise the senior leadership and support staff in collective planning and decision making within a strategic grouping. Ideally such exercises would be run from the real command and control locations and using their communications and information systems[Feeling lucky, Punk?]. This could include a mix of locations and varying levels of technical simulation support. The Gold Standard system is flexible to allow the tempo and intensity to be adjusted to ensure maximum training benefit, or to fully test and evaluate the most important aspects of a plan. Such exercises also test information flow, communications, equipment, procedures, decision making and coordination. Live Exercises These can range from testing individual components of a system or organisation through to a full-scale rehearsal. They are particularly useful where there are regulatory requirements or with high-risk situations. They are more complex and costly to organise and deliver but can be integrated with Command Post Exercises as part of a wider exercising package.”
“Christopher Rajendran Hyman CBE (born 5 July 1963 in Durban, South Africa) was Chief Executive of Serco Group plc from 2002 to October 2013. … On graduation, he worked for Arthur Andersen. In 1989, he won an 18-month exchange with Ernst & Young in London, who employed him after four months. Head hunted in 1994 by Serco, Hyman became European finance director, and in 1999 was made group finance director. In 2002, Hyman became chief executive. .. Hyman resigned from his role of Chief Executive of Serco on 25 October 2013 following allegations that Serco had overcharged government customers. .. He was [making a presentation to Serco shareholder, including British and Saudi governments] on the 47th floor of the World Trade Center [North Tower] at the time of the September 11 attacks in 2001.”
“Serco’s Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals.”
“Base One Technologies, Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and was formed on Feb 15, 1994.This file was obtained from the Secretary of State and has a file number of 1795583.”
“Base One Technologies – Corporate Strategy – We are a Government Certified Women-Owned Business
We practice Diversity [Pride] Recruitment and Staffing for IT positions .. We are also partnered with firms that are 8A certified as Minority firms, Disabled Veteran firms, Native American firms, Vietnam veteran firms, women owned firms. .. Information Security Planning is the process whereby an organization seeks to protect its operations and assets from data theft or computer hackers that seek to obtain unauthorized information or sabotage business operations. Key Clients Benefiting From Our Information Security Expertise: Pentagon Renovation Program, FAA, Citigroup [Federal Bridge], MCI. .. Base One Technologies … Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions.”
“Opened in 1994 as the successor to the Transitional Immigrant Visa Processing Center in Rosslyn, Va., the NVC centralizes all immigrant visa pre-processing and appointment scheduling for overseas posts. The NVC collects paperwork and fees before forwarding a case, ready for adjudication, to the responsible post.
The center also handles immigrant and fiancé visa petitions, and while it does not adjudicate visa applications, it provides technical assistance and support to visa-adjudicating consular officials overseas.
Only two Foreign Service officers, the director and deputy director, work at the center, along with just five Civil Service employees. They work with almost 500 contract employees doing preprocessing of visas, making the center one of the largest employers in the Portsmouth area.
The contractor, Serco, Inc., has worked with the NVC since its inception and with the Department for almost 18 years.
The NVC houses more than 2.6 million immigrant visa files, receives almost two million pieces of mail per year and received more than half a million petitions from the U.S. Citizenship and Immigration Service (USCIS) in 2011. Its file rooms’ high-density shelves are stacked floor-to-ceiling with files, each a collection of someone’s hopes and dreams and each requiring proper handling. ….
The NVC also preprocesses the chief of mission (COM) application required for the filing of a petition for a Special Immigrant Visa (SIV). Such visas, for foreign nationals who have performed services for the U.S. government in Iraq and Afghanistan, require COM concurrence before the applicant can file a petition with USCIS. The NVC collects the requisite documents from such applicants and, when complete, forwards the package to the U.S. embassies in Baghdad or Kabul for COM approval”
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation