Kelly 298: Serco’s AWACS Spot-Fixing Crashes, Con Air Lutnick’s Death Pool #1, A Boeing 767 For AA Flight 11

General John F. Kelly
White House Chief of Staff
Washington, D.C. 20528

Open letter from the Cloud Centric Crime Scene Investigators of Abel Danger

June 16, 2018

Dear General Kelly:

Please accept Brief 298 from Field McConnell – United States Marine Corps whistle-blower and Global Operations Director of Abel Danger (AD) – wherein he lists the type of images and references with which we plan a series of training videos and crowd-funded docudramas to show injured communities how Serco appears to have been using the Southwest Research Institute’s (SwRI) Interactive training system for AWACS weapons directors US6053736A device to spot fix up to 18 ‘death-pool’ crashes of passenger planes which AD research has linked to attacks on the major airline alliances since 2001 and, in this brief, we focus on the “Con Air Lutnick Death Pool #1” where from the 47th Floor of WTC1 in New York, Serco’s shareholders and its investment banker NM Rothschild & Sons Ltd. allegedly bet on the time and body counts for the crash of the Boeing 767-223ER of American Airlines Flight 11 on 9/11.

AD believes that Rothschild agents trigger death pools by instructing or authorizing Serco‘s AWACS weapons directors to switch from simulated to live-fire or digital-fire events where Con Air SWAT teams are deployed through Jerome H. Lemelson’s Prisoner tracking and warning system and corresponding methods US 6054928 A to select aircraft as friend or foe with Jerome H. Lemelson’s Friend or foe detection system and method and expert system military action advisory system and method US 6166679 A and conceal death-pool bets on Howard W Lutnick’s Real-time interactive wagering on event outcomes US 8512129 B2 with The Boeing Co’s Encryption for asymmetric data links US7023996B2.

AD believes that the media play and news injects of the story of the crash of the Boeing 767-223ER of AA Flight 11 on 9/11 has the characteristics of what qualifies as a Con Air Lutnick Death Pool #1 event.

AD notes that General Haig injected fake news of a Bin Laden role 14 minutes after impact consistent with the Serco shareholders on the 47th floor of WTC1 use of AWACS weapons directors to switch from simulation to synchronized digital-fires events during the Global Guardian exercise.

AD notes that the precise timing and location of the crash was consistent with the AWACS weapons directors’ use of Lockheed Martin Corp’s Rocket-boosted guided hard target penetrator Priority date 1999-04-22 … 2001-08-21US6276277B1 to camouflage the use of a Con Air SWAT team to murder 658 of Howard Lutnick’s colleagues including his brother in Cantor Fitzgerald’s office in WTC1.

AD notes that the presence of the ACE [Con Air?] Elevator mechanics who ‘scattered like cockroaches’ as the towers collapsed is consistent with AWACS weapons directors use of Con Air SWAT teams to embed incendiary devices in Alcoa Architectural Products Sas’s Double sheet aluminum panel and method for manufacture thereof US20160096343A1 and FMC Corp’s SCR firing circuit for high voltage control applications US14873556 for the spoliation of evidence of Con Air Lutnick death pool betting.

Abel Danger invites you to bring in the best brains of the Marine Corps Intelligence Activity to see if they can use what they were taught by Serco‘s digital fires instructors to unravel the truth of the Con Air Lutnick Death Pools 1-18 (see below) before Abel Danger solves the cases with help of the injured communities.

If you are not sure the MCIA can recognize an AWACS man-in-the-middle attack, call Field McConnell.

 

9/11 Alexander Haig Had Inside Knowledge Of The World Trade Center Bombing

Trump saw on 9/11/2001: bombs were used in WTC

9/11 Elevator Access

9/11 Firefighters Reveal Bombs Destroyed WTC lobby

 

SERCO GROUP PLC: List of Subsidiaries AND Shareholders! [Note representatives of Serco‘s private-equity groups, Serco‘s investment banker N M Rothschild (Wilbur Ross?) and Serco shareholders, including the British and Saudi Arabian governments, AXA (Co-developer of and with a presumed virtual office in the Trump Tower), Allianz, 10 Global Custodians with $100 trillion under management and the TIAA pension fund met in a junket (wagering) room on the 47th Floor of North Tower (WTC1) on 9/11!]

