Kelly 169: Clinton’s PTO Crown In Serco’s Death-Pool Time, CAI’s JABS For JonBenét Demons, Wilbur’s Cheney 8(a) Greeks

General John F. Kelly
White House Chief of Staff
Washington, D.C. 20528

Open letter from the Cloud Centric Crime Scene Investigators of Abel Danger

December 25, 2017

Dear General Kelly:

On the 21st Anniversary of the torture murder of JonBenét by a small foreign faction signing itself S.B.T.C

America and its friends – When will you wake up?

Dear General Kelly:

Please accept Brief 169 from Field McConnell – United States Marine Corps whistle-blower and Global Operations Director of Abel Danger (AD) – on Hillary Clinton’s apparent role in converting the operations of the U.S. Patent and Trademark Office (USPTO) to Crown rights rules which allegedly authorize Serco‘s British privateers to extort patentees into licensing encrypted technologies for death-pool betting in Zulu time.

McConnell believes that Serco‘s death-pool operators in the CAI Private Equity Group used a “Method for efficient management of certificate revocation lists and update information US 5699431” filed November 13, 1995, original assignee Northern Telecom Limited (Nortel), to ensure the FBI was not notified of the apparent kidnapping of JonBenét Ramsey from her parents’ home in Boulder, Colorado and would fail to make a timely investigation into Serco‘s apparent deployment of Demon face recognition software or the Joint Automated Booking System (JABS) from Nortel Government Solutions to procure, time stamp and back haul images of JonBenét’s death by torture on Christmas Day 1996.

McConnell alleges that Serco deployed its SBA 8(a) companies to set up a CAI death pool to bet on the time of death of JonBenét for the Greek Life associates of Wilbur Ross (Kappa Beta Phi), Serco‘s former investment banker at N M Rothschild & Sons and Lynne Cheney (Phi Beta Kappa), former director of Lockheed Martin, Serco‘s partner in the Atomic Weapons Establishment’s dial-a-yield patent pool!

McConnell believes Serco privateers used JABS Demon images of JonBenét’s murder to extort Lockheed Martin and Nortel directors into linking company patent pools to the federal bridge certification authority and allowing SBA 8(a) companies to fly Rocket-boosted guided hard target penetrators (US 6276277 B1) into WTC #1 & #2 and the Pentagon on 9/11 while the Greek life associates of Howard Lutnick, co-inventor of Real-time interactive wagering on event outcomes (US 8512129 B2), engaged in death pool betting on times of deaths and body counts for the first live-broadcast mass snuff film in human history.

Field McConnell is standing by to brief you on his planned request to Congress that it authorize the President of the United States to issue letters of marque and reprisal to a detachment of veteran Marines which would allow them to seize, subdue and take any assets, patented in whole or in part, then or now in the custody of Serco‘s British privateers or its shareholders or its investment banker N M Rothschild, at the U.S. Patent Office which are believed to have been used in the torture murder of JonBenét Ramsey on Christmas Day 1996 or the mass-casualty event at the Pentagon registered on Sep. 12, 2001 17:37:19!


CAI SACEUR, the late General Alexander Haig, allegedly built an IAI surveillance bridge for EU war games and Serco digital fires

SERCO GROUP PLC: List of Subsidiaries AND Shareholders! [Note agents for Northern Trust and the Teachers (TIAA) Pension Fund would have met with agents of the government of Saudi Arabia on the 47th floor of WTC 1 on 9/11]

Yours sincerely,

Field McConnell
USMC 0116513
P O Box 39
Plum City WI 54761″

“Digital Fires Instructor Serco – [Marine Corps Base] Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”

“A privateer was a private person or ship that engaged in maritime warfare under a commission of war.[1] The commission, also known as a letter of marque, empowered the person to carry on all forms of hostility permissible at sea by the usages of war, including attacking foreign vessels during wartime and taking them as prizes. Captured ships were subject to condemnation and sale under prize law, with the proceeds divided between the privateer sponsors, shipowners, captains and crew. A percentage share usually went to the issuer of the commission. Since robbery under arms was common to seaborne trade, all merchant ships were already armed. During war, naval resources were auxiliary to operations on land so privateering was a way of subsidizing state power by mobilizing armed ships and sailors.”

“Mr. Ramsey,

Listen carefully! We are a group of individuals that represent a small foreign faction. We respect your business but not the country that it serves. At this time we have your daughter in our possession. She is safe and unharmed and if you want her to see 1997, you must follow our instructions to the letter. You will withdraw $118,000 from your account. $100,000 will be in $100 bills and the remaining $18,000 in $20 bills. Make sure that you bring an adequate size attaché to the bank. When you get home you will put the money in a brown paper bag. I will call you between 8 and 10 A.M. tomorrow to instruct you on delivery. The delivery will be exhausting so I advise you to be rested. If we monitor you getting the money early, we might call you early to arrange an earlier delivery of the money and hence an earlier pickup of your daughter.

Any deviation of my instructions will result in the immediate execution of your daughter. You will also be denied her remains for proper burial. The two gentlemen watching over your daughter do not particularly like you so I advise you not to provoke them. Speaking to anyone about your situation such as police or F.B.I. will result in your daughter being beheaded. If we catch you talking to a stray dog, she dies. If you alert bank authorities, she dies. If the money is in any way marked or tampered with, she dies. You will be scanned for electronic devices and if any are found, she dies. You can try to deceive us, but be warned we are familiar with law enforcement countermeasures and tactics. You stand a 99% chance of killing your daughter if you try to outsmart us. Follow our instructions and you stand a 100% chance of getting her back. You and your family are under constant scrutiny, as well as the authorities. Don’t try to grow a brain, John. You are not the only fat cat around so don’t think that killing will be difficult. Don’t underestimate us, John. Use that good, southern common sense of yours. It’s up to you now, John! Victory! S.B.T.C.”

“Linda Arndt just ‘believed’ John Ramsey did it when she had no supporting evidence for that belief. That’s a bit like Nelly on this Topix forum

In a way I have some sympathy for Linda Arndt. She was given a terrible problem, and put in a very stressful situation, when there was not exactly a lot of backup of plenty of staff to help her out.

It was not really her fault that the flashlight went missing, and perhaps a hammer and brick, and even the missing Santa bear. In a way Linda Arndt was blamed unfairly for that. Perhaps Fleet and Priscilla White might have some idea about what happened to those items?

Whatever anybody says the FBI and Lockheed Martin Security did nothing. In other similar kidnapping situations half the FBI would have descended on the area.

If it’s true, as some people say, that the FBI knew what had happened then I find that suspicious. The only explanation I can think of is that the FBI were all half drunk after a good Christmas.

This is part of what Linda Arndt said happened:

23 Q. At the time you called 911, how many

24 officers were in the house?

25 A. Just me.

Page 128

1 Q. Had you attempted to get support prior to

2 that time?

3 A. Yes.

4 Q. What attempts had you made prior to making

5 the 911 call?

6 A. When Wickman left at about 10:30 that

7 morning, he said someone would be there to relieve me

8 soon. And then I made at least two phone calls to the

9 detective bureau asking for help.

10 Q. So Sargeant Wickman had been with you

11 earlier in the morning; is that correct?

12 A. Yes.

13 Q. And Detective Patterson had been with you

14 earlier in the morning; is that correct?

15 A. Yes.

16 Q. But when Sargeant Wickman left, were you

17 left alone as the only police officer there?

18 A. When Wickman and Patterson left, I was the

19 only police officer there.

20 Q. Did they leave together?

21 A. Yes.

22 Q. I’m sorry. This was approximately when?

23 A. 10:30, 10:35.”

“What to do when your child is missing …. Checklist

Immediately call (911) and all other local law enforcement agencies: Do not stop after you have called 911. Depending on your circumstances, contact your local Police Department, County Sheriff, State Police or Highway Patrol, law enforcement in surrounding jurisdictions and the Border Patrol if applicable. Remember, there is no 24 or 48-hour waiting period. If you meet resistance demand to speak to the watch commander and insist that they take a report and enter the information into the National Crime Information Computer (NCIC) at once.

Notify the Federal Bureau of Investigation: If you suspect a predatory abduction. The FBI will initiate a kidnapping investigation involving a missing child of tender years, defined as a child twelve years or younger, even though there is no known interstate aspect. The FBI will monitor other kidnapping situations when there is no evidence of interstate travel, and it offers assistance from various entities including the FBI Laboratory. They have written protocols, dedicated agents, unsurpassed resources and vast experience in this specialized investigative field.”

“Method for efficient management of certificate revocation lists and update information
US 5699431 A
A method which allows implementation of the revocation of public-key certificates facilitates engineering of certificate revocation lists (CRLs). It solves the practical problem of CRLs potentially growing to unmanageable lengths by allowing CRLs to be segmented, based on size considerations or priority considerations related to revocation reasons. The method is used to distribute CRL information to users of certificate-based public-key systems. It is also applied more generally to update any field in a certificate by reference to a secondary source of authenticated information.

Publication number: US5699431 A
Publication type: Grant
Application number: US 08/556,360
Publication date: Dec 16, 1997
Filing date: Nov 13, 1995
Priority date: Nov 13, 1995
Fee status: Paid
Inventors: Paul C. Van Oorschot, Warwick S. Ford, Stephen W. Hillier, Josanne Otway
Original Assignee: Northern Telecom Limited
Export Citation: BiBTeX, EndNote, RefMan
Patent Citations (9), Non-Patent Citations (8), Referenced by (194),Classifications (5), Legal Events (11)”

“Dr. William Thornton (May 20, 1759 – March 28, 1828) was a British-American physician, inventor, painter and architect who designed the United States Capitol, an authentic polymath. He also served as the first Architect of the Capitol and first [Privateer] Superintendent of the United States Patent Office. … Upon the abolition of the board in 1802, President Jefferson appointed Thornton the first Superintendent of the Patent Office. When Washington was burned by the British in 1814, Thornton convinced them not to burn the Patent Office because of its importance to mankind. He held the position from June 1, 1802 until his death in 1828 in Washington, DC. During his tenure, he introduced innovations including the patent reissue practice, which survives to this day.[9] Some of Thornton’s reputation as an inventor is due to abuse of his position in the Patent Office. His improvements to John Fitch’s 1788 steamboat are patented but didn’t work. [10] When John Hall applied for a patent on a new breech-loading rifle in 1811, Thornton claimed he had also invented it. As proof, he showed Hall a Ferguson rifle, a British gun dating from 1776, refusing to issue the patent unless it was in his name as well as Hall’s name. [11]”

“1819 June 14. (Jefferson to Thomas McAuley). “I have heard of the Alpha, Phi, Beta and Kappa society, but never understood either it’s location or object. when I was a student of Wm, & Mary college of this state there existed a society called the F.H.C. society, confined to a number of six students only, of which I was a member, but it had no useful object. nor do I know whether it now exists.” 15″

“July 26, 2000 THE SPOUSE The Real Conservative in the Family
By ELAINE SCIOLINO WASHINGTON, July 25 — Smiling alongside Dick Cheney in Texas today as he became Gov. George W. Bush’s running mate was Mr. Cheney’s high school sweetheart and wife of 36 years. But Lynne V. Cheney, 58, is no ordinary political wife. She is an unusually high-profile figure with a national reputation as a passionate opponent of “political correctness” and with a public record that is even more conservative than her husband’s… She has also written novels, one a political thriller about Washington whose characters include a vice president who dies of what she delicately calls “carnal arrest” while in the company of a television newswoman… At Natrona County High School in Casper, Lynne Vincent was chief of the baton squad and homecoming queen. Dick Cheney was the captain of the football team and senior class president, and, she once said, had a terrific crew cut. She went on from there to Colorado College, where she graduated Phi Beta Kappa. In 1978, she was teaching English at the University of Wyoming when her husband, running for Wyoming’s lone seat in the House, suffered a heart attack. She filled in on the stump for six weeks. He won the race, and went on to serve 10 years in Congress. While Mr. Cheney worked as a congressman and then as defense secretary, Mrs. Cheney used her position as head of the national endowment to assert an increasingly conservative ideology. She was accused by many scholars of politicizing the endowment’s grant-making by favoring traditional over multicultural projects and loading peer review committees with conservatives.”

