Kelly 199: Serco’s Bin Laden IM Patent; SACEUR Clinton Wagering With Pan Am LEO Buck, AD Letter of Marque

General John F. Kelly
White House Chief of Staff
Washington, D.C. 20528

Open letter from the Cloud Centric Crime Scene Investigators of Abel Danger

January 29, 2018

Dear General Kelly:

Please accept Brief 199 from Field McConnell – United States Marine Corps whistle-blower and Global Operations Director of Abel Danger (AD) – on Serco‘s CAI private-equity group investors who allegedly equipped various patentee SWAT teams with Virtual Command Centers (VCCs) embedded in the FBI’s Law Enforcement Online (LEO) network so they could use AOL/Tencent’s (BVI) Instant messaging [IM] system and method US 8566404 B2 to inject fake news of a Bin Laden group attack on 9/11 and support Real-time interactive wagering on event outcomes CA 2460367 A1 with precise times of deaths and body counts.

McConnell claims that Serco used Nortel’s Method for efficient management of certificate revocation lists and update information US 5699431 A to block the FBI’s investigation into the 9/11 attacks allegedly coordinated through patentee AOL or Tencent IM devices by the associates of 7th SACEUR, former MGM Mirage and AOL director, the late Gen. Alexander Haig; Hillary Clinton, former United States Senator from New York, and LEO founder and former Assistant FBI Director, Oliver “Buck” Revell who reportedly rushed out onto the tarmac and pulled his son and daughter-in-law off Pan Am Flight 103 shortly before it took off from London’s Heathrow airport at 18:25 hours on 21 December 1988 for a spot-fixed bombing over Lockerbie, Scotland at 19:02:50.

McConnell claims that General Haig equipped the Greek Life associates of Bill Clinton (Phi Beta Kappa) and Wilbur Ross (Kappa Beta Phi) with LEO Virtual Command Centers (VCCs) son they could bet on the outcome of the 9/11 attacks and,weeks later, could watch money ‘drift’ into their private accounts through Coordinated rebalancing by money manager portfolio management systems and a master overlay manager portfolio management system US 7729969 B1.

McConnell claims that Serco uses Revell’s Imagis face recognition s/w to track actors and victims through the federal bridge certification authority network and, in re the 9/11 attacks, remind government leaders that while Clinton insiders may write SWAT team scripts, Serco (formerly RCA GB 1929) and its investment bankers control special weapons through the United States Patent and Trademark Office and therefore control the country itself!

JABS* – The Joint Automated Booking System allegedly built by Nortel Government Solutions for a secret society (DoJ Pride?) in the U.S. Department of Justice so FBI or Interpol insiders can book felons and patentee SWAT teams into snuff-film events; control crime-scene investigations and, enrich Serco‘s private-equity investors including the late Alexander Haig.

Field McConnell invites you to convene a meeting with your cabinet colleagues and United States Marine Corps Major Duncan D. Hunter, Member of the U.S. House of Representatives from California’s 50th district, where McConnell can explain how Serco has embedded patentee SWAT teams into LEO and its predecessor networks to conceal insider messaging and wagering on times of victim deaths or body counts at such crime scenes as – to name just three – Pan Am 103 on 21 December 1988, New York and Washington DC on 9/11 and the London Underground on 7/7.

After meeting with Congressman Hunter and your cabinet colleagues, McConnell will be asking Congress to authorize President Trump to issue a Presidential letter of Marque and Reprisal, which would allow him (McConnell) to recruit and lead an Abel Danger Marine Expeditionary Unit of about 100 veteran Marines to seize and take the assets of any patentee SWAT teams in the custody of Serco‘s private-equity groups (privateers), or shareholders or investment banker, N M Rothschild & Sons Ltd.

After the said assets have been transferred to the lawful custody of the United States’ government, McConnell’s MEU will begin to subdue the secret societies identified as Phi Beta Kappa and Kappa Beta Phi (founded 1776) which, we allege, have been blackmailing and extorting presidents of the United States with patentee SWAT-team attacks starting no later than the arson of the U.S. Patent Office in the USA Post Office, Blodget’s Hotel, Washington, on December 15, 1836 and continuing through pre-scripted arson or bombing attacks to the present day.

Fawwaz communicated by instant messaging with bin Laden’s entourage in Afghanistan from an office in the Queen’s Park Estate, West London, just a few hundred yards from Jihadi John’s family home

9/11 Alexander Haig Had Inside Knowledge Of The World Trade Center Bombing

Trump saw on 9/11/2001: bombs were used in WTC

Tracked by Imagis – Sold to Interpol – Bought by Serco!

There are TWO Londons & Why it MATTERS

SERCO GROUP PLC: List of Subsidiaries AND Shareholders! [Note agents for Northern Trust and the Teachers (TIAA) Pension Fund would have met with agents of the government of Saudi Arabia on the 47th floor of WTC 1 on 9/11]

Yours sincerely,

Field McConnell
USMC 0116513
P O Box 39
Plum City WI 54761″

“Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”

“The Advice and Reform Committee or Advice and Reformation Committee (ARC) (Arabic: هيئة النصيحة والاصلاح‎) was the London office of what is now called al-Qaeda from 1994 until the arrest of Khalid al-Fawwaz in 1998.[1] The indictment[2] of Osama bin Laden, al-Fawwaz, and 19 others reads in partIn or about 1994, the defendant OSAMA BIN LADEN, working together with KHALID AL FAWWAZ, a/k/a “Khaled Abdul Rahman Hamad al Fawwaz,” a/k/a “Abu Omar,” a/k/a “Hamad,” set up a media information office in London, England (hereafter the “London office”), which was designed both to publicize the statements of OSAMA BIN LADEN and to provide a cover for activity in support of al Qaeda’s “military” activities, including the recruitment of military trainees, the disbursement of funds and the procurement of necessary equipment (including satellite telephones) and necessary services. In addition, the London office served as a conduit for messages, including reports on military and security matters from various al Qaeda cells, including the Kenyan cell, to al Qaeda’s headquarters.”

“Bin Laden’s London base
March 9, 2017
This is an edited extract from Secret Affairs: Britain’s Collusion with Radical Islam
by Mark Curtis
In July 1994, Osama Bin Laden established an office in London, called the Advice and Reformation Committee (ARC), which sought to promote worldwide opposition to the Saudi regime – an immediate response to the Saudis revoking his citizenship, according to a declassified CIA report. Run from a house in Wembley, north London, the ARC was equipped with a bank of fax machines and computers which churned out dozens of pamphlets and communiqués lambasting the lavishness of the House of Saud and its waywardness from promoting sharia law in the country, as well as calling for a break-up of the Saudi state. According to recent US court documents, the ARC was ‘designed both to publicise Bin Laden’s statements and to provide cover for activity in support for Al Qaeda’s “military” activities, including the recruitment of trainees, the disbursement of funds and the procurement of equipment and services.’ In addition, the London office served as a communication centre for reports on military, security and other matters from various al-Qaida cells to its leadership.

A US Congressional research service report, released just after the September 11th attacks in 2001, noted that Bin Laden even visited London in 1994 and stayed for a few months in Wembley to form the ARC. Other sources claim that he visited London in 1994 to meet members of the Algerian Armed Islamic Group (GIA), and even that he travelled regularly to London in 1995 and 1996 on his private jet. Whatever the truth of these claims, Bin Laden’s telephone billing records from 1996–8 show that nearly a fifth of his calls, 238 out of 1,100 – the largest single number – were made to London, showing the importance of this base. It was the ARC that arranged a meeting between Bin Laden and a number of CNN journalists in March 1997.

The ARC’s staff included two members of Ayman al-Zawahiri’s terrorist organisation, Egyptian Islamic Jihad (EIJ), Adel Abdel Bary and Ibrahim Eidarous, both of whom were later indicted in the US for involvement in the 1998 embassy bombings, when simultaneous explosions in Nairobi and Dar es Salaam killed over 200 people. Abdel Bary is alleged by the US to have managed al-Qaida training camps and guest houses before arriving in Britain, where he was granted asylum in 1993; two years later he was sentenced to death in absentia for his alleged involvement in the bombing of the Khan al-Khalili tourist landmark in Cairo. In May 1996 Abdel Bary is accused of being appointed by al-Zawahiri as leader of the London cell of the EIJ.

Eidarous is alleged to have begun organising the EIJ’s cell in Azerbaijan in August 1995 before coming to London in September 1997 to become the leader of its London base. While in Britain, where he was also granted political asylum, Eidarous is accused of maintaining satellite phone links with the al-Qaida leadership, and, with Abdel Bary, of providing forged passports for EIJ operatives in the Netherlands and Albania. On the day of the East Africa bombings, both disseminated the claims of responsibility through faxes to the media; lawyers for the two men deny that they had advance knowledge of the bombings but an MI5 officer, later giving evidence to an immigration appeal, stated that the faxes were actually sent before the bombings took place. The two men were detained by the Special Branch in September 1998 under the Prevention of Terrorism Act, on charges that they were associated with the 1998 bombings.

The head of Bin Laden’s ARC was the Saudi dissident Khaled al-Fawwaz, who was arrested by British police acting under a US extradition request in September 1998 for his alleged involvement in the East Africa bombings the previous month. Until this point the British authorities had allowed al-Fawwaz and the ARC to operate openly for four years. The US indictment against al-Fawwaz alleges that he provided Bin Laden with ‘various means of communications’, including a satellite telephone to speak to al-Qaida cells, and that he visited Nairobi in 1993 and established a residence there for Abu Ubaidah, one of al-Qaida’s military commanders. Al-Fawwaz has been held in Britain since 1998, and US attempts to have him extradited have been consistently blocked by the British courts after appeals by al-Fawwaz’s lawyers claiming his human rights would be breached in US prisons.

The evidence suggests that the ARC’s activities were initially tolerated by the British, who may have seen them as a useful source of intelligence. Al-Fawwaz’s lawyers have, for example, said that he was in regular contact with MI5 from the time he came to Britain in 1994 until his arrest four years later. His meetings often lasted for three or more hours while his phone was probably tapped and his correspondence intercepted. ‘Perhaps MI5 thought it was better to monitor al-Fawwaz … for intelligence,’ the Guardian has noted.

After the terrorist massacre of tourists in Luxor, Egypt in November 1997, Egypt’s President Mubarak blasted the British for hosting militants in London allegedly linked to this and other attacks, including Abdel Bary, and requested their extradition. It has been reported that the British government refused this request. However, it appears that the government did indeed seek to deport the militants, following a request from the Egyptians, but was hindered by Egypt’s rejecting a British request to ensure that they would get a fair trial and, if found guilty, would not be executed. Thus the deportation was prohibited by the European human rights convention, which forbids deportation of suspects who might be subject to torture or inhuman treatment.

Another Saudi dissident in London was Saad al-Faqih, a former professor of surgery at King Saud University who had lent his medical expertise to the anti-Soviet jihad in Afghanistan. Al-Faqih fled Saudi Arabia in 1994 and set up another opposition group to the regime, the Movement for Islamic Reform in Arabia (MIRA), in London in 1996 and was given political asylum. Al-Faqih has recently said that he maintains ‘high-level contacts’ with the British intelligence services and gives them advice about Saudi Arabia. In 2004, the US government designated al-Faqih as a provider of financial and material support to al-Qaida since the mid-1990s, and accused him of being in contact with Bin Laden. However, Al-Faqih has been living openly in Britain for well over a decade and has not once been questioned by the British authorities. His alleged involvement in terrorism has been questioned by several well-informed analysts, who point to the fact that no case has been brought against him, let alone proven, that MIRA is a legitimate opposition group to the Saudis and that his designation by the US as a terrorist is mainly about placating its Saudi client.

But the British may have seen the ARC and other Saudi groups as providing more than just intelligence. The American journalist Steve Coll, citing interviews with British officials, offers a reason why Britain was reluctant to crack down on the centres of opposition to Saudi Arabia: ‘It was an article of faith in Washington and London during the early 1990s that a little outside pressure, even if it came from Islamists, might help open up the Saudi kingdom to new voices, creating healthier and more stable politics in the long run.’ Coll’s notion that British and US planners wanted to use an Islamist lever to influence the Saudi internal agenda is certainly credible and consistent with past policies in the region. However, his notion that this aimed at ‘healthier’ (rather than simply pro-Western) politics is less credible: London and Washington were more likely to have seen internal reform as a way of consolidating the House of Saud’s rule.

Al-Faqih himself provides another explanation for the British government tolerating these groups. Asked in an interview in November 2003 about living in Britain, al-Faqih replied that the British ‘have discovered that betting on strategic relations with the [Saudi] regime is dangerous. It is better to have relations with the people and I assume they know how much public support we have.’ Al-Faqih also recently said that ‘the British are shrewd enough to know that the Saudi regime is doomed and they want to be in a position to deal with alternative leaders.’ Al-Faqih here exaggerates the support for MIRA in Saudi Arabia and it is nonsense to equate it with ‘the people’. Yet the point that Britain was attempting to cultivate relations with future policy-makers in the country by tolerating these opposition groups is certainly credible. While Britain has long shored up the feudal rulers of Saudi Arabia, the long-term stability of the regime has equally long been questioned. Again, opposition groups could act as a kind of proxy force for Whitehall; to a certain extent, therefore, Britain may have been trying to play both sides.

The London base allowed Bin Laden to motivate his supporters around the world. The perpetrators of the 1995 bomb attacks in Saudi Arabia had read Bin Laden’s writings after being faxed them from London. It was also London from that various of Bin Laden’s key fatwas were sent around the world. The ARC, for example, disseminated the English translation of Bin Laden’s August 1996 declaration of jihad against the Americans ‘occupying the Land of the Two Holy Places’, calling for the US to be driven from Saudi Arabia, the overthrow of the House of Saud and Islamic revolution all over the world. Two years later, in February 1998, the ARC publicised Bin Laden’s creation of an ‘International Front for Jihad against the Crusaders and the Jews’, joining together a variety of terrorist groups. However, ‘this caused little stir in Whitehall,’ Times journalists Sean O’Neill and Daniel McGrory note.

