Kelly 219: Serco Patentees’ Bin Laden Waypoints, Clinton Bridge For Phantom Wagers, Con Air Sister’s Buck & Drew
General John F. Kelly
White House Chief of Staff
Washington, D.C. 20528
Open letter from the Cloud Centric Crime Scene Investigators of Abel Danger
February 19, 2018
Dear General Kelly:
Please accept Brief 219 from Field McConnell – United States Marine Corps whistle-blower and Global Operations Director of Abel Danger (AD) – on Serco‘s CAI private equity investors including the late General Alexander Haig, 7th SACEUR and former director of MGM Mirage, AOL and UTC and Yves Fortier, Rhodes Scholar and former director of Nortel Networks Corporation, who allegedly tracked and timed patentee SWAT teams along ad hoc or permanent waypoints selected by the Bin Laden office in London for the attacks of 9/11 with Imagis Technologies’ face-recognition software, Nortel’s Joint Automated Booking System (JABS) and ITT Exelis’s Methods and systems for remote control of self-propelled vehicles US6640164B1.
McConnell claims, that Haig and Kristine Marcy, McConnell’s sister and the founder of the U.S. Senior Executives Service (SES), Con Air (JPATS) and a USMS prisoner medical services program, embedded patented devices including Tencent (BVI) Limited’s Instant messaging [IM] system and method US 8566404 B and Howard Lutnick’s Real-time interactive wagering on event outcomes CA 2460367 A in the federal bridge certification authority (FBCA) network allegedly used by Clinton Foundation donors and Greek Life associates of George H. Bush (Phi Beta Kappa) and Wilbur Ross (Kappa Beta Phi) to bet on body counts or time of victim deaths while SWAT teams, allegedly hired by former ITT Exelis executive and former V-P of Boeing Phantom Works, Dr. Pamela Drew, flew ad hoc waypoints for the first live-broadcast mass snuff film in human history on 9/11.
McConnell further claims that Fortier and Marcy embedded Nortel’s Method for efficient management of certificate revocation lists and update information US 5699431 A in the federal bridge networks including FBI Virtual Command Centers (VCCs) and Law Enforcement Online (LEO) so Oliver ‘Buck’ Revell, former Marine Corps Captain, former FBI Executive Assistant Director – Investigations (SES-6) and Imagis [face-recognition] Technologies founder, could stand down law-enforcement or autopsy services at crime scenes before the SWAT team waypoint attacks on the enemies of Serco bankers and Hillary Clinton’s Greek Life friends.
McConnell reminds you that Buck Revell (warned by Serco‘s British Invisibles?) is reported to have pulled his son and daughter-in-law off Pan Am Flight 103 just before takeoff from London’s Heathrow airport at 18:25 hours on 21 December 1988 (after McConnell told his Conair sister how to handle a prisoner mutiny by droning the aircraft) and saved them from a SMEAC* bombing event over Lockerbie, Scotland at 19:02:50 with its body count of 270 = 243 passengers + 16 crew + 11 people on ground.
*Serco‘s digital fires instructors at USMC Base Camp Pendleton have allegedly corrupted the Marine Corps SMEAC briefing protocols into Situation, Mission, Execution, Ambush, Cover-up!
McConnell claims that Serco is using Two-way wireless system for financial industry transactions US 6539362 B1 to ‘drift’ proceeds of crimes including phantom wagering, snuff films (cf. BC pig farm & Starnet Communications) and child pornography into Marcy’s DOJ Asset Forfeiture Funds and the private accounts of junket operators, promoters (late Stephen Paddock!) and players networked by the late General Haig.
With this 219th Kelly public briefing, we have given ample opportunities for traitors and/or Serco agents to rebut our allegations of fraud upon patentees registered at the U.S. Patent and Trademark Office including Boeing, ITT Exelis (HQ WTC#7!) and Tencent (BVI) Limited and their extorted participation in mass-casualty wagering events, we ask you to have McConnell’s sister Kristine ‘Conair’ Marcy and Serco director Pamela Drew placed in protective custody to be questioned in re their apparent roles in waypoint wagering on 9/11 and the former Marine Corps Captain, Oliver ‘Buck’ Revell charged in the appropriate court under 18 U.S.C. § 2382 – Misprision of treason or 18 U.S.C. § 1958 – Murder-for-hire.
ATC Global 2013 – ITT Exelis Workshop
Boeing Honeywell Uninterruptible Autopilot
Con Air (1997) Official Trailer
SERCO GROUP PLC: List of Subsidiaries AND Shareholders! [Note agents for Northern Trust and the Teachers (TIAA) Pension Fund would have met with agents of the government of Saudi Arabia on the 47th floor of WTC 1 on 9/11]
P O Box 39
Plum City WI 54761″
“Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”
“9/11 Flight Paths & Stewart Air Base
Contributed by Adam Letalik, Truth911.net
What happened at 8:36am on 9/11/01?
American Airlines Flight 11 and United Airlines Flight 175 were the two airplanes that hit the World Trade Center Towers, on September 11th, 2001. The 9/11 Commission Report published the flight paths of both airplanes. The flight paths originate from Boston, and cross paths once before their paths meet again in New York City.
Click for enlarged images
When comparing the flight paths, it shows the unique location both planes passed on their way to New York City.
Click for enlarged images
Point A is the approximate location of the overlap. Point A is the location of New Windsor, New York. This also happens to be the location of the Stewart Air National Guard Base (aka Stewart Air Force Base, aka Stewart International Airport).
Not only did AA 11 and UA 175 both fly over New Windsor, NY, but they both flew over it at the same time, supposedly almost crashing into each other. This is an unlikely coincidence, since it would be far more likely that if the paths taken from Boston to New York crossed, that the planes would not cross paths at the same time. This occurred at approximately 8:36 am.
Directly From USA Today:
The two hijacked jets that demolished the World Trade Center nearly crashed into each other while heading to their target, according to a Federal Aviation Administration employee at a regional control center. “The two aircraft got too close to each other down by Stewart” International Airport in New Windsor, N.Y., about 55 miles north of New York City, the employee told The Telegraph of Nashua.
At 8.37:08, UA 175 is asked to look for a lost American Airlines plane: “Do you have traffic look at uh your 12 to 1o’clock at about, uh, 10 miles southbound to see if you can see an American seventy six seven out there please.” UA 175 replies: “Affirmative we have him, uh, he looks, uh, about 20, yeah, about 29, 28,000.”
Click for enlarged images
The map below, published by USA Today, shows the planes’ scheduled flight path and the actual route taken. This diagram also illustrates the strange path taken by AA 11 since when it deviated from its flight path, it headed away from New York City. Had AA 11 not taken the detour, the planes would not have crossed paths over New Windsor at the same time. Also note that UA 175’s scheduled flight path takes it directly over New Windsor and that it was not even supposedly hijacked until around the time AA 11 hit the North Tower. After UA 175 is hijacked, it does not fly directly to New York City. UA 175 hit the South Tower, 17 minutes later, leaving enough time for news crews to have their cameras set up, pointed up at the Twin Towers.
Click for enlarged image
Amy Sweeney, a flight attendant on board AA 11, made a phone call(s) to American Airlines Flight service manager Michael Woodward. Sweeney first called at 8:22. At approximately 8:36, Sweeney reported that the plane began a rapid descent.
Complete 9/11 Timeline
Directly from ABC News:
About 15 minutes after the women first called, the plane suddenly lurched, tilting all the way to one side, then becoming horizontal again. Ong said the plane was flying erratically, and Sweeney said it had begun a rapid descent. “For a flight attendant to say rapid descent, it’s rapid and it’s quick. We don’t use those terms very loosely,” said Woodward.
The transponder on AA 11 was turned off at 8:21 and as a result, the altitude of the plane from this time on, is never officially known.
This analysis of the flight paths suggests that it was necessary for AA 11 and UA 175 to both pass over Stewart AFB in New Windsor, NY at the same time. The reason why this was necessary is unclear. This occurred at approximately 8:36am.
At this same time, 8:36am, AA 77 (the flight that hit the pentagon) had deviated from its flight path and changed altitude. AA 77 was instructed by ATC to make two, 20 degree, turns and change altitude before returning to its scheduled flight path. This is routene procedure to aviod other aircrafts (traffic).
8:34:17 — Controller 3: American 77 turn twenty degrees right vector for your climb.
8:39:30 — Controller 3: American 77 amend your altitude maintain flight level three three zero for traffic.
Routine radio communication was made with the pilot of AA 77 at 8:51. Shortly thereafter, the plane was suspected to have been hijacked since it made an unauthorized turn at 8:54 and then the transponder wass turned off at 8:56. Once the transponder was turned off, the flight path taken towards the Pentagon cannot be determined because ATC could not track the plane with primary surveillance radar (PSR). PSR operates totally independently of the target aircraft – that is, no action from the aircraft is required for it to provide a radar return. Since ATC could not track AA 77 with PSR like they had done with the other three hijacked planes when their transponders were turned off, ATC assumed it crashed. This reasonable assumption allowed AA 77 to hit the pentagon at 9:37 without being intercepted by the military.
Click for enlarged image
The fact that AA 11 and UA 175 crossed paths at the same time is too improbable to be regarded as a coincidence, implying that this was necessary for the attack. Further research needs to be done on this topic to determine what happened to AA 11 and UA 175 over Stewart AFB in New Windsor, N.Y. at 8:36am when AA 11 began a rapid decent. What happened at 8:36am on 9/11/01?
Special thanks to Adam Letalik for this research piece.”
“Bin Laden’s London base
March 9, 2017
This is an edited extract from Secret Affairs: Britain’s Collusion with Radical Islam
In July 1994, Osama Bin Laden established an office in London, called the Advice and Reformation Committee (ARC), which sought to promote worldwide opposition to the Saudi regime – an immediate response to the Saudis revoking his citizenship, according to a declassified CIA report. Run from a house in Wembley, north London, the ARC was equipped with a bank of fax machines and computers which churned out dozens of pamphlets and communiqués lambasting the lavishness of the House of Saud and its waywardness from promoting sharia law in the country, as well as calling for a break-up of the Saudi state. According to recent US court documents, the ARC was ‘designed both to publicise Bin Laden’s statements and to provide cover for activity in support for Al Qaeda’s “military” activities, including the recruitment of trainees, the disbursement of funds and the procurement of equipment and services.’ In addition, the London office served as a communication centre for reports on military, security and other matters from various al-Qaida cells to its leadership.
A US Congressional research service report, released just after the September 11th attacks in 2001, noted that Bin Laden even visited London in 1994 and stayed for a few months in Wembley to form the ARC. Other sources claim that he visited London in 1994 to meet members of the Algerian Armed Islamic Group (GIA), and even that he travelled regularly to London in 1995 and 1996 on his private jet. Whatever the truth of these claims, Bin Laden’s telephone billing records from 1996–8 show that nearly a fifth of his calls, 238 out of 1,100 – the largest single number – were made to London, showing the importance of this base. It was the ARC that arranged a meeting between Bin Laden and a number of CNN journalists in March 1997.
The ARC’s staff included two members of Ayman al-Zawahiri’s terrorist organisation, Egyptian Islamic Jihad (EIJ), Adel Abdel Bary and Ibrahim Eidarous, both of whom were later indicted in the US for involvement in the 1998 embassy bombings, when simultaneous explosions in Nairobi and Dar es Salaam killed over 200 people. Abdel Bary is alleged by the US to have managed al-Qaida training camps and guest houses before arriving in Britain, where he was granted asylum in 1993; two years later he was sentenced to death in absentia for his alleged involvement in the bombing of the Khan al-Khalili tourist landmark in Cairo. In May 1996 Abdel Bary is accused of being appointed by al-Zawahiri as leader of the London cell of the EIJ.
Eidarous is alleged to have begun organising the EIJ’s cell in Azerbaijan in August 1995 before coming to London in September 1997 to become the leader of its London base. While in Britain, where he was also granted political asylum, Eidarous is accused of maintaining satellite phone links with the al-Qaida leadership, and, with Abdel Bary, of providing forged passports for EIJ operatives in the Netherlands and Albania. On the day of the East Africa bombings, both disseminated the claims of responsibility through faxes to the media; lawyers for the two men deny that they had advance knowledge of the bombings but an MI5 officer, later giving evidence to an immigration appeal, stated that the faxes were actually sent before the bombings took place. The two men were detained by the Special Branch in September 1998 under the Prevention of Terrorism Act, on charges that they were associated with the 1998 bombings.
The head of Bin Laden’s ARC was the Saudi dissident Khaled al-Fawwaz, who was arrested by British police acting under a US extradition request in September 1998 for his alleged involvement in the East Africa bombings the previous month. Until this point the British authorities had allowed al-Fawwaz and the ARC to operate openly for four years. The US indictment against al-Fawwaz alleges that he provided Bin Laden with ‘various means of communications’, including a satellite telephone to speak to al-Qaida cells, and that he visited Nairobi in 1993 and established a residence there for Abu Ubaidah, one of al-Qaida’s military commanders. Al-Fawwaz has been held in Britain since 1998, and US attempts to have him extradited have been consistently blocked by the British courts after appeals by al-Fawwaz’s lawyers claiming his human rights would be breached in US prisons.
The evidence suggests that the ARC’s activities were initially tolerated by the British, who may have seen them as a useful source of intelligence. Al-Fawwaz’s lawyers have, for example, said that he was in regular contact with MI5 from the time he came to Britain in 1994 until his arrest four years later. His meetings often lasted for three or more hours while his phone was probably tapped and his correspondence intercepted. ‘Perhaps MI5 thought it was better to monitor al-Fawwaz … for intelligence,’ the Guardian has noted.
After the terrorist massacre of tourists in Luxor, Egypt in November 1997, Egypt’s President Mubarak blasted the British for hosting militants in London allegedly linked to this and other attacks, including Abdel Bary, and requested their extradition. It has been reported that the British government refused this request. However, it appears that the government did indeed seek to deport the militants, following a request from the Egyptians, but was hindered by Egypt’s rejecting a British request to ensure that they would get a fair trial and, if found guilty, would not be executed. Thus the deportation was prohibited by the European human rights convention, which forbids deportation of suspects who might be subject to torture or inhuman treatment.
Another Saudi dissident in London was Saad al-Faqih, a former professor of surgery at King Saud University who had lent his medical expertise to the anti-Soviet jihad in Afghanistan. Al-Faqih fled Saudi Arabia in 1994 and set up another opposition group to the regime, the Movement for Islamic Reform in Arabia (MIRA), in London in 1996 and was given political asylum. Al-Faqih has recently said that he maintains ‘high-level contacts’ with the British intelligence services and gives them advice about Saudi Arabia. In 2004, the US government designated al-Faqih as a provider of financial and material support to al-Qaida since the mid-1990s, and accused him of being in contact with Bin Laden. However, Al-Faqih has been living openly in Britain for well over a decade and has not once been questioned by the British authorities. His alleged involvement in terrorism has been questioned by several well-informed analysts, who point to the fact that no case has been brought against him, let alone proven, that MIRA is a legitimate opposition group to the Saudis and that his designation by the US as a terrorist is mainly about placating its Saudi client.
But the British may have seen the ARC and other Saudi groups as providing more than just intelligence. The American journalist Steve Coll, citing interviews with British officials, offers a reason why Britain was reluctant to crack down on the centres of opposition to Saudi Arabia: ‘It was an article of faith in Washington and London during the early 1990s that a little outside pressure, even if it came from Islamists, might help open up the Saudi kingdom to new voices, creating healthier and more stable politics in the long run.’ Coll’s notion that British and US planners wanted to use an Islamist lever to influence the Saudi internal agenda is certainly credible and consistent with past policies in the region. However, his notion that this aimed at ‘healthier’ (rather than simply pro-Western) politics is less credible: London and Washington were more likely to have seen internal reform as a way of consolidating the House of Saud’s rule.
Al-Faqih himself provides another explanation for the British government tolerating these groups. Asked in an interview in November 2003 about living in Britain, al-Faqih replied that the British ‘have discovered that betting on strategic relations with the [Saudi] regime is dangerous. It is better to have relations with the people and I assume they know how much public support we have.’ Al-Faqih also recently said that ‘the British are shrewd enough to know that the Saudi regime is doomed and they want to be in a position to deal with alternative leaders.’ Al-Faqih here exaggerates the support for MIRA in Saudi Arabia and it is nonsense to equate it with ‘the people’. Yet the point that Britain was attempting to cultivate relations with future policy-makers in the country by tolerating these opposition groups is certainly credible. While Britain has long shored up the feudal rulers of Saudi Arabia, the long-term stability of the regime has equally long been questioned. Again, opposition groups could act as a kind of proxy force for Whitehall; to a certain extent, therefore, Britain may have been trying to play both sides.
The London base allowed Bin Laden to motivate his supporters around the world. The perpetrators of the 1995 bomb attacks in Saudi Arabia had read Bin Laden’s writings after being faxed them from London. It was also London from that various of Bin Laden’s key fatwas were sent around the world. The ARC, for example, disseminated the English translation of Bin Laden’s August 1996 declaration of jihad against the Americans ‘occupying the Land of the Two Holy Places’, calling for the US to be driven from Saudi Arabia, the overthrow of the House of Saud and Islamic revolution all over the world. Two years later, in February 1998, the ARC publicised Bin Laden’s creation of an ‘International Front for Jihad against the Crusaders and the Jews’, joining together a variety of terrorist groups. However, ‘this caused little stir in Whitehall’, Times journalists Sean O’Neill and Daniel McGrory note.
Also instructive is that the British and US intelligence services repeatedly turned down the chance to acquire information on Bin Laden and al-Qaida in the 1990s. In early 1995, for example, the Sudanese government, then hosting Bin Laden, offered to extradite or interview him and other key operatives who had been arrested on charges of planning terrorist atrocities. The Sudanese proferred photographs and details on various Arab–Afghans, including Saudis, Yemenis and Egyptians who had fought in Afghanistan against the Soviets. ‘We know them in detail,’ said one Sudanese source. ‘We know their leaders, how they implement their policies, how they plan for the future. We have tried to feed this information to American and British intelligence so they can learn how thing can be tackled.’ This Sudanese offer was rejected, reportedly due to the ‘irrational hatred’ the US felt for the Sudanese regime, as was a similar subsequent offer made specifically to MI6. Three years later, Britain was also to ignore an arrest warrant for Bin Laden issued by Libya, as we see in Chapter 13.
So safe did Bin Laden’s supporters feel in London that, in 1995, they sent overtures to the Home Office enquiring whether their leader could claim political asylum. The then home secretary, Michael Howard, later said that an investigation by his staff into Bin Laden resulted in a banning order being placed on him. In January 1996, the Home Office sent a letter to Bin Laden stating that he be ‘excluded from the United Kingdom on the grounds that your presence here would not be conducive to the public good.’Presumably, giving asylum to Bin Laden would have been a step too far for the British in view of their need to be seen to be placating the Saudis.
The 1998 US embassy bombings were not the only terrorist outrages being planned by Bin Laden, or those close to him, during the period 1994–98. By late 1994, the CIA was designating Bin Laden as a terrorist threat, knowing that his inner circle were working closely with the Sudanese intelligence services which were, in turn, running terrorist and paramilitary operations in Egypt and elsewhere. In June 1995, an al-Qaida team attacked Egyptian President Mubarak’s presidential motorcade during a visit to the Ethiopian capital, Addis Ababa. In 1996 a secret CIA analysis showed that the US was aware of Bin Laden’s financing of Islamic extremists responsible for attempted bombings against one hundred US servicemen in Aden in December 1992, funneling money to Egyptian extremists to buy weapons and bankrolling ‘at least three terrorist training camps in northern Sudan’. After moving to Afghanistan in May 1996, Bin Laden set up terrorist training camps there under the protection of the Taliban. It beggars belief that British intelligence was also not aware of Bin Laden’s activities during the period when it tolerated his London base.
In contrast to Britain’s toleration of the ARC and MIRA, different treatment was meted out to the leader of another Saudi opposition group in London, Mohamed al-Masari, a refugee from Saudi Arabia who in 1994 established the Committee for the Defence of Legitimate Rights. By early 1995, the Saudi government was vigorously protesting to Whitehall about al-Masari’s attempts to subvert the Saudi regime, and threatening to cancel arms deals if the government failed to take action against him. Given the high stakes involved, in April and May 1995, Foreign Secretary Douglas Hurd and Prime Minister John Major gave speeches apparently directed at al-Masari saying that Islamic dissidents were ‘extremely unwelcome’ in London. The following December, Whitehall, prioritising arms exports to the Saudis, took the unprecedented step of ordering al-Masari’s expulsion, and attempted to dispatch him to wherever local authorities could be persuaded, settling on the Caribbean island of Dominica, to whom British aid was quadrupled as a sweetener. However, the British courts ruled that the expulsion would be illegal, the government having failed to show that al-Masari would not be in danger after his removal. According to former CIA officer, Robert Baer, the Saudis were behind at least two assassination attempts against al-Masari; it is not clear whether these were in Britain or elsewhere.
The Guardian interpreted the Major and Hurd speeches as a sign that the government’s stance towards Islamic dissidents was hardening, prompted by Arab governments pressing Britain to clamp down on them. Yet government action was largely limited to al-Masari, clearly to appease the Saudis, while until September 1998 other dissidents, like Bin Laden’s associates, were allowed to go about their business freely. They appeared to operate with the tacit consent of the British authorities, with the most likely reason being that, consistent with the historical record, they were seen as useful to the British.
Published in: Egypt, Saudi Arabia, Terrorism”
“RESTON, VA (PRWEB) MAY 19, 2011 Serco Inc., a provider of professional, technology, and management services to the federal government, has been recognized as Supplier of the Year by The Boeing Company in the Technology category for its state-of-the-practice Enterprise Architecture solutions.
The Boeing Supplier of the Year award is the company’s premier supplier honor, presented annually to its top suppliers in recognition of their commitment to excellence and customer satisfaction. This year’s 16 winners represent an elite group among more than 17,525 active Boeing suppliers in nearly 52 countries around the world. This selection was based on stringent performance criteria for quality, delivery performance, cost, environmental initiatives, customer service and technical expertise. This is the second time Serco has been recognized as Supplier of the Year by Boeing. In January 2011, Serco also received the Boeing Performance Excellence Gold Award in recognition of the Company’s performance excellence.
“We are extremely honored to receive this recognition for our work in support of Boeing. This prestigious award demonstrates our passion for excellence and ability to apply Serco‘s Enterprise Architecture expertise across a broad range of applications,” said Ed Casey, Chairman and CEO of Serco. “We continue to grow our EA practice, and over the past 15 years we have deployed solutions to support enterprises and systems across federal and commercial environments.”
Serco‘s Enterprise Architecture Center of Excellence is based in Colorado Springs, CO. The team provides a variety of services in support of Boeing’s business units as well as research and development efforts. Serco‘s architecture employs object-oriented (OO)/Unified Modeling Language (UML) to define, design and satisfy defense agencies’ mission-critical requirements, including Command, Control, Communications, Computers and Intelligence (C4I). This approach improves system developer’s understanding of operational requirements and how best to integrate enterprise operations and systems for the optimal fulfillment of C4I and other operational needs.”
“Boeing Phantom Works is the advanced prototyping arm of the defense and security side of The Boeing Company. Its primary focus is developing advanced military products and technologies, many of them highly classified.
Founded by McDonnell Douglas, the research and developmentgroup continued after Boeing acquired the company. Its logo is similar to one used for the McDonnell Douglas F-4 Phantom fighter.
… Phantom Works’ organization mirrors that of Boeing’s Defense business units, with ‘Advanced’ versions of each unit (e.g. Advanced Boeing Military Aircraft). The underlying technology is provided by the Boeing Research and Technology (BR&T) organization, who develop new technologies (i.e. Technology Readiness Level 1–4) for use by Boeing’s Commercial and Defense units. Phantom Works responsibility is to grow those technologies into prototype (i.e. Technology Readiness Level 4–6) to then transition those prototypes to the business units to turn into products (i.e. Technology Readiness Level 7–9).
Headquartered in Washington D.C., Phantom Works has projects in most Boeing locations in the United States.
Additionally an international group does modelling and simulation work for various governments in the United States, Britain, Australia, and India.”
“UK’s Crime Squad picks face-recognition tech
December 3, 2001 Posted: 9:07 a.m. EST (1407 GMT)
LONDON, England (IDG) — Imagis Technologies Inc. [Chairman Buck Revells] and Serco Group PLC are working with the UK’s National Crime Squad (NCS) to develop a facial-recognition application for use in crime fighting.
The squad is working on a national database based on Imagis ID-2000 facial-recognition technology to use as a tool for keeping track of convicted pedophiles and other criminals, Imagis announced at the Biometrics 2001 Conference here on Thursday.
“We are working with both Imagis and Serco on the technology,” an NCS spokesman confirmed.”
“Serco Processes 2 Millionth Patent Application for U.S. Patent and Trademark Office
March 19, 2013 RESTON, VIRGINIA – March 18, 2013 – Serco Inc., a leading provider of professional, technology, and management services to the federal government, announced today that their Pre-Grant Publication (PGPubs) Classification Services team recently processed their 2 millionth patent application for the U.S. Patent & Trademark Office (USPTO). Each application was also processed within the contractually required 28-day window.”
“Methods and systems for remote control of self-propelled vehicles
A method and system for remote control of self-propelled vehicles includes a leader vehicle and at least one follower vehicle located behind the leader vehicle. The leader vehicle traverses a waypoint, determines a first set of GPS coordinates corresponding to the waypoint, and transmits the first set of GPS coordinates to the follower vehicle. The follower vehicle determines a second set of GPS coordinates corresponding to its own position and compares the first set of GPS coordinates to the second set of GPS coordinates. By controlling steering, drive and braking systems of the follower vehicle with a servo-actuator, the follower vehicle is guided toward the waypoint by minimizing the difference between the first and second sets of GPS coordinates. This process is repeated at a succession of waypoints such that the follower vehicle traverses the same course as the leader vehicle.
Inventor: Mark L. Farwell; Douglas E. Caldwell
Current Assignee: Exelis Inc
Original Assignee: ITT Manufacturing Enterprises Inc
Priority date: 2001-08-28
Family: US (1)
DateApp/Pub NumberStatus: 2001-08-28US09939764Expired – Fee Related
External links: USPTO; USPTO Assignment; Espacenet; Global Dossier
“ITT Exelis Dr. Pamela (Pam) Drew is a globally focused P&L executive with a distinguished and progressive career path that includes top-level executive positions with Boeing, Northrop Grumman, TASC and ITT Exelis. She is a highly accomplished and respected business leader with a proven track record of successfully leading businesses of large scale and complexity, with as many as 8,000 employees and annual business volume of up to $3 billion in annual revenue. Her career highlights include generation of multi-billion dollar contract awards through innovative application of advanced technologies, often in very short time horizons, for customers in the military, global/homeland security, civil and commercial aviation markets. Pam is also a nationally recognized expert and has been a member or chair of various advisory boards including the National Academies of Sciences, Engineering and Medicine.
In July 2015, Pam retired upon the Harris acquisition of ITT Exelis. She now serves as the Vice President of the Board of Trustees for the United States Air Force Museum Foundation, a member of the Board of Directors of the University of Washington Applied Physics Lab, a member of the University of Colorado, Boulder Strategic Advisory Council, and a member on the Advisory Council to the Johns Hopkins University Carey Business School.
Pam earned her B.A. in Mathematics, M.S. and Ph.D. in Computer Science from the University of Colorado, Boulder where she was recognized in 2004 with the Distinguished Engineering Alumni Award and in 2015 with the George Norlin “Outstanding Alumni” Award. Pam is a National Association of Corporate Directors (NACD) Governance Fellow.”
“Pamela Drew Appointed to Serco Inc. Board of Directors
NEWS PROVIDED BY
Feb 15, 2018, 10:21 ET
RESTON, Va., Feb. 15, 2018 /PRNewswire/ — Serco Inc., a provider of professional, technology, and management services and subsidiary of Serco Group plc, announced today that Pamela Drew has been appointed to the Board of its U.S. business. Drew has a distinguished 30 year career that includes top-level executive positions with defense and aerospace companies.
Drew has a successful track record of leading businesses of large scale and complexity at Northrup Grumman, Exelis, TASC, and Boeing. She has managed businesses of $3B in annual revenue and with over 8,000 employees. In addition, she has lead and implemented strategies to address engineering technical services.
“Pam Drew is a highly accomplished and respected business leader, and we are so pleased she has joined our board of directors. Her dynamic track record of pursuing and capturing major new business will be a great asset for Serco,” said Dave Dacquino, Chairman and Chief Executive Officer of Serco Inc. “We look forward to her contributions in the areas of defense market sector growth strategies, operational excellence processes, and advancing our engineering technical services.”
Currently, Drew serves as the Vice President of the Board of Trustees for the United States Air Force Museum Foundation, a member of the Board of the Directors of the University of Washington Applied Physics Lab, a member of the University of Colorado (Boulder) Strategic Advisory Board, and a member of the Dean’s Advisory Council at John Hopkins Carey Business School. She earned her B.A. in Mathematics, M.S. and Ph.D. in Computer Science from the University of Colorado (Boulder) where she was recognized in 2004 with the Distinguished Engineering Alumni Award, and in 2015 with the George Norlin “Outstanding Alumni” Award.
About Serco Inc.
Serco Inc. is a leading provider of professional, technology, and management services. We advise, design, integrate, and deliver solutions that transform how clients achieve their missions. Our customer-first approach, robust portfolio of services, and global experience enable us to respond with solutions that achieve outcomes with value. Headquartered in Reston, Virginia, Serco Inc. has approximately 8,000 employees and annual revenue of $1 billion. Serco Inc. is a wholly-owned subsidiary of Serco Group plc, a $5 billion international business that helps transform government and public services around the world. More information about Serco Inc. can be found at www.serco-na.com.
SOURCE Serco Inc.”
“August 21, 2008 RESTON, Va., Aug. 21, 2008 — Northrop Grumman Corporation (NYSE:NOC) has named Pamela A. Drew sector vice president for business development at its Mission Systems sector, reporting to Philip A. Teel, corporate vice president and president of Mission Systems.
Drew joins Northrop Grumman from The Boeing Company, where she most recently was vice president and general manager of Boeing Integrated Defense & Security Solutions.
“Pam brings both significant large program capture experience and general management skills to increase our focus on our strategic growth objectives,” said Teel. “As Northrop Grumman’s Mission Systems positions for future opportunities, Pam’s demonstrated ability to lead — and win — large, complex mission system projects will be a tremendous asset not only for the sector but also for the corporation.”
At Boeing, Drew also served as vice president and general manager for its C3ISR Solutions business and as vice president of engineering and information technology for Boeing Phantom Works. Before joining Boeing in 1996, Drew was an Assistant Professor of Computer Science at the Hong Kong University of Science and Technology and, previously, a member of the technical staff at U.S. West Advanced Technologies.
Drew earned a bachelor’s degree in mathematics and computer science, a master’s degree in computer science, and a Ph.D. in computer science from the University of Colorado in Boulder, Colo.
Northrop Grumman Corporation is a global defense and technology company whose 120,000 employees provide innovative systems, products, and solutions in information and services, electronics, aerospace and shipbuilding to government and commercial customers worldwide.
Northrop Grumman Mission Systems
“Prior to SBA, [Field McConnell’s sister] Ms. [Kristine] Marcy served in several roles at the Department of Justice, including Senior Counsel for Detention and Deportation at the Immigration and Naturalization Service (INS), where she oversaw the full range of INS detention and deportation programs and addressed multiple infrastructure and management problems stemming from rapid growth (up 45 percent) in the detention program. Prior to her position at INS, Ms. Marcy served for five years as the Associate Director for Operations Support of the Department of Justice, U.S. Marshals Service (USMS). There, she directed DOJ’s detention program for more than 23,000 prisoners (the nation’s largest). In 1995, she was assigned responsibility by the Attorney General for developing a DOJ-wide transportation system known as the Justice Prisoner and Alien Transportation System, or JPATS-a nationwide network of leased commercial and government-owned aircraft and ground vehicles. While at the USMS, she also developed a prisoner medical services program and directed the agency’s $1.6 billion seized assets program that redirected proceeds forfeited by criminals and crime organizations to local and Federal law enforcement. Prior to the USMS, she was the Associate Deputy Attorney General for the Department of Justice, where she served as a lawyer who prepared the Deputy Attorney General for duties related to budget and appropriations, executive personnel, and other management areas. She also oversaw activities of the Justice Management Division, Bureau of Prisons, Office of Justice Programs, the Inspector General, and the U.S. Trustees (bankruptcy program).”
“The Senior Executive Service (SES) is a position classification in the civil service of the United States federal government, somewhat analogous to general officer or flag officer ranks in the U.S. Armed Forces. It was created in 1979 by Kristine Marcy [Field McConnell’s sister!] when the Civil Service Reform Act of 1978 went into effect under President Jimmy Carter.”
“Real-time interactive wagering on event outcomes
US 8512129 B2
Systems and methods for real-time interactive wagering on event outcomes are presented. Clients are first qualified and given wagering limits before being allowed to interactively wager on event outcomes. Event outcomes may be based on, for example, financial markets and indices, sporting and entertainment events, casino performances, and natural phenomena such as weather and earthquakes. Events on which wagers can be placed include both those with known and unknown outcome probabilities, and wagers can be a fixed-odds type or a spread-bet type. Wager transactions, including acceptances and confirmations, are executed in real time. Clients can customize displays of events on which they are authorized to wager. Real-time client credit management, automatic dealer hedging, automatic price-spread adjustments, and automatic client and dealer defined wagering limits are also provided.
Publication number: US8512129 B2
Publication type: Grant
Application number: US 09/846,025
Publication date: Aug 20, 2013
Filing date: Apr 30, 2001
Priority date: May 1, 2000
Fee status: Paid
Also published as: CA2407679A1, 17 More »
Inventors: Philip M Ginsberg, Andrew C Gilbert, Howard W Lutnick, Lewis Findlay
Original Assignee: Cfph, Llc
Export Citation: BiBTeX, EndNote, RefMan
Patent Citations (181), Non-Patent Citations (83), Referenced by (5),Classifications (16), Legal Events (3)”
“Method for efficient management of certificate revocation lists and update information
US 5699431 A
A method which allows implementation of the revocation of public-key certificates facilitates engineering of certificate revocation lists (CRLs). It solves the practical problem of CRLs potentially growing to unmanageable lengths by allowing CRLs to be segmented, based on size considerations or priority considerations related to revocation reasons. The method is used to distribute CRL information to users of certificate-based public-key systems. It is also applied more generally to update any field in a certificate by reference to a secondary source of authenticated information.
Publication number: US5699431 A:
Publication type: Grant
Application number: US 08/556,360:
Publication date: Dec 16, 1997:
Filing date: Nov 13, 1995
Priority date: Nov 13, 1995
Fee status: Paid
Inventors: Paul C. Van Oorschot, Warwick S. Ford, Stephen W. Hillier, Josanne Otway
Original Assignee: Northern Telecom Limited
Export Citation: BiBTeX, EndNote, RefMan
Patent Citations (9), Non-Patent Citations (8), Referenced by (194), Classifications (5), Legal Events (11)
External Links: USPTO, USPTO Assignment, Espacenet”
Nortel Government Solutions, in collaboration with the Department of Justice (DOJ), built the Joint Automated Booking System (JABS) — a centralized system for automating the collection of fingerprint, photographic and biographic data, submitting this data to the FBI, and sharing it with participating law enforcement agencies nationwide.”
“Pansy Ho Chiu King, co-chairperson of Macau casino operator MGM China Holdings Ltd, said the firm would focus on the quality of its customers at the new property MGM Cotai (pictured), a casino resort built with facilities that can cater to “any sorts of events”. Ms Ho additionally said that she does not expect the firm’s VIP business to be cannibalised by other gaming operators, as the Cotai property nears completion. MGM China said in September that its under-construction casino resort on Cotai is on target to open on January 29, 2018. That is more than one year later than outlined in the original timetable presented by the company. The company currently operates a single property, MGM Macau, in the city’s traditional downtown casino district. The company’s chief executive Grant Bowie told Hong Kong media on Monday that the firm plans to have five junket operators at MGM Cotai, which could help with the ramp up of the new property. Mr Bowie had previously mentioned during a conference call on the firm’s third-quarter results that MGM Cotai would initially open offering only “in-house VIP” gaming; but the firm had a programme to add junkets “as quickly as” it could.”
“Tencent targets hackers and cheaters of its top-selling game PUBG
TECHNOLOGY / 17 JANUARY 2018, 1:30PM / BLOOMBERG
INTERNATIONAL – Tencent Holdings is going after the cheaters and hackers who infest PlayerUnknown’s Battlegrounds (PUBG) as it prepares to bring the world’s top-selling game to China.
Ahead of its official debut this year, the biggest gaming company on the planet has enlisted Chinese police to root out the underground rings that make and sell cheat software. It has helped law enforcement agents uncover at least 30 cases and arrest 120 people suspected of designing programs that confer unfair advantages from X-ray vision (see-through walls) to auto-targeting (uncannily accurate snipers). Those convicted in the past have done jail time.
Tencent and game developer Bluehole have a lot riding on cleaning things up for China, which accounted for more than half the game’s 27million users, according to online tracker Steam Spy. It’s also the biggest source of cheat software, undermining a Battle Royale- style phenomenon that shattered gaming records last year and surpassed best-sellers like Grand Theft Auto V.”
“Tencent Holdings Limited (Chinese: 腾讯控股有限公司; pinyin: Téngxùn Kònggǔ Yǒuxiàn Gōngsī; literally: “Soaring information”; SEHK: 700) is a Chinese multinational investment holding conglomerate whose subsidiaries specialize in various Internet-related services and products, entertainment, AI and technology both in China and globally. Its twin-skyscrapers headquarters Tencent Seafront Towers (also known as Tencent Binhai Mansion) are based in Nanshan District, Shenzhen, and has received several awards for its architecture.
Tencent is the world’s biggest investment corporation, one of the largest Internet and technology companies, as well as the largest and most valuable gaming and social media company in the world. It is one of the top 5 biggest firms in the world. Its many services include social network, music, web portals, e-commerce, mobile games, internet services, payment systems, smartphones, and multiplayer online games, which are all among the world’s biggest and most successful in their respective categories. Offerings in China include the well-known instant messenger Tencent QQ and one of the largest web portals, QQ.com. Its mobile chat service WeChat has helped bolster Tencent’s continued expansion into smartphone services, and has been credited as one of the world’s most powerful apps. It also owns majority of China’s music services (Tencent Music Entertainment), with more than 700 million active users and 120 million paying subscribers, the world’s largest and most profitable.
As of January 2018, the company has a market value of US$580 billion (HK$4.48 trillion), and is Asia’s most valuable company, with continued revenue growth, massive user base and investments into new areas. It maintained an exceedingly high buy rating of 98% from stock watchers, credited to its bullish outlook. It is the first Asian company to cross the US$500 billion valuation mark, while surpassing Facebook in market value on 20 November 2017, and became the world’s most valuable social media company. Tencent has been credited as one of the world’s most innovative companies by numerous media and firms, such as Boston Consulting Group.
Tencent controls hundreds of subsidiaries and associates in numerous industries and areas, creating a broad portfolio of ownerships and investment across a diverse range of businesses including e-commerce, retail, video gaming, real estate, software, virtual reality, ride-sharing, banking, financial services, fintech, consumer technology, computer technology, automobile, film production, movie ticketing, music production, space technology, natural resources, smartphones, big data, agriculture, medical services, cloud computing, social media, IT, advertising, streaming media, artificial intelligence, robotics, UAVs, food delivery, courier services, e-book, internet services, education and renewable energy. It is one of the most active investment corporations in the world, with recent focus on start-ups within Asia’s burgeoning tech scene.”
“But it is in China that Haig has carved out a special niche as a door opener for American companies. The general has been a steadfast advocate for China ever since he led the advance team for President Nixon’s historic 1972 visit. Later, as secretary of state, he earned the respect of the Chinese leadership by holding fast against the powerful Taiwan lobby in Washington. (He saw China as a useful ally in the struggle against the Soviet Union.) Haig continues to speak out for Beijing in his present role. Perhaps the most striking example came when he turned up at Tiananmen Square on October 1, 1989 — four months after the notorious crackdown — to mark the 40th anniversary of the founding of the People’s Republic. The only American to grace the proceedings that evening, Haig knew that the United States and all other Western ambassadors would be boycotting the event, but he shared the podium with Chinese leader Deng Xiaoping, who congratulated him on his courage in appearing.
More on Buck Revells http://forum.prisonplanet.com/index.php?topic=83769.0
Oliver ‘Buck’ Revell is the FBI’s former Assistant Director who spent 30 years working his way up to the highest rank in career government service. Upon Buck Revell’s retirement in 1994, he founded Revell Group International (RGI), a global network of former senior FBI, security service, intelligence, diplomatic, law enforcement and military officials with a broad range of international business and technical experience. Revell graduated from East Tennessee State University and got his Masters from Temple University in Public Administration. He served four years in the Marines as an aviator and left as a Captain. … In January 1981, Assistant Director Revell was placed in charge of the Administrative Services Division where he was responsible for Personnel, Budget, Finance and Physical and Personnel Security Operations of the FBI. In May 1982, Revell was again placed in charge of the Criminal Investigative Division and given the additional responsibility of planning and implementing the FBI’s newly acquired drug enforcement jurisdiction. In July 1985, Revell was promoted to Executive Assistant Director – Investigations (SES-6) the highest rank in career government service. He served as the Director’s deputy in charge of Criminal Investigative, Counter-Terrorism and Counter-Intelligence activities. He was also responsible for international investigative and liaison activities of the Bureau, including its Legal Attaché and INTERPOL operations. …
On 21 December 1988, shortly before Pan Am Flight 103 took off from London’s Heathrow airport at 18:25 hours, FBI Assistant Director Oliver “Buck” Revell reportedly rushed out onto the tarmac and pulled his son and daughter-in-law off the plane. The Lockerbie bombing was not the first time authorities were warned of an impending terrorist attack. The situation would repeat itself five years later in New York City, and seven years later in Oklahoma. It was an all too eerie coincidence.”
“The five paragraph order or five paragraph field order is a style of organizing information about a military situation for a unit in the field. It is an element of United States Army, United States Marine Corps and United States Navy Seabees of small unit tactics, and similar order styles are used by military groups around the world. An order specifies the instruction to a unit in a structured format that makes it easy to find each specific requirement. The five paragraphs can be remembered with the acronym SMEAC: “S” Situation, “M” Mission, “E” Execution, “A” Administration/Logistics, “C” Command/Signal.”
“Police drop investigation into Serco prisoner transport contract
The outsourcing group said there was no evidence of individual or corporate wrongdoing
By Marion Dakers
7:42AM GMT 19 Dec 2014
The City of London Police has closed an investigation into Serco‘s prisoner transport contract after more than a year of work, enabling the firm to continue with the contract until 2018.
The Ministry of Justice called in the police in August 2013 to examine whether Serco had misleadingly recorded prisoners as being ready for court when they were not, in order to meet the performance criteria of the contract.
However, Serco said on Friday that the probe into the Prisoner Escort and Custody Services (PECS) contract had been closed after the police found no evidence to support bringing charges against the outsourcing firm or its staff.
“The information obtained was also sufficient for the City of London Police to conclude there was no evidence of any corporate-wide conspiracy or an intention to falsify figures to meet the DRACT [designated ready and available for court time] contract requirement by senior Serco management or at the board level of the company,” the firm said in a statement.
The Ministry of Justice had said it would end the contract immediately if the firm’s board was found to have done wrong.
Serco a classic falling knife share, avoid
05 Jul 2014
Serco a classic falling knife share, avoid
10 Nov 2014
Serco agreed last year to repay all past profits and forgo any future profit on the PECS contract. The deal is due to run until August 2018 and involves Serco transporting prisoners to and from 24 Crown Courts, 43 Magistrates’ Courts, 24 prisons and 131 police stations.
The end of the investigation closes one chapter of Serco’s problems over the past few years. The company repaid £70m last year for overcharging the government on electronic tagging contracts, in a matter that was referred to the Serious Fraud Office.
The firm replaced its chief executive Chris Hyman with Rupert Soames in June, handing him the task of putting the firm back on an even keel. A rights issue is expected early next year to shore up Serco’s financial position.”
API Technologies to Purchase Casino-ID Software Application from
Facial Recognition Developer, Imagis Technologies
Vancouver, Canada – November 6, 2001: Imagis Technologies Inc. (OTCBB: IGSTF; CDNX: NAB; Germany: IGY),a leading biometric facial recognition company, today announced that API Technologies LLC will purchase the rights to Imagis’ Casino-ID product and will pay royalty fees to Imagis associated with API product sales that incorporate the Casino-ID software application. Casino-ID is an advanced software application for tracking incident-based information and images within the Casino environment.
API President, Dennis Nelson, said, “Having marketed Casino-ID since May 2001, it has become apparent that it goes far beyond existing gaming applications. By offering features and an array of functions that are not currently available, Casino-ID is in strong demand by the industry. In this heightened security environment, the use of Imagis’ facial recognition technology, ID-2000, together with Casino-ID, allows us to screen and track the movements of all staff, visitors and vendors. The Casino-ID solution will allow our gaming clients to create an enhanced security environment adding safety, comfort and peace of mind to the gaming entertainment experience.”
Casino-ID software captures, stores, and matches surveillance images quickly and easily. By cataloging intelligence data it identifies suspects and potential risks to protect gaming facility staff, clients and property. The purchase of the Casino-ID application will allow API Technologies to make enhancements to the software that will further increase the effectiveness of the product for Casino Managers.
Helena Campbell, formerly a Regional Sales Director for Imagis, has joined API Technologies as Vice President, Market Development. API plans to market the Casino-ID product line through its direct sales force and through its existing business partners within the gaming industry. API Technologies plans to integrate a comprehensive and functional gaming security database within Casino-ID and make it available to its customers.
Iain Drummond, Imagis Technologies’ President & CEO, said, “We see this as a truly synergistic partnership that will accelerate the adoption of Casino-ID by the gaming industry while providing Imagis with recurring revenues from royalty fees. This will allow Imagis to focus on the major opportunities in the airport, law enforcement, and security markets.
Imagis (OTCBB: IGSTF; CDNX: NAB; Germany: IGY) is a developer and marketer of software applications and advanced biometric facial recognition software solutions both as products and as a Software Development Kit. These applications provide a range of security solutions in various industry sectors including airports, law enforcement, customs, immigration and other government agencies, and gaming. Imagis currently has over 130 national and international installations within excess of a thousand users of its biometric facial recognition technology, including at Toronto’s Pearson International Airport, the world’s 16th busiest airport and Oakland International Airport, which serves more than 10 million travelers per year, and several installations throughout Canada, Mexico, and the UK. Imagis markets its products through a network of business partners located in North America, Asia, Europe and Latin America. Imagis’ Chairman is Oliver “Buck” Revell, who served for over 30 years in the FBI, and during his career advanced to the number two-career post of Associate Deputy Director. Imagis is on the web at http://www.imagistechnologies.com.
1300 – 1075 W. Georgia
Vancouver, BC Canada V6E 3C9
Tel: (604) 684-2449 Fax: (604) 684-4601
*Imagis Technologies Inc.
*Colloquium Capital Corp.
*Elliot Tulk Pryce Anderson, CA
*KPMG LLP (Vancouver)
*Grant Thornton LLP
*Lang Michener LLP
*Canaccord Genuity Corp.
*Raymond James Ltd.
*Visiphor (US) Corporation
*Sunatic Solutions Incorporated
*Imagis-Cascade Technologies Inc.
*Sunatic Solutions International, Inc.
*Computershare Trust Company of Canada
*CST Trust Company“
“SPECIAL COVERAGE OF STARNET’S HUGE PROBLEMS – A litany of lies and a dossier of deceit
LAS VEGAS CASINO INC. files STATEMENT of CLAIM against STARNET for $ 1 BILLION
STATEMENT OF CLAIM and WRIT OF SUMMONS
VANCOUVER REGISTRY FILING number: C994793
Read the POLICE documents here: 68 pages!
Gambling Magazine has been flooded with requests for more information on the Starnet issues since we started covering these cases. We regret that we cannot answer all your calls and e-mails, but we have a special coverage of the legal battles that will heat up. Many Readers also wanted to know if it is safe to use their software, and many investors would like to find out the truth about their investments. We will give you a lot of answers and show you some exclusive documents. Please stay tuned for this special coverage that will be updated regularly.
Another interesting Starnet story
Monday Aug. 23, 1999 — News…Hell’s Angels Involvement? Starnet warrant reveals early Robinson link. Perhaps the most interesting name to pop up in court documents for the search warrant of Starnet Communications International is that of Lloyd Robinson, a significant member of the Hell’s Angels in British Columbia, the controversial motorcycle club’s Canadian stronghold. [read more…]
Starnet Running “Illegal Game Servers”
Saturday Aug. 21, 1999 — Starnet?s own system administrators admitted that they were running the “illegal game servers” in Vancouver to supply a faster connection to a few favorite licensees. They also admitted that the child pornography material was on their servers. [read more…]
Report of Link Between Starnet and Raid on Premier’s House
Saturday Aug. 21, 1999 — The Vancouver Province reported the connection between Starnet and the North Burnaby Inn, which had applied for a casino licence and was central to the raid on the premier’s house, lies in the list of shareholders of both operations — who have also been linked by police to the Hells Angels. [read more…]
Starnet Police Raid Search Warrant Documents
Saturday Aug. 21, 1999 — Search warrant documents indicate the police believe Starnet was not only involved in illegal gambling and bet-taking, but also possession and distribution of obscene material and child pornography and possession of the proceeds of crime. The raid immediately triggered a massive panic sell-off of the company’s stock, resulting in the largest drop on U.S. markets of the day. [read more…]
The evidence that could bring STARNET down!
Saturday Aug. 21, 1999 — Email from Starnet regarding the taking of bets from Canadian players. [read more…]
Worst software of the year: STARNET
Thursday Aug. 19, 1999 — Starnet has admitted that their systems are down, far too often. Jason King is well known for not telling the truth and for promising things he has no intention of delivering, it?s pathological with him. His admissions do not reflect the true situation which is much worse. [read more…]
How does Starnet “steal” money from its licensees?
Tuesday Aug. 17, 1999 — Very simple: by running more than one accounting system, and cooking the books! Here is just one sample of many. [read more…]
Hard evidence of fraud and double accounting at Starnet
Tuesday Aug. 17, 1999 — Starnet had the bright idea to start business relations with Las Vegas Casino Inc. by stealing over 85% of all the money. It took Las Vegas Casino Inc. months to recover this money, and Starnet only decided to give it back after they got scared the auditors would come in to check their cooked books. [read more…]”
“Nortel Government Solutions, in collaboration with the Department of Justice (DOJ), built the Joint Automated Booking System (JABS) — a centralized system for automating the collection of fingerprint, photographic and biographic data, submitting this data to the FBI, and sharing it with participating law enforcement agencies nationwide.”
“Virtual Command Center
Real-Time Tool to Securely Monitor Criminal Incidents and Major Events Online
July 3, 2012
Originally published in the July 2012 edition of the CJIS Link, Volume 14, Number 2
.. In the modern law enforcement environment, agencies need to share information, collaborate, and join forces to combat crime and terrorism. Often they need to post, track, and spread information across departments and jurisdictions in a quick, secure way for an investigation or for a major occurrence. To satisfy this need for safe, inclusive communication, the LEO Operations Unit created the VCC capability in 2002. The LEO VCC is a situational awareness and/or crisis management tool used to share information about street-level and tactical activities among law enforcement operations centers and command posts. Since its inception, the VCC has been used by numerous agencies for local, national, and international events ranging from major case management to global events like presidential inaugurations.
Because the VCC resides on LEO, it is extremely flexible and can be used or viewed from multiple geographic locations. This makes it feasible for federal, state, and local law enforcement agencies to create joint efforts in investigations and law enforcement actions. The VCC exists on a secure system for any designated audience members online, not just those physically present at an event or a “brick and mortar” command center. Through the VCC, law enforcement can effectively manage a tactical incident in real time, 24/7, with both operational and technical support. As the VCC receives and posts relevant information and intelligence, it provides a comprehensive account of an incident or event to designated law enforcement channels.
The VCC provides an events board feature that permits information posts as an event occurs and allows listing of data such as photographs, scanned documents, or any information that would be useful to managing an event or crisis. Agencies hosting the VCC can permit access to individual persons or entire agencies as needed. Even critical incident managers, such as emergency planners, can now have remote access to a crisis without having to be on-scene. Recent enhancements to the VCC capability include the ability to display incidents by specific dates or times, improved refresh rates on the screens, and improved critical real-time monitoring of operations.
The FBI and the law enforcement community as a whole have benefited from the increased ability to share vital information and collaborate—even over previously unmanageable locality impediments—by the creation of the VCC. In 2011, LEO members created over 300 new VCCs and opened over 700 VCC event boards to collect, record, and securely publish information. As an indication of its effectiveness and adaptability, the law enforcement community has used the VCC not only during kidnappings, shootings, and special investigations, but also during major events such as NASCAR races, Republican and Democratic National Conventions, a presidential inauguration, the Super Bowl, the Pro Bowl, the Academy Awards, and the Hurricane Katrina relief effort.”