“IV. Bush and Cheney: the Arms Industry’s ‘Dream Team’ George W. Bush has strong ties to Lockheed Martin from his service as Governor of Texas, where he tried to give the firm a contract to run the Texas welfare system before he had to relent in the face of public protests and an unfavorable regulatory ruling by the Clinton administration. Lockheed Martin VP Bruce Jackson is a finance chair of the Bush for President campaign, and was heard to brag at a conference last year that he would be in a position to “write the Republican platform” on defense if Bush gets the nomination (which he will, later this week). Dick Cheney, the man who presided over the U.S.-led victory over Saddam Hussein in the 1991 Gulf War, has spent the past few years running the oil services giant Halliburton, which ranked 18th on the Pentagon’s top contractors list in FY 1999. Cheney’s wife, Lynne, serves on Lockheed Martin’s board, a service for which she receives $120,000 in compensation. That’s small change for the Cheney family — Dick earned $26.7 million in wages, bonuses, and stock options last year — but it raises serious questions of conflict of interest when the potential “second lady” is on the payroll of the nation’s largest weapons maker.”

“Nortel Government Solutions, in collaboration with the Department of Justice (DOJ), built the Joint Automated Booking System (JABS) — a centralized system for automating the collection of fingerprint, photographic and biographic data, submitting this data to the FBI, and sharing it with participating law enforcement agencies nationwide”

“Cryptographic apparatus and method
US 4200770 A
A cryptographic system transmits a computationally secure cryptogram over an insecure communication channel without prearrangement of a cipher key. A secure cipher key is generated by the conversers from transformations of exchanged transformed signals. The conversers each possess a secret signal and exchange an initial transformation of the secret signal with the other converser. The received transformation of the other converser’s secret signal is again transformed with the receiving converser’s secret signal to generate a secure cipher key. The transformations use non-secret operations that are easily performed but extremely difficult to invert. It is infeasible for an eavesdropper to invert the initial transformation to obtain either conversers’ secret signal, or duplicate the latter transformation to obtain the secure cipher key.

Publication number: US4200770 A
Publication type: Grant
Application number: US 05/830,754
Publication date: Apr 29, 1980
Filing date: Sep 6, 1977
Priority date: Sep 6, 1977
Inventors: Martin E. Hellman, Bailey W. Diffie, Ralph C. Merkle
Original Assignee: Stanford University
Export Citation: BiBTeX, EndNote, RefMan
Non-Patent Citations (2), Referenced by (1299), Classifications (9)
External Links: USPTO, USPTO Assignment, Espacenet
The Government has rights in this invention pursuant to Grant No. ENG-10173 of the National Science Foundation and IPA No. 0005.”

“Rocket-boosted guided hard target penetrator
US 6276277 B1
A target-penetrating aerial bomb includes a penetrator of hard steel or similar material that contains an explosive charge. A rocket motor is formed as an annular chamber and surrounds the penetrator. The bomb includes a guidance and control unit that guides the bomb on a glide path after release from the delivery aircraft, and steers the bomb onto a dive line. Once the bomb is aligned on the dive line, the guidance and control unit fires the rocket booster to accelerate the bomb to the target. A fuse ignites the explosive after target penetration.
Publication number: US6276277 B1
Publication type: Grant
Application number: US 09/295,594
Publication date: Aug 21, 2001
Filing date: Apr 22, 1999
Priority date: Apr 22, 1999
Fee status: Paid
Inventors: Bruce E. Schmacker
Original Assignee: Lockheed Martin Corporation
Export Citation: BiBTeX, EndNote, RefMan
Patent Citations (30), Non-Patent Citations (3), Referenced by (89),Classifications (22), Legal Events (5)
External Links: USPTO, USPTO Assignment, Espacenet”

“Real-time interactive wagering on event outcomes
US 8512129 B2
Systems and methods for real-time interactive wagering on event outcomes are presented. Clients are first qualified and given wagering limits before being allowed to interactively wager on event outcomes. Event outcomes may be based on, for example, financial markets and indices, sporting and entertainment events, casino performances, and natural phenomena such as weather and earthquakes. Events on which wagers can be placed include both those with known and unknown outcome probabilities, and wagers can be a fixed-odds type or a spread-bet type. Wager transactions, including acceptances and confirmations, are executed in real time. Clients can customize displays of events on which they are authorized to wager. Real-time client credit management, automatic dealer hedging, automatic price-spread adjustments, and automatic client and dealer defined wagering limits are also provided.

Publication number: US8512129 B2
Publication type: Grant
Application number: US 09/846,025
Publication date: Aug 20, 2013
Filing date: Apr 30, 2001
Priority date: May 1, 2000
Fee status: Paid
Also published as: CA2407679A1, 17 More »
Inventors: Philip M Ginsberg, Andrew C Gilbert, Howard W Lutnick, Lewis Findlay
Original Assignee: Cfph, Llc
Export Citation: BiBTeX, EndNote, RefMan
Patent Citations (181), Non-Patent Citations (83), Referenced by (5),Classifications (16), Legal Events (3)”

Clinton Attends NYC Fundraiser
November 12, 2015 Categories Campaign Events Tags Cantor Fitzgerald, CEO, Chairman, Clinton, debate, Democratic, fundraiser, Hillary, Hillary Rodham Clinton, home, Howard Lutnick, New York, New York City, NYC, press, private, Saturday
Clinton attends a private fundraiser in Connecticut on June 5
On Wednesday night, Hillary Rodham Clinton attended a private fundraiser in New York City. The event was held at the home of Howard Lutnick, Chairman and CEO of Cantor Fitzgerald. As with all private fundraisers, it was closed to the press.

Clinton has no events scheduled between now and Saturday’s Democratic Debate. For all the latest, follow our Scheduled Events page and follow Clinton on Twitter, Facebook, and Instagram.”

“The issue of marque and reprisal was raised before Congress after the September 11 attacks[36] and again on July 21, 2007, by Congressman Ron Paul. The attacks were defined as acts of “air piracy” and the Marque and Reprisal Act of 2001 was introduced, which would have granted the president the authority to use letters of marque and reprisal against the specific terrorists, instead of warring against a foreign state. The terrorists were compared to pirates in that they are difficult to fight by traditional military means.[37] Paul on April 15, 2009, also advocated the use of letters of marque to address the issue of Somali pirates operating in the Gulf of Aden. However, the bills Paul introduced were not enacted into law.”

“H.R. 3076 (107th): September 11 Marque and Reprisal Act of 2001 .. To authorize the President of the United States to issue letters of marque and reprisal with respect to certain acts of air piracy upon the United States on September 11, 2001, and other similar acts of war planned for the future.”

1854 Total Views 2 Views Today
Please follow and like us:

Related Post


  • “Case for War with Israel over 9/11” at VeteransToday website, 11/27/2017

    Traces stolen W-54 nuke pits from PanTex to reprocessed Thermobaric mini-nukes at WTC buildings and the Urban Moving Systems demolition teams arrested at Geo Washington Bridge and the Holland Tunnel on 9/11.

  • Namasté greetings Mitakuye Oyasin from mama afrika.
    gratitude and thank you for sharing light full disclosure and victory against
    the lucifarian human animal fish and fowl blood sacrificers and satanists.

    I offer my vote of yes to the EO for the letter of marquee to be activated and the global arrests
    asset forfeiture on and offshore, incarceration no bail, trial of perpetrators via victims,witnesses,whistleblowers,digital depositions or live, consequence of crime and treason meeted out, reconciliation, peace harmony and freedom for those subscribing to the intergalactic universal maxim based on love.

    And so we ask POTUS to activate the EO and letter of marque.
    gratitude and thanks.

    please use this original music track as a tool to raise funds for our clan globally as we recycles replenish and fix Gaia aria as we greet a new golden now.
    I shall email it through.

    weareall weareone wearetan onepeopleism onelovexpressed ubuntuoneheartunited DahMah
    Gratitude and thanks family