Also instructive is that the British and US intelligence services repeatedly turned down the chance to acquire information on Bin Laden and al-Qaida in the 1990s. In early 1995, for example, the Sudanese government, then hosting Bin Laden, offered to extradite or interview him and other key operatives who had been arrested on charges of planning terrorist atrocities. The Sudanese proferred photographs and details on various Arab–Afghans, including Saudis, Yemenis and Egyptians who had fought in Afghanistan against the Soviets. ‘We know them in detail,’ said one Sudanese source. ‘We know their leaders, how they implement their policies, how they plan for the future. We have tried to feed this information to American and British intelligence so they can learn how thing can be tackled.’ This Sudanese offer was rejected, reportedly due to the ‘irrational hatred’ the US felt for the Sudanese regime, as was a similar subsequent offer made specifically to MI6. Three years later, Britain was also to ignore an arrest warrant for Bin Laden issued by Libya, as we see in Chapter 13.

So safe did Bin Laden’s supporters feel in London that, in 1995, they sent overtures to the Home Office enquiring whether their leader could claim political asylum. The then home secretary, Michael Howard, later said that an investigation by his staff into Bin Laden resulted in a banning order being placed on him. In January 1996, the Home Office sent a letter to Bin Laden stating that he be ‘excluded from the United Kingdom on the grounds that your presence here would not be conducive to the public good.’ Presumably, giving asylum to Bin Laden would have been a step too far for the British in view of their need to be seen to be placating the Saudis.

The 1998 US embassy bombings were not the only terrorist outrages being planned by Bin Laden, or those close to him, during the period 1994–98. By late 1994, the CIA was designating Bin Laden as a terrorist threat, knowing that his inner circle were working closely with the Sudanese intelligence services which were, in turn, running terrorist and paramilitary operations in Egypt and elsewhere. In June 1995, an al-Qaida team attacked Egyptian President Mubarak’s presidential motorcade during a visit to the Ethiopian capital, Addis Ababa. In 1996 a secret CIA analysis showed that the US was aware of Bin Laden’s financing of Islamic extremists responsible for attempted bombings against one hundred US servicemen in Aden in December 1992, funneling money to Egyptian extremists to buy weapons and bankrolling ‘at least three terrorist training camps in northern Sudan’. After moving to Afghanistan in May 1996, Bin Laden set up terrorist training camps there under the protection of the Taliban. It beggars belief that British intelligence was also not aware of Bin Laden’s activities during the period when it tolerated his London base.

In contrast to Britain’s toleration of the ARC and MIRA, different treatment was meted out to the leader of another Saudi opposition group in London, Mohamed al-Masari, a refugee from Saudi Arabia who in 1994 established the Committee for the Defence of Legitimate Rights. By early 1995, the Saudi government was vigorously protesting to Whitehall about al-Masari’s attempts to subvert the Saudi regime, and threatening to cancel arms deals if the government failed to take action against him. Given the high stakes involved, in April and May 1995, Foreign Secretary Douglas Hurd and Prime Minister John Major gave speeches apparently directed at al-Masari saying that Islamic dissidents were ‘extremely unwelcome’ in London. The following December, Whitehall, prioritising arms exports to the Saudis, took the unprecedented step of ordering al-Masari’s expulsion, and attempted to dispatch him to wherever local authorities could be persuaded, settling on the Caribbean island of Dominica, to whom British aid was quadrupled as a sweetener. However, the British courts ruled that the expulsion would be illegal, the government having failed to show that al-Masari would not be in danger after his removal. According to former CIA officer, Robert Baer, the Saudis were behind at least two assassination attempts against al-Masari; it is not clear whether these were in Britain or elsewhere.

The Guardian interpreted the Major and Hurd speeches as a sign that the government’s stance towards Islamic dissidents was hardening, prompted by Arab governments pressing Britain to clamp down on them. Yet government action was largely limited to al-Masari, clearly to appease the Saudis, while until September 1998 other dissidents, like Bin Laden’s associates, were allowed to go about their business freely. They appeared to operate with the tacit consent of the British authorities, with the most likely reason being that, consistent with the historical record, they were seen as useful to the British.”

“Oliver ‘Buck’ Revell is the FBI‘s former Assistant Director who spent 30 years working his way up to the highest rank in career government service. Upon Buck Revell’s retirement in 1994, he founded Revell Group International (RGI), a global network of former senior FBI, security service, intelligence, diplomatic, law enforcement and military officials with a broad range of international business and technical experience.[1]Revell graduated from East Tennessee State University and got his Masters from Temple University in Public Administration. He served four years in the Marines as an aviator and left as a Captain.[2] ….

Buck Revell began his career in the FBI in November 1964. He recently published a book entitled G-Man’s Journal to chronicle his experiences in the FBI from the Kennedy assassination to the 1995 Oklahoma City bombing from an insider’s point of view. Revell served in the Kansas City, Philadelphia and Tampa Divisions of the FBI and at FBI Headquarters (FBIHQ) in the Organized Crime Section, the Inspection Division and the Office of Planning and Evaluation. In January 1975, Revell was promoted to Assistant Special Agent in charge of the Chicago Division, and later as Acting Special Agent in Charge. In October 1976, Revell was promoted to Senior Executive Service (SES) rank and designated Inspector and Executive Assistant to the Associate Director at FBIHQ. In November 1977, he was designated Special Agent in Charge of the Oklahoma Division. In August 1979, Revell was designated Deputy Assistant Director, Criminal Investigative Division, FBIHQ, where he directed the FBI’s programs in Organized Crime, White Collar Crime, Official Corruption and Undercover Operations. In June 1980, he was promoted to Assistant Director and placed in charge of the Criminal Investigative Division, making him responsible for the criminal investigative and counter-terrorism programs and operations of the FBI.

In January 1981, Assistant Director Revell was placed in charge of the Administrative Services Division where he was responsible for Personnel, Budget, Finance and Physical and Personnel Security Operations of the FBI. In May 1982, Revell was again placed in charge of the Criminal Investigative Division and given the additional responsibility of planning and implementing the FBI’s newly acquired drug enforcement jurisdiction. In July 1985, Revell was promoted to Executive Assistant Director – Investigations (SES-6) the highest rank in career government service. He served as the Director’s deputy in charge of Criminal Investigative, Counter-Terrorism and Counter-Intelligence activities. He was also responsible for international investigative and liaison activities of the Bureau, including its Legal Attaché and INTERPOL operations.[3]

Senior positions

In July 1989, his title was changed to Associate Deputy Director – Investigations and oversight of the Training and Laboratory Divisions of the FBI were added to his responsibilities. As a member (1982-1991) of the President’s Council on Integrity and Efficiency, he was Chairman of the Council’s Committee on Integrity and Law Enforcement. He served on the Attorney General’s Economic Crime Council and as Chairman, INTERPOL Conference on International Financial Crime in Cannes. He was a member of the National Foreign Intelligence Board, the Terrorist Crisis Management Committee and the Group on Narcotics. He served as Vice Chairman of the Interagency Group/Counterintelligence. In 1985, he was a member of the Senior Review Group of the Vice President’s Task Force on Terrorism. He served as a U.S. delegate to the United Nations International Conference on Drug Abuse and Illicit Trafficking in Vienna.

Revell was a member of the Senior Policy Group of the Vice President’s Task Force on Border Control Issues in 1988; he also served as an Adviser to the President’s Commission on Aviation Security and Terrorism which was established in 1989 “to investigate the events surrounding the destruction of Pan Am Flight 103“. He was a member of “The Executive Session on Policing”, Kennedy School of Government, Harvard University, 1987-1991.

Lockerbie bombing

Disaster warning

On 21 December 1988, shortly before Pan Am Flight 103 took off from London’s Heathrow airport at 18:25 hours, FBI Assistant Director Oliver “Buck” Revell reportedly rushed out onto the tarmac and pulled his son and daughter-in-law off the plane. The Lockerbie bombing was not the first time authorities were warned of an impending terrorist attack. The situation would repeat itself five years later in New York City, and seven years later in Oklahoma. It was an all too eerie coincidence.

Typically, U.S. authorities disingenuously denied receiving any warnings, as they would later do in New York and Oklahoma. Yet, as in those cases, evidence of prior knowledge would eventually become known. “It subsequently came to me on further inquiries that they hadn’t ignored [the warnings],” said a Pan Am security officer. “A number of VIPs were pulled off that plane. A number of intelligence operatives were pulled off that plane.”

Due to the warnings posted in U.S. embassies by the State Department (but not forwarded to Pan Am), many government employees avoided the flight. In fact, the Boeing 747 jumbo jet was only two-thirds full that busy holiday evening. South African president P W Botha and several high-ranking officials were advised by state security forces to change their reservations at the last hour. The South African State Security forces have a close relationship with the CIA.

Just as they would do in Oklahoma, government officials promised a complete and thorough investigation. Stated Oliver “Buck” Revell, who headed up the Bureau’s Lockerbie investigation:

“All of us working on the case made it a very, very personal priority of the first order.”

Fronting for the CIA, Vincent Cannistraro chimed in:

“I had personal friends on that plane who died. And I assure you that I wanted to find the perpetrators of that disaster as much as anyone wanted to.”

As in Oklahoma City, this would become the catch-all phrase that would set everything right and prove the government had no involvement. Of course, this would be somewhat difficult in Revell’s case, since he pulled his son and daughter-in-law off the plane minutes before it took off. (This was suspiciously reminiscent of the ATF agents who were paged not to come into work on April 19.)

Interestingly, Revell was the FBI’s lead investigator in the crash of an Arrow Air DC-8 which exploded on 12 December 1985 in Gander, Newfoundland, with the loss of all 248 personnel. As in Oklahoma City, that site was quickly bulldozed, destroying crucial forensic evidence, with an Army official maintaining a watchful eye at all times. Hiding behind the cover-up was the same cast of characters — Oliver North, Duane Clarridge, and Vince Cannistraro — who was North’s deputy at the NSC during Iran-Contra, and would later appear in Lockerbie. The same cast of characters that lurked behind the scandals in Nicaragua and Iran, and would appear like ghostly apparitions in the smoldering ruins of Oklahoma City.

It was also an act that the U.S. Shadow Government, responsible for precipitating, was anxious to cover up. Had the true cause of the crash — North’s double-dealing with the Iranians — been revealed, the Iran-Contra scandal would have surfaced two years before it did.

Oliver “Buck” Revell would be on hand to make sure it didn’t.

Three years later, in Lockerbie, the government was still claiming its hands were clean. Yet it vigorously protested Pan Am’s attempts to subpoena warning memos and other documents that would have revealed the government’s foreknowledge, just as it did in Oklahoma.

Simply stated, the attack on Pan Am 103 was in retaliation for the downing of the Iranian airbus.[4]

Serco Processes 2 Millionth Patent Application for U.S. Patent and Trademark Office
March 19, 2013 RESTON, VIRGINIA – March 18, 2013 – Serco Inc., a leading provider of professional, technology, and management services to the federal government, announced today that their Pre-Grant Publication (PGPubs) Classification Services team recently processed their 2 millionth patent application for the U.S. Patent & Trademark Office (USPTO). Each application was also processed within the contractually required 28-day window.”

“Instant messaging system and method
US 8566404 B2

Methods and apparatuses for processing an instant message from a source wireless communication device to a destination device are described herein. In one aspect of the invention, an exemplary method includes receiving the instant message from the source wireless communication device, the instant message having a source wireless communication identifier, a destination instant messenger identifier, and data contents; extracting the source wireless communication identifier, the destination instant messenger identifier and the data contents from the instant message; retrieving a source instant messenger identifier corresponding to the source wireless communication identifier; binding the source instant messenger identifier with the source wireless communication identifier; and transmitting the data contents with the source instant messenger identifier to the destination device over a communication network, based on the destination instant messenger identifier. Other methods and apparatuses are also described.

Publication number: US8566404 B2
Publication type: Grant
Application number: US 12/414,510
Publication date: Oct 22, 2013
Filing date: Mar 30, 2009
Priority date: Mar 26, 2001
Fee status: Paid
Also published as: US7512407, 11 More »
Inventors: Xiaoguang Wu, Yang Chen, Yejun Huang, Huateng Ma, Liqing Zeng
Original Assignee: Tencent (Bvi) Limited
Export Citation: BiBTeX, EndNote, RefMan
Patent Citations (33), Non-Patent Citations (20), Referenced by (3),Classifications (18), Legal Events (2)
External Links: USPTO, USPTO Assignment, Espacenet”

“Secure instant messaging system using instant messaging group policy certificates
US 7321969 B2
A method and apparatus for facilitating instant messaging utilizes a secure instant message group policy certificate issued by an instant messaging public key infrastructure policy certificate issuing unit. The secure instant messaging group policy certificate is received, such as through a local instant messaging secure public key infrastructure proxy, and contains data defining the group members, references to other groups, security controls and relevant data such as allowed algorithms. The secure instant messaging group policy certificate defines a plurality of different instant messaging groups, each identified by an instant messaging group identifier. Each instant messaging group identifier is associated with a plurality of instant message group number identifiers.

Publication number: US7321969 B2
Publication type: Grant
Application number: US 10/133,050
Publication date: Jan 22, 2008
Filing date: Apr 26, 2002
Priority date: Apr 26, 2002
Fee status: Lapsed
Also published as: US20030204720
Inventors: Isadore Schoen, Michael Boberski
Original Assignee: Entrust Limited
Export Citation: BiBTeX, EndNote, RefMan
Patent Citations (34), Non-Patent Citations (13), Referenced by (75),Classifications (13), Legal Events (9)
External Links: USPTO, USPTO Assignment, Espacenet”

“Patents, Key Escrow and the Elliptic Curve
February 12, 2015
By Tim Moses
As part of Entrust’s ongoing celebration of our 20th Anniversary of Public Key Infrastructure (PKI), we’re looking back in a four-part series on the pioneers, processes and events that have shaped this ever-evolving technology. In parts one and two, we traced the early history of PKI and highlighted some of the challenges and innovations that shaped the technology. Today we look back at how patent issues and government involvement affected the continued development, access and adoption of PKI. The Impact of Patents The ideas behind public-key cryptography had been patented in the U.S. in the mid-1970s, which ultimately delayed the widespread adoption of the technology. But by 1989, the Internet Engineering Task Force was ready to publish specifications for Privacy-Enhanced eMail (PEM), which included extensions to the Internet mail protocol, providing for encryption and digital signature using public-key cryptography. The specification identified just one particular company – RSA Data Security Inc. – as the global root certification authority of the PKI. What’s more, they also specified the price to be paid for an end-user certificate. Many found this contrary to the ethos of the Internet and PEM turned out to be a failure. Its successor S/MIME had to await the expiry of the patents. Key escrow Through the early ’90s, it was becoming increasingly clear that advances in cryptanalysis and silicon technology were nibbling away at the security of the DES algorithm. Yet in North America, it was not possible to obtain an export license for products with greater cryptographic strength – nor for products with an RSA key length greater than 512 bits. Meanwhile, locally developed products in Europe were available with greater strength. The industry lobbied the U.S. Congress to change the law and to allow the export of stronger cryptography. At the same time, the FBI was lobbying Congress to obtain a provision in law requiring vendors and service providers to include an escrow facility that would allow them to recover plaintext from encrypted communications. The FBI and NSA collaborated on the design of an algorithm, called “Skipjack” and a chip implementation named “Clipper” to meet the FBI’s needs. In the academic community, researchers using a special purpose machine demonstrated that DES could be cracked. And in a large-scale collaborative effort, another research team cracked 512-bit RSA. Dan Bernstein, a student at the University of California at Berkeley challenged the U.S. Government over its refusal to allow him to publish a new cryptographic algorithm – claiming that export laws violated his first amendment rights. After protracted court proceedings lasting almost the whole decade, he prevailed. Hobbyists were also getting in on the act. Phil Zimmerman developed his PGP software program, which provided strong encryption for email and distributed it in guerrilla fashion for free download from the Internet. Eventually, something had to give. Finally, in 2000 the U.S. Government relented and the FBI’s “Clipper” initiative was abandoned. Today, encryption products are available worldwide with a strength of more than 100 bits. Elliptic curve cryptography The first practical public-key cryptographic systems were based on groups whose elements were integers. But Whitfield Diffie of MIT first pointed to the possibility of using groups based on quite different elements. One alternative has withstood cryptanalytic scrutiny: Elliptic-curve cryptography (ECC), whose elements are discrete points on a continuous curve, combined using geometric formulae. This has a number of features that make it attractive in constrained environments, such as those that are encountered in both smartcards and the Internet of Things. The best known algorithm for breaking elliptic curve cryptography has exponential running time, which means that adding two bits to the key size doubles the cryptographic strength – and doubles the work required by an attacker to disclose the private key – regardless of what strength you start with. On the other hand, the best-known algorithm for breaking RSA has sub-exponential running time. This means that as strength requirements grow, the key size has to grow at a faster pace. The key size required for effective long-term protection using the RSA algorithm is already a performance challenge for constrained environments. The performance impact of RSA will become harder to tolerate as the demand for increasing cryptographic strength continues. For this reason, elliptic curve cryptography will become increasingly important.”

“The NCIC database currently consists of seventeen files. The seven property files contain records of stolen articles, boats, guns, license plates, parts, securities, and vehicles. The ten person files are the Convicted Person on Supervised Release, Convicted Sexual Offender Registry, Foreign Fugitive, Immigration Violator, Missing Person, Protection Order, Unidentified Person, U.S. Secret Service, Violent Gang and Terrorist Organization, and Wanted Person Files. The Interstate Identification Index, which contains automated criminal history record information, is also accessible through the NCIC network.

Now, I would like to outline some of the NCIC files and features that assist in immigration and border security. The Foreign Fugitive File, established July 1, 1987, contains information on persons wanted in connection with offenses committed outside the United States. There are two types of records in the Foreign Fugitive File: Canadian records and International Criminal Police Organization (otherwise known as INTERPOL) records. Canadian records contain information on persons wanted for violations of the criminal code of Canada based upon Canada-wide warrants. INTERPOL records contain information on persons wanted by authorities in other countries. The INTERPOL National Central Bureau of any country may issue a wanted flyer, known as a red notice, for a fugitive wanted within its respective country. The red notice requests the arrest of the fugitive with the intention that extradition will occur. Upon receipt of a red notice, the United States INTERPOL National Central Bureau reviews the information and enters an NCIC Foreign Fugitive File record if the following conditions are met: 1) the wanting country has an outstanding arrest warrant that charges a crime which would be a felony if committed in the United States; and 2) the wanting country is a signatory to an extradition treaty/convention with the United States. On October 29th, there were 1,543 records in the Foreign Fugitive File.”

“Real-time interactive wagering on event outcomes
US 8512129 B2
Systems and methods for real-time interactive wagering on event outcomes are presented. Clients are first qualified and given wagering limits before being allowed to interactively wager on event outcomes. Event outcomes may be based on, for example, financial markets and indices, sporting and entertainment events, casino performances, and natural phenomena such as weather and earthquakes. Events on which wagers can be placed include both those with known and unknown outcome probabilities, and wagers can be a fixed-odds type or a spread-bet type. Wager transactions, including acceptances and confirmations, are executed in real time. Clients can customize displays of events on which they are authorized to wager. Real-time client credit management, automatic dealer hedging, automatic price-spread adjustments, and automatic client and dealer defined wagering limits are also provided.

Publication number: US8512129 B2
Publication type: Grant
Application number: US 09/846,025
Publication date: Aug 20, 2013
Filing date: Apr 30, 2001
Priority date: May 1, 2000
Fee status: Paid
Also published as: CA2407679A1, 17 More »
Inventors: Philip M Ginsberg, Andrew C Gilbert, Howard W Lutnick, Lewis Findlay
Original Assignee: Cfph, Llc
Export Citation: BiBTeX, EndNote, RefMan
Patent Citations (181), Non-Patent Citations (83), Referenced by (5),Classifications (16), Legal Events (3)”

“Distribution of cash deposits and withdrawals in multi-style managed client investment accounts
US 7822667 B1
An investment account is managed having associated assets, including shares of different securities, transacted in accordance with a plurality of different investment styles. A cash deposit into such a multi-style investment account and a request for a cash withdrawal from the multi-style investment account are handled differently but efficiently across the different investment styles in the investment account. When cash is deposited into the investment account, the cash deposit is placed into a temporary “cash bucket” in the investment account common across different investment styles. The cash is then distributed individual “cash buckets” each associated with an investment style in the investment account in accordance with a selected cash deposit allocation. When cash is to be withdrawn from the investment account, the cash amounting to the requested amount from individual “cash buckets” each associated with an investment style in the investment account is withdrawn in accordance with a selected cash withdrawal allocation. As a result, the cash can be deposited into the investment account or withdrawn from the investment account with proper allocation across different investment styles.

Publication number: US7822667 B1
Publication type: Grant
Application number: US 10/372,709
Publication date: Oct 26, 2010
Filing date: Feb 25, 2003
Priority date: Feb 25, 2003
Fee status: Paid
Inventors: Charles Raymond Smith, III, 6 More »
Original Assignee: Checkfree Corporation
Export Citation: BiBTeX, EndNote, RefMan
Patent Citations (70), Non-Patent Citations (79), Referenced by (8),Classifications (9), Legal Events (3)
External Links: USPTO, USPTO Assignment, Espacenet”

“Method for efficient management of certificate revocation lists and update information
US 5699431 A
A method which allows implementation of the revocation of public-key certificates facilitates engineering of certificate revocation lists (CRLs). It solves the practical problem of CRLs potentially growing to unmanageable lengths by allowing CRLs to be segmented, based on size considerations or priority considerations related to revocation reasons. The method is used to distribute CRL information to users of certificate-based public-key systems. It is also applied more generally to update any field in a certificate by reference to a secondary source of authenticated information.

Publication number: US5699431 A:
Publication type: Grant
Application number: US 08/556,360:
Publication date: Dec 16, 1997:
Filing date: Nov 13, 1995
Priority date: Nov 13, 1995
Fee status: Paid
Inventors: Paul C. Van Oorschot, Warwick S. Ford, Stephen W. Hillier, Josanne Otway
Original Assignee: Northern Telecom Limited
Export Citation: BiBTeX, EndNote, RefMan
Patent Citations (9), Non-Patent Citations (8), Referenced by (194), Classifications (5), Legal Events (11)
External Links: USPTO, USPTO Assignment, Espacenet”

“The White House travel office controversy, sometimes referred to as Travelgate,[1][2] was the first major ethics controversy of the Clinton administration. It began in May 1993, when seven employees of the White House Travel Office were fired. This action was unusual because although theoretically staff employees serve at the pleasure of the President and could be dismissed without cause, in practice, such employees usually remain in their posts for many years.

The White House stated the firings were done because financial improprieties in the Travel Office operation during previous administrations had been revealed by an FBI investigation. Critics contended the firings were done to allow friends of President Bill Clinton and First Lady Hillary Rodham Clinton to take over the travel business and that the involvement of the FBI was unwarranted. Heavy media attention forced the White House to reinstate most of the employees in other jobs and remove the Clinton associates from the travel role.

Further investigations by the FBI and the Department of Justice, the White House itself, the General Accounting Office, the House Government Reform and Oversight Committee, and the Whitewater Independent Counsel all took place over the subsequent years. Travel Office Director Billy Dale was charged with embezzlement but found not guilty in 1995. In 1998, Independent Counsel Kenneth Starr exonerated Bill Clinton of any involvement in the matter.

Hillary Clinton gradually came under scrutiny for allegedly having played a central role in the firings and making false statements about her involvement therein. In 2000, Independent Counsel Robert Ray issued his final report on Travelgate. He sought no charges against her, saying that while some of Clinton’s statements were factually false, there was insufficient evidence that these statements were either knowingly false or that she understood that her statements led to the firings.”

“UK’s Crime Squad picks face-recognition tech
December 3, 2001 Posted: 9:07 a.m. EST (1407 GMT)
LONDON, England (IDG) — Imagis Technologies Inc. and Serco Group PLC are working with the UK’s National Crime Squad (NCS) to develop a facial-recognition application for use in crime fighting.

The squad is working on a national database based on Imagis ID-2000 facial-recognition technology to use as a tool for keeping track of convicted pedophiles and other criminals, Imagis announced at the Biometrics 2001 Conference here on Thursday.

“We are working with both Imagis and Serco on the technology,” an NCS spokesman confirmed.

UK-based Serco is a management and consulting company that has been providing IT support to the U.K. government and the NCS, a government agency, for a number of years. The Canadian Imagis Technologies is a developer of image-identification software with a focus on biometric facial recognition, according to the company’s Web site.

Financial terms of the deal were not disclosed.

The Imagis’ ID-2000 was picked for further development by the UK government for its ability to identify an individual within very large databases of images in seconds, its ability to search for common background scenes as well as faces, its use imagery from any source, including live video as well as digital and analog photos and the security built into the program that allows for the secure transmission of data even from remote databases, Imagis said in a statement that was vetted and approved by the NCS.

The software will aid law-enforcement agencies in identifying victims and perpetrators as well as background imagery for criminal investigation and case preparation, Imagis said.

Already being used by the NCS, the facial-recognition technology is playing a part in the ongoing investigation into an online pedophile group which on Wednesday led to the arrest of 130 people worldwide, 10 in the UK, Imagis said.

The software is also being looked into as a tool for the fight against international terrorism, an NCS spokesman said.

In October, a U.S. Senate subcommittee began looking into the possible future use of cutting-edge devices such as facial-recognition monitors and retinal scanners as a way to combat terrorism following the attacks in New York and Washington D.C. on September 11.

The Imagis ID-2000 facial-recognition technology is also currently being used by the Oakland Police Department (OPD), in Oakland, California throughout Alameda County, including the Oakland International Airport, the OPD and Imagis announced in October.”

API Technologies to Purchase Casino-ID Software Application from
Facial Recognition Developer, Imagis Technologies

Vancouver, Canada – November 6, 2001: Imagis Technologies Inc. (OTCBB: IGSTF; CDNX: NAB; Germany: IGY),a leading biometric facial recognition company, today announced that API Technologies LLC will purchase the rights to Imagis’ Casino-ID product and will pay royalty fees to Imagis associated with API product sales that incorporate the Casino-ID software application. Casino-ID is an advanced software application for tracking incident-based information and images within the Casino environment.

API President, Dennis Nelson, said, “Having marketed Casino-ID since May 2001, it has become apparent that it goes far beyond existing gaming applications. By offering features and an array of functions that are not currently available, Casino-ID is in strong demand by the industry. In this heightened security environment, the use of Imagis’ facial recognition technology, ID-2000, together with Casino-ID, allows us to screen and track the movements of all staff, visitors and vendors. The Casino-ID solution will allow our gaming clients to create an enhanced security environment adding safety, comfort and peace of mind to the gaming entertainment experience.”

Casino-ID software captures, stores, and matches surveillance images quickly and easily. By cataloging intelligence data it identifies suspects and potential risks to protect gaming facility staff, clients and property. The purchase of the Casino-ID application will allow API Technologies to make enhancements to the software that will further increase the effectiveness of the product for Casino Managers.

Helena Campbell, formerly a Regional Sales Director for Imagis, has joined API Technologies as Vice President, Market Development. API plans to market the Casino-ID product line through its direct sales force and through its existing business partners within the gaming industry. API Technologies plans to integrate a comprehensive and functional gaming security database within Casino-ID and make it available to its customers.

Iain Drummond, Imagis Technologies’ President & CEO, said, “We see this as a truly synergistic partnership that will accelerate the adoption of Casino-ID by the gaming industry while providing Imagis with recurring revenues from royalty fees. This will allow Imagis to focus on the major opportunities in the airport, law enforcement, and security markets.


Imagis (OTCBB: IGSTF; CDNX: NAB; Germany: IGY) is a developer and marketer of software applications and advanced biometric facial recognition software solutions both as products and as a Software Development Kit. These applications provide a range of security solutions in various industry sectors including airports, law enforcement, customs, immigration and other government agencies, and gaming. Imagis currently has over 130 national and international installations within excess of a thousand users of its biometric facial recognition technology, including at Toronto’s Pearson International Airport, the world’s 16th busiest airport and Oakland International Airport, which serves more than 10 million travelers per year, and several installations throughout Canada, Mexico, and the UK. Imagis markets its products through a network of business partners located in North America, Asia, Europe and Latin America. Imagis’ Chairman is Oliver “Buck” Revell, who served for over 30 years in the FBI, and during his career advanced to the number two-career post of Associate Deputy Director. Imagis is on the web at

1300 – 1075 W. Georgia
Vancouver, BC Canada V6E 3C9
Tel: (604) 684-2449 Fax: (604) 684-4601

About API Technologies, LLC.

Since its inception in 1975, API Services Inc. has earned a reputation for consistently providing their local, regional, national and international clients with successful solutions to their security and personnel challenges. API is one of North America’s leading gaming consulting firms, specializing in security and protection services, systems design, regulatory and facility development, internal controls, business due diligence and start up consulting to the gaming industry. As a result of the extremely positive response to the Casino-ID product in the market place, API Technologies, LLC was established to further promote and expand its product line. API Technologies will integrate the “best in class” Biometric Technology – Casino-ID, with its 25 years of consulting experience to provide a comprehensive solution to the gaming marketplace.”


“Nevada Gaming Commission OKs record $5.5 million fine against CG Technology
January 23, 2014 – 6:44 pm
The Nevada Gaming Commission on Thursday unanimously approved a record $5.5 million fine levied against the race and sports book subsidiary of Cantor Fitzgerald L.P. related to illegal bets by a top executive.

“Today is a bad day,” Commissioner Tony Alamo said. “This is an enormously large sum of money. This is a revenue get. That’s not our goal. Our goal is to punish” those who violate state gaming regulations.

Alamo credited CG Technology’s CEO Lee Amaitis for attending the hearing but cautioned him that this incident was national news and “gave Nevada a black eye.” Alamo said he wouldn’t want to see CG Technology come before the commission for a similar incident in the future.

“I am not afraid of revocation” of a company’s license,” Alamo said.

Chairman Peter Bernhard said he was initially reluctant to support the stipulation because of the damage done to the industry by the company. But Bernhard eventually supported it because it is the largest fine ever against a gaming company. He said the $5.5 million fine sends a message that “people will be held accountable.”

The three-member Nevada Gaming Control Board could have also recommended revoking or suspending CG Technology’s license.

Amaitis attended the hearing but did not address the commission. He also declined to comment on the commission’s decision following the 20-minute hearing.

The Gaming Control Board’s 18-count compliant outlining the charges against CG Technology, formerly Cantor Gaming, was made public Jan. 8. The settlement was released Jan. 13.

In the complaint, regulators said CG Technology failed to prevent Michael Colbert from operating an illegal sports betting ring that made an estimated $34 million in bets. Colbert, formerly risk management director and vice president of the former Cantor Gaming in Las Vegas, worked with three men who worked as messengers to place wagers for Gadoon Kyrollos, a high-level sports bettor.

Paul Sexton, Robert Drexler and Thomas Ludford acted as messenger bettors, according to the complaint. Sexton pleaded guilty to fourth-degree money-laundering and forfeited $600,000.

In 2013, Colbert pleaded guilty in federal court in New York to one felony count of conspiracy for his role in the betting ring. He awaits sentencing.

The settlement says CG Technology admitted guilt in 14 counts of the complaint and concurred that the board could prove one count directly relating to Colbert’s oversight of the illegal wagering operation. The company did not admit or deny allegations in three other counts.

Both Amaitis and Cantor Fitzgerald Chairman Howard Lutnick signed off on the settlement.

Before the CG Technology fine, the largest fine ever approved by Nevada gaming regulators was $5 million in 2003 against MGM Mirage, now MGM Resorts International. The company was fined for failing to file 15,000 currency transaction reports with the Internal Revenue Service.

Owners of the Stardust paid a $3 million fine in 1984 to settle a complaint over allegations that the now-imploded Strip casino’s former owner failed to prevent mob-related skimming of gaming revenue.

In 1988, Ralph Engelstad, late owner of the Imperial Palace, was accused of damaging the state’s reputation for holding two Adolf Hitler birthday parties at the casino in separate years. He paid a $1.5 million fine.

The Palms paid a $1 million fine in 2013 to settle a complaint resulting from an investigation that discovered drug sales and prostitution at clubs on the property.

Cantor Fitzgerald, founded in 1945, is one of the largest private financial services firms on Wall Street. Lutnick has led the company’s expansion over the past decade into investment banking, commercial real estate and gaming.

CG Technology operates race and sports books at the M Resort, Hard Rock Hotel, Tropicana Las Vegas, The Cosmopolitan of Las Vegas, The Venetian, Palms and Silverton, and provides information as Las Vegas Sports Consultants and offers mobile wagering.

The bookmaker also has operations in China and the Bahamas.”

“8(a) Business Development Program[edit] The 8(a) Business Development Program assists in the development of small businesses owned and operated by individuals who are socially and economically disadvantaged, such as women and minorities. The following ethnic groups are classified as eligible: Black Americans; Hispanic Americans; Native Americans (American Indians, Eskimos, Aleuts, or Native Hawaiians); Asian Pacific Americans (persons with origins from Burma, Thailand, Malaysia, Indonesia, Singapore, Brunei, Japan, China (including Hong Kong), Taiwan, Laos, Cambodia (Kampuchea), Vietnam, Korea, The Philippines, U.S. Trust Territory of the Pacific Islands (Republic of Palau), Republic of the Marshall Islands, Federated States of Micronesia, the Commonwealth of the Northern Mariana Islands, Guam, Samoa, Macao, Fiji, Tonga, Kiribati, Tuvalu, or Nauru); Subcontinent Asian Americans (persons with origins from India, Pakistan, Bangladesh, Sri Lanka, Bhutan, the Maldives Islands or Nepal). In 2011, the SBA, along with the FBI and the IRS, uncovered a massive scheme to defraud this program. Civilian employees of the U.S. Army Corps of Engineers, working in concert with an employee of Alaska Native Corporation Eyak Technology LLC allegedly submitted fraudulent bills to the program, totaling over 20 million dollars, and kept the money for their own use.[28]”

“Nortel Government Solutions, in collaboration with the Department of Justice (DOJ), built the Joint Automated Booking System (JABS) — a centralized system for automating the collection of fingerprint, photographic and biographic data, submitting this data to the FBI, and sharing it with participating law enforcement agencies nationwide.”

“The White House travel office controversy, sometimes referred to as Travelgate,[1][2] was the first major ethics controversy of the Clinton administration. It began in May 1993, when seven employees of the White House Travel Office were fired. This action was unusual because although theoretically staff employees serve at the pleasure of the President and could be dismissed without cause, in practice, such employees usually remain in their posts for many years.

The White House stated the firings were done because financial improprieties in the Travel Office operation during previous administrations had been revealed by an FBI investigation. Critics contended the firings were done to allow friends of President Bill Clinton and First Lady Hillary Rodham Clinton to take over the travel business and that the involvement of the FBI was unwarranted. Heavy media attention forced the White House to reinstate most of the employees in other jobs and remove the Clinton associates from the travel role.

Further investigations by the FBI and the Department of Justice, the White House itself, the General Accounting Office, the House Government Reform and Oversight Committee, and the Whitewater Independent Counsel all took place over the subsequent years. Travel Office Director Billy Dale was charged with embezzlement but found not guilty in 1995. In 1998, Independent Counsel Kenneth Starr exonerated Bill Clinton of any involvement in the matter.

Hillary Clinton gradually came under scrutiny for allegedly having played a central role in the firings and making false statements about her involvement therein. In 2000, Independent Counsel Robert Ray issued his final report on Travelgate. He sought no charges against her, saying that while some of Clinton’s statements were factually false, there was insufficient evidence that these statements were either knowingly false or that she understood that her statements led to the firings.”

“Virtual Command Center
Real-Time Tool to Securely Monitor Criminal Incidents and Major Events Online
July 3, 2012
Originally published in the July 2012 edition of the CJIS Link, Volume 14, Number 2
On April 18, federal and local officials in Clarksburg, West Virginia, announced the arrest of a major West Virginia synthetic drug supplier. Operation “Hot Stuff Cool Things” was a multi-agency operation of 70 agents that used a Virtual Command Center (VCC) on the Law Enforcement Online (LEO) network to share information about the ongoing case. Subsequently, the owner of the Clarksburg and Buckhannon stores Hot Stuff Cool Things and three other individuals were arrested on multiple federal drug charges by a task force that included the Drug Enforcement Administration, Internal Revenue Service, West Virginia State Police, U.S. Marshals Service, Clarksburg Police Department, Bridgeport Police Department, and the Harrison County Sheriff’s Office. During the raid, officers found over $750,000 in cash and bank deposits. The U.S. Attorney said that millions of dollars of bath salts (a synthetic drug commonly used as a cocaine substitute) had moved through the stores in the last year.

In the modern law enforcement environment, agencies need to share information, collaborate, and join forces to combat crime and terrorism. Often they need to post, track, and spread information across departments and jurisdictions in a quick, secure way for an investigation or for a major occurrence. To satisfy this need for safe, inclusive communication, the LEO Operations Unit created the VCC capability in 2002. The LEO VCC is a situational awareness and/or crisis management tool used to share information about street-level and tactical activities among law enforcement operations centers and command posts. Since its inception, the VCC has been used by numerous agencies for local, national, and international events ranging from major case management to global events like presidential inaugurations.

Because the VCC resides on LEO, it is extremely flexible and can be used or viewed from multiple geographic locations. This makes it feasible for federal, state, and local law enforcement agencies to create joint efforts in investigations and law enforcement actions. The VCC exists on a secure system for any designated audience members online, not just those physically present at an event or a “brick and mortar” command center. Through the VCC, law enforcement can effectively manage a tactical incident in real time, 24/7, with both operational and technical support. As the VCC receives and posts relevant information and intelligence, it provides a comprehensive account of an incident or event to designated law enforcement channels.

The VCC provides an events board feature that permits information posts as an event occurs and allows listing of data such as photographs, scanned documents, or any information that would be useful to managing an event or crisis. Agencies hosting the VCC can permit access to individual persons or entire agencies as needed. Even critical incident managers, such as emergency planners, can now have remote access to a crisis without having to be on-scene. Recent enhancements to the VCC capability include the ability to display incidents by specific dates or times, improved refresh rates on the screens, and improved critical real-time monitoring of operations.

The FBI and the law enforcement community as a whole have benefited from the increased ability to share vital information and collaborate—even over previously unmanageable locality impediments—by the creation of the VCC. In 2011, LEO members created over 300 new VCCs and opened over 700 VCC event boards to collect, record, and securely publish information. As an indication of its effectiveness and adaptability, the law enforcement community has used the VCC not only during kidnappings, shootings, and special investigations, but also during major events such as NASCAR races, Republican and Democratic National Conventions, a presidential inauguration, the Super Bowl, the Pro Bowl, the Academy Awards, and the Hurricane Katrina relief effort.”

“Duncan Duane Hunter (born December 7, 1976) is an American politician and member of the Republican Party from California who has represented San Diego County in the United States House of Representatives since 2009, representing California’s 50th congressional district. The district, numbered as the 52nd district from 2009 to 2013, covers almost all of San Diego County except for the coastal and border areas. It includes the cities of Escondido, San Marcos and Santee as well as Fallbrook, Lakeside and Valley Center and mountain and desert areas stretching to the Imperial County line.

The day after the September 11 attacks, Hunter quit his job and joined the United States Marine Corps. He attended Officer Candidates School at Marine Corps Base Quantico. Upon graduation in March 2002, he was commissioned as a second lieutenant. He subsequently served as a field artillery officer in the 1st Marine Division after the 2003 invasion of Iraq and completed a second tour in Fallujah, Iraq, in 2004, serving in Battery A, 1st Battalion, 11th Marines. During his second tour, he participated in Operation Vigilant Resolve.

In September 2005, Hunter was honorably discharged from active duty but remained in the Marine Corps Reserve. He then started a residential development company. In 2007, he was recalled to active duty and deployed to Afghanistan in support of the War in Afghanistan; this was his third tour of duty during the War on Terrorism. Hunter was honorably discharged from active duty in December 2007, but continues to serve in the Marine Corps Reserve.[9][10] Hunter was promoted to major in 2012.[11][12]

Following in the footsteps of his father, Hunter’s voting record has been decidedly conservative. He has a lifetime rating of 93 from the American Conservative Union. He is also a member of the Republican Study Committee,[32]a caucus of conservative House Republicans of which his father was a longtime member.[citation needed]

In a 2009 interview with KPBS, Hunter expressed support for “overriding” the designation of the delta smelt as an endangered species, saying that overriding it would reduce unemployment in California.[33]

He opposed the Health Care and Education Reconciliation Act of 2010, saying that it would “take away” the doctor-patient relationship and the right for people to choose “what type of operations they have”, and that it would allow a “government bureaucrat” to make health care decisions for people. In the KPBS interview, Hunter said, “Things that you have problems with now would be exacerbated if you had government-run healthcare.”[34]

At an April 2010 Tea Party movement rally in Ramona, California, Hunter advocated for the deportation of United States citizens who are the children of illegal immigrants.[35]

At the rally, Hunter said, “It’s a complex issue and … you could look and say, ‘You’re a mean guy. That’s a mean thing to do. That’s not a humanitarian thing to do’ … We simply cannot afford what we’re doing right now. We just can’t afford it. California’s going under.” He confirmed the comments to San Diego County’s North County Times, telling the newspaper that he supported House Resolution 1868, a measure that called for the elimination of birthright citizenship in the United States. He expressed support for the controversial 2010 Arizona immigration law, calling it a national security issue and “a fantastic starting point”.[36]

On July 24, 2013, Hunter voted against an amendment offered by Justin Amash to rein in warrantless domestic surveillance conducted by the NSA.[37]

In October 2013 Hunter was the only representative from San Diego County to vote against the bill ending the nation’s 16-day partial government shutdown, explaining that he voted against it because it did not reduce spending or the national debt.[38]

In February 2016, Hunter puffed on an electronic cigarette during a committee hearing, to dramatize his opposition to a proposed federal ban on such “vaping” on airplanes; however, his colleagues on the House Transportation and Infrastructure Committee approved the ban.[39]

At a town-hall-style meeting in March 2017, Hunter was confronted by protesters. Before the crowd, Hunter asserted that the American intelligence community was filled with “seditious Obama folks” who “hate Donald Trump as much as you (those at the meeting) do” and are trying to undermine the Trump administration. He also described the American government as “Orwellian”.[40]

Hunter voted in favor of the Tax Cuts and Jobs Act of 2017.[41] Hunter said that the plan is “good for most states” but “not as good” for California.[42]

1223 Total Views 3 Views Today
Please follow and like us:

Related Post

One comment