Yours sincerely,

 

Field McConnell
USMC 0116513
P O Box 39
Plum City WI 54761″
+001-715-307-8222

 

“Digital Fires Instructor Serco[Marine Corps Base!] Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”

“American Airlines Flight 11 was a domestic passenger flight that was hijacked by five al-Qaeda members on September 11, 2001, as part of the September 11 attacks. Mohamed Atta deliberately crashed the plane into the North Tower of the World Trade Center in New York City, killing all 92 people aboard and an unknown number in the building’s impact zone. The aircraft involved, a Boeing 767-223ER, registration N334AA,[1]was flying American Airlines’ daily scheduled morning transcontinental service from Logan International Airport, in Boston, Massachusetts, to Los Angeles International Airport, in Los Angeles, California.”

“The Incredible 9-11 Evidence We’ve all Been Overlooking by Leonard Spencer

We’ve All been Overlooking In trying to piece together what really happened on September 11, a lot of work has been done — much of it useful and interesting — into those ‘hijacked’ flights for which the publicly-available evidence is sketchy and contradictory. There are web sites for instance wholly dedicated to investigating the true fate of Flight 93 and others that attempt to get a clearer idea of what really happened at the Pentagon. Both these incidents however are characterised by a pronounced absence of substantive material evidence and it is this, I suppose, that raises our suspicions and curiosity.

There is one flight however that has received insufficient attention and this is American Airlines Flight 11, the plane that allegedly crashed into WTC1, the North Tower. It was the first of the terrorist attacks that day. It has been a big mistake not to subject this flight to the same kind of scrutiny as the others because, unlike the others, a very good and important piece of documentary evidence of this flight exists in the public domain. This is the so-called ‘Fireman’s Video’ and we really haven’t looked at it closely enough. It really does deserve a second look.

http://www.serendipity.li/wot/spencer/incoming.jpgThe story of the ‘Fireman’s Video’ is well known. Two French filmmakers, the Naudet Brothers, were in New York on September 11 making a documentary about the New York Fire Service. The footage shows that, while filming in Canal Street, firemen and crew are distracted by a plane flying low overhead. The camera operator instinctively turns his camera towards the North Tower and, for little more than a second or so, we get a clear view of the plane crashing into the tower. It is a precious, priceless second. It is the one-second of video that really makes the sinister Bush junta nervous. It really gives them nightmares. They really didn’t want a professional cameraman to catch that moment on broadcast-quality tape.

If you’ve got it on tape I strongly suggest you take another look at it, with the pause and frame-forward buttons at the ready. If you don’t have it taped you can purchase the documentary in which it appears on video and DVD. It’s called simply ‘9/11’.

Alternatively, download the Fireman’s Video in QuickTime (370 Kb). It’s not quite as revealing as a good video or DVD copy played through your TV, but it’s good enough to see the action and has useful single frame forward and back buttons.

When seen at full speed, you might first of all think that there isn’t a great deal to see. There’s half a second or so when we see the plane flying through the air then it smashes into the tower, creating an explosion and leaving a great gash across the building. Notice though that immediately before it hits the building the plane emits a brief, bright flash. Notice too that the scar it leaves on the building is rather larger than seems appropriate for the size of the aircraft.

Now pause the sequence at the beginning and advance it frame by frame. Firstly, look at the plane. Does that look like a Boeing jet to you? Is its wingspan wide enough? Does it have engines attached to its wings?

Watch carefully what happens as the plane approaches and crashes into the tower. I leave you to come to your own conclusions about what you see (watch it over and over again, backwards and forwards), but I’ll tell you what I see. Immediately before the plane strikes it fires a missile that blows a hole in the building’s façade. This is the cause of that brief flash. The plane then begins to disappear neatly into this hole, leaving no wing impressions. Just before it disappears however it fires two more missiles from somewhere near its tail. One goes to the left, one to the right (and up a bit) and it is the blast holes from these three separate missiles that form the great gash across the building. For a frame by frame analysis of this sequence please click here.

Analysis of the ‘Missile’ Frames from the Fireman’s Video
A frame-by-frame examination of the Naudet brothers’ film of the attack on the North Tower of the WTC.

There’s more. Keep an eye on the adjacent east side of the building, which is also visible. See how, a few frames into the explosion, a white jet of smoke erupts out of the east side at the same level as the plane. The jet comes straight out of the wall at right angles to it, not angled in accordance with the trajectory of the plane. Also it’s just white smoke and dust, no orange flames or anything like that. It is clearly a bomb going off, creating the gash that appears on the east wall.

I know what I am describing sounds incredible. I suggest only that you look at the footage yourself and come to your own conclusions about what you see.

The plane that hit the North Tower was not American Airlines Flight 11. It was not a Boeing 767. It was a custom-built military plane carrying three missiles that created the impression of a plane crash without leaving any wreckage. In order for it precisely to strike the correct part of the tower (in line with the bomb already planted in the east wall) it must have been flown remotely using cruise navigation. I believe a similar plane was used to strike the Pentagon.

The ‘Conspiracy Theorists’ have got it dead right this time. The true Flights 11, 175, 77 and 93 were indeed substituted with other planes when the transponders were switched off. Someone hijacked the hijackers to make sure the job was done properly.”

“Lockheed Martin Corp’s Rocket-boosted guided hard target penetrator Priority date 1999-04-22 … 2001-08-21US6276277B1 Abstract A target-penetrating aerial bomb includes a penetrator of hard steel or similar material that contains an explosive charge. A rocket motor is formed as an annular chamber and surrounds the penetrator. The bomb includes a guidance and control unit that guides the bomb on a glide path after release from the delivery aircraft, and steers the bomb onto a dive line. Once the bomb is aligned on the dive line, the guidance and control unit fires the rocket booster to accelerate the bomb to the target. A fuse ignites the explosive after target penetration.”

“Southwest Research Institute’s (SwRI) Interactive training system for AWACS weapons directors US6053736A Abstract A training system for training AWACS weapons directors. The training system is programmed so that the student can select between a number of different training modes. These include interactive courseware, simulation, and live exercise modes. The system includes a voice recognition unit that is trained to recognize AWACS terminology and to interactively teach them. Original Assignee Priority date 1997-10-17 … 2000-04-25 Grant

“Lutnick 1 – September 11 2001 – American Airlines Flight 11, a Boeing 767-200ER with 92 people on board, is hijacked after taking off from Boston, and is flown into the north tower of the World Trade Center in New York City; all on board are killed as well as around 1600 people on the ground and in the building; the collapse of both towers brings the total death toll from the two crashes to at least 2,763, the worst disaster involving commercial aircraft.

Lutnick 2 – September 11 2001 United Airlines Flight 175, a Boeing 767-200 with 65 people on board, is hijacked after taking off from Boston and is flown into the south tower of the World Trade Center in New York City; all on board are killed as well as around 900 people on the ground and in the building; the collapse of both towers brings the total death toll from the two crashes to at least 2,763, the worst disaster involving commercial aircraft.

Lutnick 3 – September 11 2001 – American Airlines Flight 77, a Boeing 757-200 with 64 people on board, is hijacked after taking off from Dulles International Airport and is flown into The Pentagon; all on board are killed as well as 125 people in the building and on the ground.

Lutnick 4 – September 11 2001 – United Airlines Flight 93, a Boeing 757-200 with 44 people on board, is hijacked after taking off from Newark, New Jersey; passengers struggle with the hijackers, and the aircraft crashes in a field near Shanksville, Pennsylvania, killing all on board.

Lutnick 5 – November 12 2001 – American Airlines Flight 587, an Airbus A300, crashes into a Queens neighborhood in New York City when the plane’s vertical tail fin snaps off just after takeoff due to overuse of the rudder by the first officer during a wake turbulence encounter. All 251 passengers and nine crew members on board are killed as well as five people on the ground.

Lutnick 6 – May 25 2002 – China Airlines Flight 611, a Boeing 747-200B, disintegrates above the Taiwan Strait in mid-flight due to maintenance error; killing all 225 people on board.

Lutnick 7 – January 1 2007 – Adam Air Flight 574, a Boeing 737-400 with 102 people on board, crashes into the ocean off the island of Sulawesi in Indonesia, killing all on board in the worst ever crash involving the 737-400.

Lutnick 8 – May 5 2007 – Kenya Airways Flight 507, a Boeing 737-800 with 114 people on board, crashes near Douala, Cameroon, killing all on board.

Lutnick 9 – September 14 2008 – Aeroflot Flight 821, a Boeing 737, crashes on approach to Perm Airport from Moscow due to pilot error, killing all 88 people on board in the worst ever accident involving the Boeing 737-500.

Lutnick 10 – June 1 2009 – Air France Flight 447, an Airbus A330 en route from Rio de Janeiro to Paris, crashes in the Atlantic Ocean, killing all 228 occupants, including 12 crew; bodies and aircraft debris are not recovered until several days later; the aircraft itself is not found until 2011. The crash remains the deadliest involving the A330.

Lutnick 11 – January 25 2010 – Ethiopian Airlines Flight 409, a Boeing 737-800, crashes into the Mediterranean Sea shortly after takeoff from Beirut Rafic Hariri International Airport; the flight was heading to the Ethiopian capital, Addis Ababa; all 90 people on board perish.

Lutnick 12 – May 9 2012 – In the Mount Salak Sukhoi Superjet 100 crash, a Sukhoi Superjet 100 crashes into Mount Salak, Indonesia, on an exhibition flight, killing all 45 passengers and crew on board.

Lutnick 13 – March 8 2014 – Malaysia Airlines Flight 370, a Boeing 777 en route from Kuala Lumpur to Beijing with 227 passengers and 12 crew on board, disappears from radar over the Gulf of Thailand. A wing part was later found in Réunion.

Lutnick 14 – July 17 2014 – Malaysia Airlines Flight 17, a Boeing 777 en route from Amsterdam to Kuala Lumpur, is shot down over eastern Ukraine, killing all 283 passengers and 15 crew on board in the deadliest civilian airliner shootdown incident.

Lutnick 15 – December 28 2014 – Indonesia AirAsia Flight 8501, an Airbus A320 en route from Surabaya, Indonesia to Singapore, crashes into waters off Borneo, killing all 155 passengers and seven crew on board.

Lutnick 16 – March 24 2015 – Germanwings Flight 9525, an Airbus A320, crashes in southern France en route from Barcelona, Spain to Düsseldorf, Germany as a result of a deliberate act by the first officer. All 144 passengers and 6 crew on board the aircraft die in the crash.

Lutnick 17 – October 31 2015 – Metrojet Flight 9268, an Airbus A321, explodes in mid-air over the Sinai Peninsula due to a terrorist bomb, 23 minutes after takeoff from Sharm-El-Sheikh, killing all 224 passengers and crew on board.

Lutnick 18 – May 19 2016 – EgyptAir Flight 804, an Airbus A320, crashes into the eastern Mediterranean Sea after a series of sharp descending turns. All 56 passengers and 10 crew are killed.”

“Boeing Co’s Encryption for asymmetric data links US7023996B2 Abstract A method is provided for asymmetrically encrypting data communicated between a ground platform and multiple airborne platforms. The method includes packet encrypting ground-based data so as to preserve routing information while encrypting the remaining data. The packet-encrypted data is then transmitted to the airborne platforms. The method also includes bulk encrypting airborne-based data so as to maximize security. The bulk-encrypted data is then transmitted to the ground platform. Priority date 2001-05-04 2006-04-04 US7023996B2 Grant”

Serco Inc. Capabilities Chemical, Biological, Radiological, Nuclear and Explosive (CBRNE) Software Support Develop, demonstrate, implement and transition technologies to improve software/hardware development, fielding and sustainment support for chemical/biological detection and reconnaissance systems, individual and collective protection systems, decontamination systems, and information management systems for the Warfighter and First Responder, Homeland Defense and civil support activities. Robotics research using emerging software and hardware technologies such as 3D modeling and simulation and 3D printing for rapid prototyping innovations. Remote Weapon System Software and Control Unit Software Innovative methods in software engineering throughout the life cycle of program, in-house development, maintaining software to respond to future needs, and keeping interoperable with other Army systems. PC-based SW, embedded SW efforts, and the combination of both. Development of sensors and control systems, including lethal and non–lethal applications, military research operations, emergency response, testing, and training. Areas of expertise (1) Graphical User Interfaces (GUIs), (2) munition platform SW and/or munition effects SW, (3) fuse function, guidance, and control of flight SW, (4) sensor SW, (5) radio SW, (6) navigational guidance SW, (7) webbased graphical user interfaces (GUIs), and (8) training simulation SW. Information Systems and Infrastructure Support Manage information technology and computer/building infrastructure information systems. Provide centralized computing support; administrative information systems support; voice, data and video telecommunication support; and technology facilities maintenance. Design, build, install Audio Visual and smart building components to create automated state-of-the-art conference room capabilities. Develop, demonstrate, implement and transition technologies to improve concepts and designs that address DoD information technology needs, including logistics systems support and development, such as automated RFID inventory systems supporting office and depot controls. Information Assurance (IA) Engineering Support Development of prototype software that will streamline and automate Risk Management Framework (RMF). Army ordnance, tactical and battlefield automated weapon systems with embedded software require continual IA engineering and periodic validation to ensure that risk management is applied on Information Systems (IS). RMF defines a DoD-wide formal and standard set of activities, general tasks and a management structure process for the Certification & Accreditation (C&A) of a DoD IS that will maintain the Information Assurance (IA) posture throughout the system’s life cycle.”

Serco Awarded $95 Million Patent Classification Contract with the U.S. Patent and Trademark Office
November 30, 2015
RESTON, VA – November 30, 2015 – Serco Inc., a provider of professional, technology, and management services, announced today the Company has been awarded a patent classification services contract with the United States Patent and Trademark Office (USPTO). Serco will provide initial patent classification and reclassification services to support USPTO’s core mission of examining, granting, and disseminating patents and trademarks. The recompete contract has a one-year base period with four one-year option periods, and is valued at $95 million over the five-year period, if all options and award terms are exercised.

Serco’s highly trained Scientists and Engineers are responsible for reviewing, analyzing, and applying classification symbols to newly submitted patent applications to assist with the USPTO examination process. Throughout the classification process, our team performs comprehensive performance management; quality assurance; information security; training; knowledge management; and IT support, engineering, and development of custom software.

Serco has supported the USPTO under this program since its inception in 2006, and currently processes approximately 1,600 applications a day, and over 400,000 applications annually. Under the contract, Serco has been instrumental in assisting the USPTO as it transitioned to a new international classification standard called Cooperative Patent Classification (CPC) and will continue to provide services within CPC that enables the USPTO to align and lead within the global intellectual property environment. Work on this program will continue to take place in Harrisonburg, Virginia.

“We are extremely honored to have been selected to continue to deliver patent classification services to the U.S. Patent and Trademark Office,” said Dan Allen, Chairman and CEO of Serco Inc. “Our team continues our focus on operational excellence and incorporating innovative solutions, for classification services, in the most economic and efficient manner.”

About Serco Inc.: Serco Inc. is a leading provider of professional, technology, and management services. We advise, design, integrate, and deliver solutions that transform how clients achieve their missions. Our customer-first approach, robust portfolio of services, and global experience enable us to respond with solutions that achieve outcomes with value. Headquartered in Reston, Virginia, Serco Inc. has approximately 10,000 employees and an annual revenue of $1.2 billion. Serco Inc. is a wholly-owned subsidiary of Serco Group plc, a $5.9 billion international business that helps transform government and public services around the world. More information about Serco Inc. can be found at www.serco-na.com.”

“The Emergency Planning College also known as “the Hawkhills” is a company based in the United Kingdom which is involved in activities to promote organisational resilience. Since 2010 the college has been operated by Serco, delivering training approved by the Civil Contingencies Secretariat (CCS) of the Cabinet Office. The college buildings are located at Easingwold near York in England. … