Kelly 195: Serco’s Fukushima Bomb & Redwall Patents, BBC Clinton’s 8(a) LEO Buck, Marine Corps Letter of Marque

General John F. Kelly
White House Chief of Staff
Washington, D.C. 20528

Open letter from the Cloud Centric Crime Scene Investigators of Abel Danger

January 25, 2018

Dear General Kelly:

Please accept Brief 194 from Field McConnell – United States Marine Corps whistle-blower and Global Operations Director of Abel Danger (AD) – on Serco‘s CAI private-equity group investors who allegedly hired Redwall Technologies’ patentee SWAT teams to coordinate the alleged bombing of the Fukushima Daiichi Nuclear Power Plant in Ōkuma, Fukushima Prefecture on 11 March 2011 with a bogus insurance claim and a ‘drift’ of money into client accounts through the use of subsequently-patented digital devices including Enhanced security SCADA systems and methods US 9298917 B2; Real-time interactive wagering on event outcomes CA 2460367 A1 and Coordinated rebalancing by money manager portfolio management systems and a master overlay manager portfolio management system US 7729969 B1.

McConnell claims that Serco – a nuclear-, cyber- and satellite-system security supplier – and its CAI investor Joseph Melone, former CEO at (AXA) Equitable Companies and co-developer of Trump Tower, used the BBC and Hillary Clinton to script attacks where former Marine Corps helicopter pilot, former FBI Associate Deputy Director, founder of Law Enforcement Online (LEO) and current chairman of Vancouver-based Imagis, Oliver “Buck” Revell allegedly hired Redwall 8(a) partners to bomb the Fukushima plant.

McConnell claims that Serco – Boing’s preferred supplier of C4I systems – and its CAI investors, the late Walter Wriston, former chairman of Citicorp and principal creditor of Trump Shuttle Inc., and Yves Fortier, a former Nortel and Alcan director, embedded Nortel’s JABS* and various digitally-enabled patented devices including Method for efficient management of certificate revocation lists and update information US 5699431 A in Buck Revell’s LEO network and allowed the BBC and Hillary Clinton to script the 9/11 war games with Boeing director and former CJCS the late John Shalikashvili in Chicago.

McConnell claims that the late Gen. Alexander Haig, Serco‘s CAI investor, 7th SACEUR and former MGM Mirage director, equipped the Greek Life associates of Bill Clinton (Phi Beta Kappa) and Wilbur Ross (Kappa Beta Phi) with LEO Virtual Command Centers (VCCs) so they could watch the alleged Redwall 8(a) bombing of the Fukushima plant and, soon after, watch cash drift into their private accounts through various wagering, rebalancing and insurance frauds.

McConnell claims that Serco uses Revell’s Imagis face recognition s/w to track actors and victims through the federal bridge certification authority network and remind government leaders that while Clinton and the BBC may write SWAT-team scripts, Serco‘s (formerly RCA GB 1929) private-equity groups and its investment bankers control the special weapons registered at the United States Patent and Trademark Office and therefore control the country itself!

JABS* – Joint Automated Booking System allegedly built by Nortel Government Solutions for the U.S. Department of Justice so insiders can book criminals and patentee SWAT teams into snuff-film or mass-casualty or arson events to control the outcome of crime-scene investigations and enrich Serco‘s private-equity investors including Joseph Melone, Yves Fortier and the late Alexander Haig.

Field McConnell invites you to convene a meeting with your cabinet colleagues and United States Marine Corps Major Duncan D. Hunter, Member of the U.S. House of Representatives from California’s 50th district, where McConnell can explain how Serco has embedded patentee SWAT teams into the FBI’s LEO network to conceal wagering on victim deaths or body counts at crime scenes associated with – to name just three – the bombings of the Pentagon on 9/11, the London Underground on 7/7 and the Fukushima Daiichi Nuclear Power Plant on 11 March 2011.

After meeting with Congressman Hunter and your cabinet colleagues, McConnell will be asking Congress to authorize President Trump to issue a Presidential letter of Marque and Reprisal, which would allow him (McConnell) to recruit and lead an Abel Danger Marine Expeditionary Unit of about 100 veteran Marines to seize and take the assets of any patentee SWAT teams in the custody of Serco‘s private-equity groups (privateers), or shareholders or investment banker, N M Rothschild & Sons Ltd.

After the said assets have been transferred to the lawful custody of the United States’ government, McConnell’s MEU will begin to subdue the secret societies identified as Phi Beta Kappa and Kappa Beta Phi (founded 1776) which, we allege, have been blackmailing and extorting presidents of the United States with patentee SWAT-team attacks starting no later than the arson of the U.S. Patent Office in the USA Post Office, Blodget’s Hotel, Washington, on December 15, 1836 and continuing through pre-scripted arson or bombing attacks to the present day.

Fukushima Nuclear Power Plant Explosion

Enhanced Security SCADA Systems and Methods
https://www.google.com/patents/US20130081103

Joseph and Marie Melone at a screening of “Trade” at the UN in the Trusteeship Council

There are TWO Londons & Why it MATTERS

SERCO GROUP PLC: List of Subsidiaries AND Shareholders! [Note agents for Northern Trust and the Teachers (TIAA) Pension Fund would have met with agents of the government of Saudi Arabia on the 47th floor of WTC 1 on 9/11]

Yours sincerely,

Field McConnell
USMC 0116513
P O Box 39
Plum City WI 54761″
+001-715-307-8222

“Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”

Serco Processes 2 Millionth Patent Application for U.S. Patent and Trademark Office
March 19, 2013 RESTON, VIRGINIA – March 18, 2013 – Serco Inc., a leading provider of professional, technology, and management services to the federal government, announced today that their Pre-Grant Publication (PGPubs) Classification Services team recently processed their 2 millionth patent application for the U.S. Patent & Trademark Office (USPTO). Each application was also processed within the contractually required 28-day window.”

“The Fukushima Daiichi nuclear disaster (福島第一原子力発電所事故 Fukushima Dai-ichi ( pronunciation) genshiryoku hatsudensho jiko) was an energy accident at the Fukushima Daiichi Nuclear Power Plant in Ōkuma, Fukushima Prefecture, initiated primarily by the tsunami following the Tōhoku earthquake on 11 March 2011.[6] Immediately after the earthquake, the active reactors automatically shut down their sustained fission reactions. However, the tsunami disabled the emergency generators that would have provided power to control and operate the pumps necessary to cool the reactors. The insufficient cooling led to three nuclear meltdowns, hydrogen-air explosions, and the release of radioactive material in Units 1, 2, and 3 from 12 March to 15 March. Loss of cooling also caused the pool for storing spent fuel from Reactor 4 to overheat on 15 March due to the decay heat from the fuel rods.

On 5 July 2012, the Fukushima Nuclear Accident Independent Investigation Commission (NAIIC) found that the causes of the accident had been foreseeable, and that the plant operator, Tokyo Electric Power Company (TEPCO), had failed to meet basic safety requirements such as risk assessment, preparing for containing collateral damage, and developing evacuation plans. On 12 October 2012, TEPCO admitted for the first time that it had failed to take necessary measures for fear of inviting lawsuits or protests against its nuclear plants.[7][8][9][10]”

“SIEMENS

FUKUSHIMA: US-ISRAELI STUXNET SABOTAGES THERMOMETERS AND WATER TREATMENT
With every new report and article coming from the establishment and alternative media about Fukushima, Japan, the gap between their fake reality and the real truth keeps growing further and has by now become so wide that it seems to be very unlikely that the establishment and alternative media will ever pick up the real facts in their reporting about the nuclear power station in Fukushima.

Ever since the 7.0 earthquake hit Japan on March 11, 2011, the cover-up of the actual causes – the eco-terror, the nuclear attacks and the sabotage – has been tightly scripted and expanded by the media, the USGS, the NRC, the Israeli Magna BSP [1, 2], the United Nations, the EU and even the WWF and Greenpeace.

Obviously it can be expected that also the problems in the aftermath of the proven eco-terror, the nuclear attacks and the sabotage will be shrouded in lies and deception. Sadly, we don’t expect any other behavior.

Practically all the ongoing reports about the leaking of water, about pumps and valves that are malfunctioning or were “forgotten” to be switched properly and about the failing thermometers at the Fukushima power station are missing the same crucial piece of information.

It has already been confirmed since at least 2010 and in multiple ways that Stuxnet (malware/virus), created by the U.S. and Israel, infected and continues to sabotage the Fukushima nuclear power station by attacking the Siemens SCADA control systems.

The same Stuxnet is also responsible for sabotaging the thermometers in the nuclear reactors that continue to fail, like it is the case in unit 2, falsely blamed on workers who “cripple” the instruments. Thermometers like in Fukushima are operated through/linked to the SCADA control systems which are still infected with Stuxnet, this means that also the thermometers are exposed to the Stuxnet infection.

The decontamination system for contaminated water at Fukushima was co-developed by AREVA and Veolia Water in “a record-two months” after the eco-terror and the nuclear attacks occurred. According to Veolia Water data their “state-of-the-art online control of wastewater systems” work with and supplement SCADA control systems:

“The operation and reporting of STAR Control® are based on Internet technology and a graphic user interface is accessed by network browser on LAN, ADSL or similar networks.”

This is surely the reason why Magna BSP’s internet connection with the reactors at Fukushima is so important to those who have created this mess by committing eco-terror and engaging in war crimes. In this way full control can be kept remotely which is necessary when Japan is to be held hostage firmly, as they slowly lose credibility in the international community for a disaster they didn’t even create.

So whenever you encounter a new Fukushima article or report be sure to check if that source has already reported about the real facts, including the eco-terror, the nuclear attacks and the sabotage. If they haven’t done so then it’s very unlikely that their future reporting will be trustworthy since they omit key facts on purpose and leave you in fear with fake radiation charts to stare at”.

“Stuxnet: Cyber attack on Iran ‘was carried out by Western powers and Israel’
A British security expert has uncovered new evidence in the Stuxnet virus attack on Iran’s nuclear programme.
By Christopher Williams, Technology Correspondent
1:27PM GMT 21 Jan 2011
The Stuxnet computer virus, created to sabotage Iran’s nuclear programme, was the result of collaboration between at least one Western power and the Israeli secret service, a British cyber security expert has found.

Tom Parker, a US-based security researcher who specialises in tracing cyber attacks, has spent months analysing the Stuxnet code and has found evidence that the virus was created by two separate organisations. The hard forensic evidence supports the reported claims of intelligence sources that it was a joint, two step operation.

“It was most likely developed by a Western power, and they most likely provided it to a secondary power which completed the effort,” he told The Daily Telegraph.

The malicious software, first detected in June last year, was almost certainly designed to make damaging, surreptitious adjustments to the centrifuges used at Natanz, Iran’s uranium enrichment site. While he downplayed its impact, the Iranian President Mahmoud Ahmadinejad has confirmed Stuxnet set back his nuclear ambitions.

Separate investigations by US nuclear experts have discovered that Stuxnet worked by increasing the speed of uranium centrifuges to breaking point for short periods. At the same time it shut off safety monitoring systems, hoodwinking operators that all was normal.

Mr Parker found that this part of the attack must have been conceived by “some very talented individuals”, and the other by a less talented, or more rushed, group of developers.

The element written by the first group, which was activated after Stuxnet reached its target and is known as the “payload”, is very complex, well designed and effective, according to Mr Parker’s analysis. He believes this is evidence of the involvment of a major Western power or powers – potentially including Britain – because they have both the scarce cyber expertise, and access to the tightly-regulated nuclear equipment necessary to test the virus.

In contrast, the way Stuxnet was distributed and its “command and control” features, which allow it to be remotely altered, include many errors and are poorly protected from surveillance.

“It’s a bit like spending billions on a space shuttle and then launching it using the remote control from a £15 toy car,” said Mr Parker.

His criticisms of Stuxnet’s distribution mechanism, presented this week at the Black Hat computer security conference in Washington DC, are supported by other experts, including Nate Lawson, a computer encryption consultant.

“Either the authors did not care if the payload was discovered by the general public, they weren’t aware of these techniques, or they had other limitations, such as time,” said Mr Lawson.

However, the apparently cheap wrapping of an expensive package points to Israel as the distributing power, said Mr Parker.

Each of the two stages of the Stuxnet operation demanded different resources to succeed. Stuxnet’s distributors may not have had the elite software engineering abilities of those responsible for the payload, but according to President Ahmadinejad, they hit their target.

Ensuring the virus reached Natanz would have required secret cooperation inside the Iranian nuclear programme, a field of state espionage in which Israel’s Mossad agency is acknowledged as unrivalled. Last week Iran claimed to have destroyed a network of 10 spies “linked to the Zionist regime”, a sign, at least, of the threat the regime feels from Israeli spies.

Furthermore, Mr Parker’s finding that two apparently discrete clandestine teams, each with different resources, were responsible for Stuxnet is consistent with a report in the New York Times last week, which cited unnamed intelligence officials who said the virus was created using American knowledge of the relevant equipment and completed by Israel.

Professor Peter Sommer, a computer forensics expert the London School of Economics and Political Science, said the Stuxnet attack’s complexity in both the digital and physical realms was very impressive. However, he added that the virus itself heralds only an evolutionary stage in the cyber security threats nations that will face in future.

“We should see this as another type of tool in statecraft,” Professor Sommer, who advises the OECD on cyber security, said.

Mr Parker agreed. “If you think Stuxnet is revolutionary then you slept through the revolution,” he said.”

“Japan earthquake: Insurers hit by claim fears
14 March 2011
Insurance company shares around the world have been hit as concerns grow about the cost of reconstruction in Japan following Friday’s earthquake and the resulting tsunami.

Initial estimates suggest the damage could cost the insurance industry up to $35bn (£22bn).

In Frankfurt, Munich Re fell 3.4% while Allianz lost 2.9%. In London, Aviva fell 3.1% and in Paris, Axa lost 3.3%.

Analysts say the disaster could trigger higher insurance prices in the future.

Global insurance companies had already taken a hit from the disaster on Friday.

Varying estimates

Experts said it was difficult to forecast accurately the final bill from the earthquake and tsunami.

The uncertainties about the extent of the damage and level of claims mean analysts’ estimates about the cost to the insurance industry vary widely.

Risk modelling agency AIR Worldwide put the bill at between $15bn and $35bn, while James Shuck from Jeffries International estimated a loss to the sector of between $10bn and $20bn.

“Given the nature of the destruction, combined with the ongoing recovery efforts and evacuation areas, it will take some time to estimate the damage,” said reinsurance giant Swiss Re.

However, any further damage caused by explosions at nuclear plants was unlikely to hit insurers, it added.

“Generally, coverage for nuclear facilities in Japan excludes earthquake shock, fire following earthquake and tsunami, both in terms of physical damage and liability,” it said.

“Coverage for property policies excludes nuclear contamination.”

Munich Re said the impact of a nuclear accident would “not significantly affect the private insurance industry”.

A series of explosions at the Fukushima Daiichi plant has raised concerns about a possible meltdown at one of its three reactors.”

“Redwall works with a variety of trusted partners who to provide 8(a) certified contracting and sales, collaborate on development projects, ensure product compatibility, and offer sales and support services for Redwall Technologies products1. The companies below represent the best in their industries, and Redwall is immensely proud to work alongside them and support them. … Defense agencies may wish to take advantage of Redwall’s cooperative research and development agreement (CRADA) with United States Special Operations Command (SOCOM). … Interested in partnering? Redwall frequently partners with both defense primes and other small businesses. Redwall Technologies, the leading ISV for multi-modal endpoint device security, today announced that it has been awarded a Phase I contract by the United States Marine Corps to participate in a SBIR program aimed at securing communications and data across a multitude of operating systems used by Marine Corps Systems Command (MARCORSYSCOM). Four vendors were competitively selected to receive Phase I awards under SBIR Topic N175-105, “Data Integrity and Confidentiality Resilient Operating System Environment for Multi-Level Security.”

“Enhanced security SCADA systems and methods
US 9298917 B2
ABSTRACT
A system and method for a secure supervisory control and data acquisition (SCADA) system. Secure SCADA elements (SSEs) have individual system security monitoring and enforcement of policies throughout the SCADA system. And isolation core ensures that a system security monitor monitors and takes appropriate action with respect to untrusted applications that may impact an SSE. The system security server provides policy enforcement on all of the SSEs that exist on the system. New security policies are created that are populated to individual SSEs in the system. Biomorphing algorithms allow for system uniqueness to be derived over time further enhancing security of SSEs.

Publication number: US9298917 B2
Publication type: Grant
Application number: US 13/350,599
Publication date: Mar 29, 2016
Filing date: Jan 13, 2012
Priority date: Sep 27, 2011
Also published as: US20130081103, WO2013049299A1
Inventors: Eric Ridvan Uner, 4 More »
Original Assignee: Redwall Technologies, Llc
Export Citation: BiBTeX, EndNote, RefMan
Patent Citations (27), Classifications (4), Legal Events (3)
External Links: USPTO, USPTO Assignment, Espacenet”

“Real-time interactive wagering on event outcomes
US 8512129 B2
ABSTRACT
Systems and methods for real-time interactive wagering on event outcomes are presented. Clients are first qualified and given wagering limits before being allowed to interactively wager on event outcomes. Event outcomes may be based on, for example, financial markets and indices, sporting and entertainment events, casino performances, and natural phenomena such as weather and earthquakes. Events on which wagers can be placed include both those with known and unknown outcome probabilities, and wagers can be a fixed-odds type or a spread-bet type. Wager transactions, including acceptances and confirmations, are executed in real time. Clients can customize displays of events on which they are authorized to wager. Real-time client credit management, automatic dealer hedging, automatic price-spread adjustments, and automatic client and dealer defined wagering limits are also provided.

Publication number: US8512129 B2
Publication type: Grant
Application number: US 09/846,025
Publication date: Aug 20, 2013
Filing date: Apr 30, 2001
Priority date: May 1, 2000
Fee status: Paid
Also published as: CA2407679A1, 17 More »
Inventors: Philip M Ginsberg, Andrew C Gilbert, Howard W Lutnick, Lewis Findlay
Original Assignee: Cfph, Llc
Export Citation: BiBTeX, EndNote, RefMan
Patent Citations (181), Non-Patent Citations (83), Referenced by (5),Classifications (16), Legal Events (3)”

“Distribution of cash deposits and withdrawals in multi-style managed client investment accounts
US 7822667 B1
ABSTRACT
An investment account is managed having associated assets, including shares of different securities, transacted in accordance with a plurality of different investment styles. A cash deposit into such a multi-style investment account and a request for a cash withdrawal from the multi-style investment account are handled differently but efficiently across the different investment styles in the investment account. When cash is deposited into the investment account, the cash deposit is placed into a temporary “cash bucket” in the investment account common across different investment styles. The cash is then distributed individual “cash buckets” each associated with an investment style in the investment account in accordance with a selected cash deposit allocation. When cash is to be withdrawn from the investment account, the cash amounting to the requested amount from individual “cash buckets” each associated with an investment style in the investment account is withdrawn in accordance with a selected cash withdrawal allocation. As a result, the cash can be deposited into the investment account or withdrawn from the investment account with proper allocation across different investment styles.

Publication number: US7822667 B1
Publication type: Grant
Application number: US 10/372,709
Publication date: Oct 26, 2010
Filing date: Feb 25, 2003
Priority date: Feb 25, 2003
Fee status: Paid
Inventors: Charles Raymond Smith, III, 6 More »
Original Assignee: Checkfree Corporation
Export Citation: BiBTeX, EndNote, RefMan
Patent Citations (70), Non-Patent Citations (79), Referenced by (8),Classifications (9), Legal Events (3)
External Links: USPTO, USPTO Assignment, Espacenet”

“Method for efficient management of certificate revocation lists and update information
US 5699431 A
ABSTRACT
A method which allows implementation of the revocation of public-key certificates facilitates engineering of certificate revocation lists (CRLs). It solves the practical problem of CRLs potentially growing to unmanageable lengths by allowing CRLs to be segmented, based on size considerations or priority considerations related to revocation reasons. The method is used to distribute CRL information to users of certificate-based public-key systems. It is also applied more generally to update any field in a certificate by reference to a secondary source of authenticated information.

Publication number: US5699431 A:
Publication type: Grant
Application number: US 08/556,360:
Publication date: Dec 16, 1997:
Filing date: Nov 13, 1995
Priority date: Nov 13, 1995
Fee status: Paid
Inventors: Paul C. Van Oorschot, Warwick S. Ford, Stephen W. Hillier, Josanne Otway
Original Assignee: Northern Telecom Limited
Export Citation: BiBTeX, EndNote, RefMan
Patent Citations (9), Non-Patent Citations (8), Referenced by (194), Classifications (5), Legal Events (11)
External Links: USPTO, USPTO Assignment, Espacenet”

“Jun 21, 2010 Fiserv Granted U.S. Patent for its Unified Managed Account Solution
Managed Accounts industry leader receives its first ever UMA patent for post cash-drift determination technology
Brookfield, Wis., June 21, 2010 – Fiserv, Inc. (NASDAQ: FISV), the leading global provider of financial services technology solutions and the Money Management Institute’s2010 Service Provider of the year, today announced that Fiserv has been granted a patent for its Unified Managed Account (UMA) solution by the United States Patent and Trademark Office. The patent, the first ever for the Fiserv UMA solution, was awarded for the company’s technological method created for transferring cash between styles in a UMA account after a cash drift is determined. More generally, the patent is focused on the inter-sleeve cash transfer that resolves cash drift within a Multi-Strategy Portfolio (MSP) account. The patent marks yet another milestone for Fiserv, the leader in unified managed account technology with more than 380,000 accounts under management and more than one million UMA sleeves.

An overlay model in a managed account has target allocations for multiple investment styles. Such an overlay model enables cumulative asset allocations across investment styles where each style has allocation weighting for assets including cash. The patent covers the method of determining cash drift for each style and for flowing cash amongst the styles within each account to bring each style back to its target cash allocation. The patent protects this method as proprietary to Fiserv and enables the UMA to support a very efficient process to distribute cash among UMA sleeves. The patent, number 7,729,969, was issued on June 1.

“As the leader in investment technology, we are committed to innovation in the managed accounts industry that drives the industry forward,” said Cheryl Nash, senior vice president of Strategic Marketing and Business Development at Fiserv. “Our team worked hard to make this technology a reality for our clients, and I thank them for bringing these capabilities to life.”

In addition to its first-in-class UMA technology, the APLSM platform from Fiserv continues to be a leader in investment technology, with more than 3.4 million portfolios managed and over 1 million UMA sleeves traded on the platform.

About Fiserv
Fiserv, Inc. (NASDAQ: FISV) is the leading global provider of information management and electronic commerce systems for the financial services industry, driving innovation that transforms experiences for financial institutions and their customers. Fiserv is ranked No. 1 on the FinTech 100 survey of top technology partners to the financial services industry. For more information, visit www.fiserv.com.

Media Relations:
Jeffrey Zack
RF Binder
Senior Managing Director
212-994-7504
jeff.zack@rfbinder.com

Additional Fiserv Contact:
Julie Nixon
Public Relations Manager
Financial Institution Services
Fiserv, Inc.
678-375-3744
julie.nixon@fiserv.com”

“Overview of unified managed accounts UMA
With unified managed accounts (UMA), investment advisors are able to manage a diversified portfolio from one single account. UMA’s also provide enhanced tax management.

UMA’s can be divided into several sub-accounts that are called “sleeves”. Each sleeve can be assigned to a model, which is often managed by a specific portfolio manager. A sleeve is generally based on a common characteristic such as the asset allocation, the financial instrument, the region or the currency. It is possible to create automatically a sleeve based on the asset class provided in the investment objective or manually, to reflect a specific investment strategy.

Summary of the Sleeves manager

A sleeve is the sub-account of a unified managed account (UMA) that can be created automatically or manually. The user relies on Croesus’ Sleeves manager to manage all UMA’s. It is with the help of this tool that he can define the sleeves, add, modify or remove them. The user can set a target, assign a model to the sleeve or move securities from one sleeve to another.”

“The White House travel office controversy, sometimes referred to as Travelgate,[1][2] was the first major ethics controversy of the Clinton administration. It began in May 1993, when seven employees of the White House Travel Office were fired. This action was unusual because although theoretically staff employees serve at the pleasure of the President and could be dismissed without cause, in practice, such employees usually remain in their posts for many years.

The White House stated the firings were done because financial improprieties in the Travel Office operation during previous administrations had been revealed by an FBI investigation. Critics contended the firings were done to allow friends of President Bill Clinton and First Lady Hillary Rodham Clinton to take over the travel business and that the involvement of the FBI was unwarranted. Heavy media attention forced the White House to reinstate most of the employees in other jobs and remove the Clinton associates from the travel role.

Further investigations by the FBI and the Department of Justice, the White House itself, the General Accounting Office, the House Government Reform and Oversight Committee, and the Whitewater Independent Counsel all took place over the subsequent years. Travel Office Director Billy Dale was charged with embezzlement but found not guilty in 1995. In 1998, Independent Counsel Kenneth Starr exonerated Bill Clinton of any involvement in the matter.

Hillary Clinton gradually came under scrutiny for allegedly having played a central role in the firings and making false statements about her involvement therein. In 2000, Independent Counsel Robert Ray issued his final report on Travelgate. He sought no charges against her, saying that while some of Clinton’s statements were factually false, there was insufficient evidence that these statements were either knowingly false or that she understood that her statements led to the firings.”

“UK’s Crime Squad picks face-recognition tech
December 3, 2001 Posted: 9:07 a.m. EST (1407 GMT)
LONDON, England (IDG) — Imagis Technologies Inc. and Serco Group PLC are working with the UK’s National Crime Squad (NCS) to develop a facial-recognition application for use in crime fighting.

The squad is working on a national database based on Imagis ID-2000 facial-recognition technology to use as a tool for keeping track of convicted pedophiles and other criminals, Imagis announced at the Biometrics 2001 Conference here on Thursday.

“We are working with both Imagis and Serco on the technology,” an NCS spokesman confirmed.

UK-based Serco is a management and consulting company that has been providing IT support to the U.K. government and the NCS, a government agency, for a number of years. The Canadian Imagis Technologies is a developer of image-identification software with a focus on biometric facial recognition, according to the company’s Web site.

Financial terms of the deal were not disclosed.

The Imagis’ ID-2000 was picked for further development by the UK government for its ability to identify an individual within very large databases of images in seconds, its ability to search for common background scenes as well as faces, its use imagery from any source, including live video as well as digital and analog photos and the security built into the program that allows for the secure transmission of data even from remote databases, Imagis said in a statement that was vetted and approved by the NCS.

The software will aid law-enforcement agencies in identifying victims and perpetrators as well as background imagery for criminal investigation and case preparation, Imagis said.

Already being used by the NCS, the facial-recognition technology is playing a part in the ongoing investigation into an online pedophile group which on Wednesday led to the arrest of 130 people worldwide, 10 in the UK, Imagis said.

The software is also being looked into as a tool for the fight against international terrorism, an NCS spokesman said.

In October, a U.S. Senate subcommittee began looking into the possible future use of cutting-edge devices such as facial-recognition monitors and retinal scanners as a way to combat terrorism following the attacks in New York and Washington D.C. on September 11.

The Imagis ID-2000 facial-recognition technology is also currently being used by the Oakland Police Department (OPD), in Oakland, California throughout Alameda County, including the Oakland International Airport, the OPD and Imagis announced in October.”

“IMAGIS SIGNS LICENSE AGREEMENT WITH ZIXSYS INC., A SUBSIDIARY OF SANYO SEMICONDUCTOR COMPANY
Zixsys launches ID Controller, a multi-layered biometric access control unit
using Imagis’ facial recognition technology

Vancouver, Canada; Tokyo, Japan; May 21, 2002 – Imagis Technologies Inc. (“Imagis”) (OTCBB: IGSTF; TSX: NAB; Germany: IGY) today announced that further to its press release of March 12, 2002, it has entered into a license agreement with Zixsys Inc. (“Zixsys”), a subsidiary of SANYO Semiconductor Company (“Sanyo”). Under the license agreement, Imagis has granted a worldwide, non-exclusive license to Zixsys to use Imagis’ ID-2000 advanced biometric facial recognition software to design, manufacture and market highly secure products for access control, public protection in and around airports, passenger identification and employee identification.

“The agreement between Imagis and Zixsys is the beginning of a new era of biometric products that we believe will lead the market by addressing the security needs of various industries,” said Iain Drummond, President and CEO of Imagis. “Zixsys’ first product utilizing Imagis biometrics is ID Controller, which provides multi-layered security in the form of facial recognition and fingerprint biometrics, plus added compression and encryption of data.”

The granting of the license is the first formal step in the establishment of a relationship between Zixsys and Imagis. In its March 12, 2002 news release, Imagis announced that it was forming Zixsys (at the time named SecurityART) along with six affiliates of Sanyo Semiconductor Company, one of the five principal companies of Sanyo Electric Co. Ltd. Imagis intends to complete its investment in and become a shareholder of Zixsys within the next three months.

In consideration for licensing the Imagis software, Zixsys has agreed to pay Imagis a licensing fee and certain royalties based upon the level of sales generated. The license agreement has a 10-year term.

ID Controller integrates Imagis facial recognition software, ID-2000, Sanyo’s CCD camera with fingerprint sensor technology, and Intacta.Code compression and encoding technology, developed by Intacta Technologies Inc. ID Controller confirms an identity by reading the fingerprint and facial details encoded on an individual’s ID card, and comparing them against the actual finger and face of the person who submitted the card, as read by a fingerprint reader and camera built into the access control unit. The hardware and software product, which is completely customizable, is used to safeguard environments where access control security is of utmost importance, such as airports, hotels, government buildings, large event venues, and industrial and office facilities.

About Imagis Technologies Inc.

Imagis (OTCBB: IGSTF; TSX: NAB; Germany: IGY) is a developer and marketer of software applications and advanced biometric facial recognition software solutions both as products and as a Software Development Kit. These applications provide a range of security solutions in various industry sectors including airports, law enforcement, customs, immigration and other government agencies, and gaming. Imagis currently has well over a hundred installations of its software in the United States, UK, Canada, and Mexico. Imagis Chairman is Oliver “Buck” Revell, who served for over 30 years in the FBI, and during his career advanced to the number two-career post of Associate Deputy Director. Visit our website at http://www.imagistechnologies.com.”

“Oliver ‘Buck’ Revell is the FBI‘s former Assistant Director who spent 30 years working his way up to the highest rank in career government service. Upon Buck Revell’s retirement in 1994, he founded Revell Group International (RGI), a global network of former senior FBI, security service, intelligence, diplomatic, law enforcement and military officials with a broad range of international business and technical experience.[1]Revell graduated from East Tennessee State University and got his Masters from Temple University in Public Administration. He served four years in the Marines as an aviator and left as a Captain.[2] ….

Buck Revell began his career in the FBI in November 1964. He recently published a book entitled G-Man’s Journal to chronicle his experiences in the FBI from the Kennedy assassination to the 1995 Oklahoma City bombing from an insider’s point of view. Revell served in the Kansas City, Philadelphia and Tampa Divisions of the FBI and at FBI Headquarters (FBIHQ) in the Organized Crime Section, the Inspection Division and the Office of Planning and Evaluation. In January 1975, Revell was promoted to Assistant Special Agent in charge of the Chicago Division, and later as Acting Special Agent in Charge. In October 1976, Revell was promoted to Senior Executive Service (SES) rank and designated Inspector and Executive Assistant to the Associate Director at FBIHQ. In November 1977, he was designated Special Agent in Charge of the Oklahoma Division. In August 1979, Revell was designated Deputy Assistant Director, Criminal Investigative Division, FBIHQ, where he directed the FBI’s programs in Organized Crime, White Collar Crime, Official Corruption and Undercover Operations. In June 1980, he was promoted to Assistant Director and placed in charge of the Criminal Investigative Division, making him responsible for the criminal investigative and counter-terrorism programs and operations of the FBI.

In January 1981, Assistant Director Revell was placed in charge of the Administrative Services Division where he was responsible for Personnel, Budget, Finance and Physical and Personnel Security Operations of the FBI. In May 1982, Revell was again placed in charge of the Criminal Investigative Division and given the additional responsibility of planning and implementing the FBI’s newly acquired drug enforcement jurisdiction. In July 1985, Revell was promoted to Executive Assistant Director – Investigations (SES-6) the highest rank in career government service. He served as the Director’s deputy in charge of Criminal Investigative, Counter-Terrorism and Counter-Intelligence activities. He was also responsible for international investigative and liaison activities of the Bureau, including its Legal Attaché and INTERPOL operations.[3]

Senior positions

In July 1989, his title was changed to Associate Deputy Director – Investigations and oversight of the Training and Laboratory Divisions of the FBI were added to his responsibilities. As a member (1982-1991) of the President’s Council on Integrity and Efficiency, he was Chairman of the Council’s Committee on Integrity and Law Enforcement. He served on the Attorney General’s Economic Crime Council and as Chairman, INTERPOL Conference on International Financial Crime in Cannes. He was a member of the National Foreign Intelligence Board, the Terrorist Crisis Management Committee and the Group on Narcotics. He served as Vice Chairman of the Interagency Group/Counterintelligence. In 1985, he was a member of the Senior Review Group of the Vice President’s Task Force on Terrorism. He served as a U.S. delegate to the United Nations International Conference on Drug Abuse and Illicit Trafficking in Vienna.

Revell was a member of the Senior Policy Group of the Vice President’s Task Force on Border Control Issues in 1988; he also served as an Adviser to the President’s Commission on Aviation Security and Terrorism which was established in 1989 “to investigate the events surrounding the destruction of Pan Am Flight 103“. He was a member of “The Executive Session on Policing”, Kennedy School of Government, Harvard University, 1987-1991.

Lockerbie bombing

Disaster warning

On 21 December 1988, shortly before Pan Am Flight 103 took off from London’s Heathrow airport at 18:25 hours, FBI Assistant Director Oliver “Buck” Revell reportedly rushed out onto the tarmac and pulled his son and daughter-in-law off the plane. The Lockerbie bombing was not the first time authorities were warned of an impending terrorist attack. The situation would repeat itself five years later in New York City, and seven years later in Oklahoma. It was an all too eerie coincidence.

Typically, U.S. authorities disingenuously denied receiving any warnings, as they would later do in New York and Oklahoma. Yet, as in those cases, evidence of prior knowledge would eventually become known. “It subsequently came to me on further inquiries that they hadn’t ignored [the warnings],” said a Pan Am security officer. “A number of VIPs were pulled off that plane. A number of intelligence operatives were pulled off that plane.”

Due to the warnings posted in U.S. embassies by the State Department (but not forwarded to Pan Am), many government employees avoided the flight. In fact, the Boeing 747 jumbo jet was only two-thirds full that busy holiday evening. South African president P W Botha and several high-ranking officials were advised by state security forces to change their reservations at the last hour. The South African State Security forces have a close relationship with the CIA.

Just as they would do in Oklahoma, government officials promised a complete and thorough investigation. Stated Oliver “Buck” Revell, who headed up the Bureau’s Lockerbie investigation:

“All of us working on the case made it a very, very personal priority of the first order.”

Fronting for the CIA, Vincent Cannistraro chimed in:

“I had personal friends on that plane who died. And I assure you that I wanted to find the perpetrators of that disaster as much as anyone wanted to.”

As in Oklahoma City, this would become the catch-all phrase that would set everything right and prove the government had no involvement. Of course, this would be somewhat difficult in Revell’s case, since he pulled his son and daughter-in-law off the plane minutes before it took off. (This was suspiciously reminiscent of the ATF agents who were paged not to come into work on April 19.)

Interestingly, Revell was the FBI’s lead investigator in the crash of an Arrow Air DC-8 which exploded on 12 December 1985 in Gander, Newfoundland, with the loss of all 248 personnel. As in Oklahoma City, that site was quickly bulldozed, destroying crucial forensic evidence, with an Army official maintaining a watchful eye at all times. Hiding behind the cover-up was the same cast of characters — Oliver North, Duane Clarridge, and Vince Cannistraro — who was North’s deputy at the NSC during Iran-Contra, and would later appear in Lockerbie. The same cast of characters that lurked behind the scandals in Nicaragua and Iran, and would appear like ghostly apparitions in the smoldering ruins of Oklahoma City.

It was also an act that the U.S. Shadow Government, responsible for precipitating, was anxious to cover up. Had the true cause of the crash — North’s double-dealing with the Iranians — been revealed, the Iran-Contra scandal would have surfaced two years before it did.

Oliver “Buck” Revell would be on hand to make sure it didn’t.

Three years later, in Lockerbie, the government was still claiming its hands were clean. Yet it vigorously protested Pan Am’s attempts to subpoena warning memos and other documents that would have revealed the government’s foreknowledge, just as it did in Oklahoma.

Simply stated, the attack on Pan Am 103 was in retaliation for the downing of the Iranian airbus.[4]

“Nevada Gaming Commission OKs record $5.5 million fine against CG Technology
By CHRIS SIEROTY LAS VEGAS REVIEW-JOURNAL
January 23, 2014 – 6:44 pm
The Nevada Gaming Commission on Thursday unanimously approved a record $5.5 million fine levied against the race and sports book subsidiary of Cantor Fitzgerald L.P. related to illegal bets by a top executive.

“Today is a bad day,” Commissioner Tony Alamo said. “This is an enormously large sum of money. This is a revenue get. That’s not our goal. Our goal is to punish” those who violate state gaming regulations.

Alamo credited CG Technology’s CEO Lee Amaitis for attending the hearing but cautioned him that this incident was national news and “gave Nevada a black eye.” Alamo said he wouldn’t want to see CG Technology come before the commission for a similar incident in the future.

“I am not afraid of revocation” of a company’s license,” Alamo said.

Chairman Peter Bernhard said he was initially reluctant to support the stipulation because of the damage done to the industry by the company. But Bernhard eventually supported it because it is the largest fine ever against a gaming company. He said the $5.5 million fine sends a message that “people will be held accountable.”

The three-member Nevada Gaming Control Board could have also recommended revoking or suspending CG Technology’s license.

Amaitis attended the hearing but did not address the commission. He also declined to comment on the commission’s decision following the 20-minute hearing.

The Gaming Control Board’s 18-count compliant outlining the charges against CG Technology, formerly Cantor Gaming, was made public Jan. 8. The settlement was released Jan. 13.

In the complaint, regulators said CG Technology failed to prevent Michael Colbert from operating an illegal sports betting ring that made an estimated $34 million in bets. Colbert, formerly risk management director and vice president of the former Cantor Gaming in Las Vegas, worked with three men who worked as messengers to place wagers for Gadoon Kyrollos, a high-level sports bettor.

Paul Sexton, Robert Drexler and Thomas Ludford acted as messenger bettors, according to the complaint. Sexton pleaded guilty to fourth-degree money-laundering and forfeited $600,000.

In 2013, Colbert pleaded guilty in federal court in New York to one felony count of conspiracy for his role in the betting ring. He awaits sentencing.

The settlement says CG Technology admitted guilt in 14 counts of the complaint and concurred that the board could prove one count directly relating to Colbert’s oversight of the illegal wagering operation. The company did not admit or deny allegations in three other counts.

Both Amaitis and Cantor Fitzgerald Chairman Howard Lutnick signed off on the settlement.

Before the CG Technology fine, the largest fine ever approved by Nevada gaming regulators was $5 million in 2003 against MGM Mirage, now MGM Resorts International. The company was fined for failing to file 15,000 currency transaction reports with the Internal Revenue Service.

Owners of the Stardust paid a $3 million fine in 1984 to settle a complaint over allegations that the now-imploded Strip casino’s former owner failed to prevent mob-related skimming of gaming revenue.

In 1988, Ralph Engelstad, late owner of the Imperial Palace, was accused of damaging the state’s reputation for holding two Adolf Hitler birthday parties at the casino in separate years. He paid a $1.5 million fine.

The Palms paid a $1 million fine in 2013 to settle a complaint resulting from an investigation that discovered drug sales and prostitution at clubs on the property.

Cantor Fitzgerald, founded in 1945, is one of the largest private financial services firms on Wall Street. Lutnick has led the company’s expansion over the past decade into investment banking, commercial real estate and gaming.

CG Technology operates race and sports books at the M Resort, Hard Rock Hotel, Tropicana Las Vegas, The Cosmopolitan of Las Vegas, The Venetian, Palms and Silverton, and provides information as Las Vegas Sports Consultants and offers mobile wagering.

The bookmaker also has operations in China and the Bahamas.”

“8(a) Business Development Program[edit] The 8(a) Business Development Program assists in the development of small businesses owned and operated by individuals who are socially and economically disadvantaged, such as women and minorities. The following ethnic groups are classified as eligible: Black Americans; Hispanic Americans; Native Americans (American Indians, Eskimos, Aleuts, or Native Hawaiians); Asian Pacific Americans (persons with origins from Burma, Thailand, Malaysia, Indonesia, Singapore, Brunei, Japan, China (including Hong Kong), Taiwan, Laos, Cambodia (Kampuchea), Vietnam, Korea, The Philippines, U.S. Trust Territory of the Pacific Islands (Republic of Palau), Republic of the Marshall Islands, Federated States of Micronesia, the Commonwealth of the Northern Mariana Islands, Guam, Samoa, Macao, Fiji, Tonga, Kiribati, Tuvalu, or Nauru); Subcontinent Asian Americans (persons with origins from India, Pakistan, Bangladesh, Sri Lanka, Bhutan, the Maldives Islands or Nepal). In 2011, the SBA, along with the FBI and the IRS, uncovered a massive scheme to defraud this program. Civilian employees of the U.S. Army Corps of Engineers, working in concert with an employee of Alaska Native Corporation Eyak Technology LLC allegedly submitted fraudulent bills to the program, totaling over 20 million dollars, and kept the money for their own use.[28]”

“Nortel Government Solutions, in collaboration with the Department of Justice (DOJ), built the Joint Automated Booking System (JABS) — a centralized system for automating the collection of fingerprint, photographic and biographic data, submitting this data to the FBI, and sharing it with participating law enforcement agencies nationwide.”

“The White House travel office controversy, sometimes referred to as Travelgate,[1][2] was the first major ethics controversy of the Clinton administration. It began in May 1993, when seven employees of the White House Travel Office were fired. This action was unusual because although theoretically staff employees serve at the pleasure of the President and could be dismissed without cause, in practice, such employees usually remain in their posts for many years.

The White House stated the firings were done because financial improprieties in the Travel Office operation during previous administrations had been revealed by an FBI investigation. Critics contended the firings were done to allow friends of President Bill Clinton and First Lady Hillary Rodham Clinton to take over the travel business and that the involvement of the FBI was unwarranted. Heavy media attention forced the White House to reinstate most of the employees in other jobs and remove the Clinton associates from the travel role.

Further investigations by the FBI and the Department of Justice, the White House itself, the General Accounting Office, the House Government Reform and Oversight Committee, and the Whitewater Independent Counsel all took place over the subsequent years. Travel Office Director Billy Dale was charged with embezzlement but found not guilty in 1995. In 1998, Independent Counsel Kenneth Starr exonerated Bill Clinton of any involvement in the matter.

Hillary Clinton gradually came under scrutiny for allegedly having played a central role in the firings and making false statements about her involvement therein. In 2000, Independent Counsel Robert Ray issued his final report on Travelgate. He sought no charges against her, saying that while some of Clinton’s statements were factually false, there was insufficient evidence that these statements were either knowingly false or that she understood that her statements led to the firings.”

“Virtual Command Center
Real-Time Tool to Securely Monitor Criminal Incidents and Major Events Online
July 3, 2012
Originally published in the July 2012 edition of the CJIS Link, Volume 14, Number 2
On April 18, federal and local officials in Clarksburg, West Virginia, announced the arrest of a major West Virginia synthetic drug supplier. Operation “Hot Stuff Cool Things” was a multi-agency operation of 70 agents that used a Virtual Command Center (VCC) on the Law Enforcement Online (LEO) network to share information about the ongoing case. Subsequently, the owner of the Clarksburg and Buckhannon stores Hot Stuff Cool Things and three other individuals were arrested on multiple federal drug charges by a task force that included the Drug Enforcement Administration, Internal Revenue Service, West Virginia State Police, U.S. Marshals Service, Clarksburg Police Department, Bridgeport Police Department, and the Harrison County Sheriff’s Office. During the raid, officers found over $750,000 in cash and bank deposits. The U.S. Attorney said that millions of dollars of bath salts (a synthetic drug commonly used as a cocaine substitute) had moved through the stores in the last year.

In the modern law enforcement environment, agencies need to share information, collaborate, and join forces to combat crime and terrorism. Often they need to post, track, and spread information across departments and jurisdictions in a quick, secure way for an investigation or for a major occurrence. To satisfy this need for safe, inclusive communication, the LEO Operations Unit created the VCC capability in 2002. The LEO VCC is a situational awareness and/or crisis management tool used to share information about street-level and tactical activities among law enforcement operations centers and command posts. Since its inception, the VCC has been used by numerous agencies for local, national, and international events ranging from major case management to global events like presidential inaugurations.

Because the VCC resides on LEO, it is extremely flexible and can be used or viewed from multiple geographic locations. This makes it feasible for federal, state, and local law enforcement agencies to create joint efforts in investigations and law enforcement actions. The VCC exists on a secure system for any designated audience members online, not just those physically present at an event or a “brick and mortar” command center. Through the VCC, law enforcement can effectively manage a tactical incident in real time, 24/7, with both operational and technical support. As the VCC receives and posts relevant information and intelligence, it provides a comprehensive account of an incident or event to designated law enforcement channels.

The VCC provides an events board feature that permits information posts as an event occurs and allows listing of data such as photographs, scanned documents, or any information that would be useful to managing an event or crisis. Agencies hosting the VCC can permit access to individual persons or entire agencies as needed. Even critical incident managers, such as emergency planners, can now have remote access to a crisis without having to be on-scene. Recent enhancements to the VCC capability include the ability to display incidents by specific dates or times, improved refresh rates on the screens, and improved critical real-time monitoring of operations.

The FBI and the law enforcement community as a whole have benefited from the increased ability to share vital information and collaborate—even over previously unmanageable locality impediments—by the creation of the VCC. In 2011, LEO members created over 300 new VCCs and opened over 700 VCC event boards to collect, record, and securely publish information. As an indication of its effectiveness and adaptability, the law enforcement community has used the VCC not only during kidnappings, shootings, and special investigations, but also during major events such as NASCAR races, Republican and Democratic National Conventions, a presidential inauguration, the Super Bowl, the Pro Bowl, the Academy Awards, and the Hurricane Katrina relief effort.”

“Duncan Duane Hunter (born December 7, 1976) is an American politician and member of the Republican Party from California who has represented San Diego County in the United States House of Representatives since 2009, representing California’s 50th congressional district. The district, numbered as the 52nd district from 2009 to 2013, covers almost all of San Diego County except for the coastal and border areas. It includes the cities of Escondido, San Marcos and Santee as well as Fallbrook, Lakeside and Valley Center and mountain and desert areas stretching to the Imperial County line.

The day after the September 11 attacks, Hunter quit his job and joined the United States Marine Corps. He attended Officer Candidates School at Marine Corps Base Quantico. Upon graduation in March 2002, he was commissioned as a second lieutenant. He subsequently served as a field artillery officer in the 1st Marine Division after the 2003 invasion of Iraq and completed a second tour in Fallujah, Iraq, in 2004, serving in Battery A, 1st Battalion, 11th Marines. During his second tour, he participated in Operation Vigilant Resolve.

In September 2005, Hunter was honorably discharged from active duty but remained in the Marine Corps Reserve. He then started a residential development company. In 2007, he was recalled to active duty and deployed to Afghanistan in support of the War in Afghanistan; this was his third tour of duty during the War on Terrorism. Hunter was honorably discharged from active duty in December 2007, but continues to serve in the Marine Corps Reserve.[9][10] Hunter was promoted to major in 2012.[11][12]

Following in the footsteps of his father, Hunter’s voting record has been decidedly conservative. He has a lifetime rating of 93 from the American Conservative Union. He is also a member of the Republican Study Committee,[32]a caucus of conservative House Republicans of which his father was a longtime member.[citation needed]

In a 2009 interview with KPBS, Hunter expressed support for “overriding” the designation of the delta smelt as an endangered species, saying that overriding it would reduce unemployment in California.[33]

He opposed the Health Care and Education Reconciliation Act of 2010, saying that it would “take away” the doctor-patient relationship and the right for people to choose “what type of operations they have”, and that it would allow a “government bureaucrat” to make health care decisions for people. In the KPBS interview, Hunter said, “Things that you have problems with now would be exacerbated if you had government-run healthcare.”[34]

At an April 2010 Tea Party movement rally in Ramona, California, Hunter advocated for the deportation of United States citizens who are the children of illegal immigrants.[35]

At the rally, Hunter said, “It’s a complex issue and … you could look and say, ‘You’re a mean guy. That’s a mean thing to do. That’s not a humanitarian thing to do’ … We simply cannot afford what we’re doing right now. We just can’t afford it. California’s going under.” He confirmed the comments to San Diego County’s North County Times, telling the newspaper that he supported House Resolution 1868, a measure that called for the elimination of birthright citizenship in the United States. He expressed support for the controversial 2010 Arizona immigration law, calling it a national security issue and “a fantastic starting point”.[36]

On July 24, 2013, Hunter voted against an amendment offered by Justin Amash to rein in warrantless domestic surveillance conducted by the NSA.[37]

In October 2013 Hunter was the only representative from San Diego County to vote against the bill ending the nation’s 16-day partial government shutdown, explaining that he voted against it because it did not reduce spending or the national debt.[38]

In February 2016, Hunter puffed on an electronic cigarette during a committee hearing, to dramatize his opposition to a proposed federal ban on such “vaping” on airplanes; however, his colleagues on the House Transportation and Infrastructure Committee approved the ban.[39]

At a town-hall-style meeting in March 2017, Hunter was confronted by protesters. Before the crowd, Hunter asserted that the American intelligence community was filled with “seditious Obama folks” who “hate Donald Trump as much as you (those at the meeting) do” and are trying to undermine the Trump administration. He also described the American government as “Orwellian”.[40]

Hunter voted in favor of the Tax Cuts and Jobs Act of 2017.[41] Hunter said that the plan is “good for most states” but “not as good” for California.[42]

891 Total Views 1 Views Today
Please follow and like us:
0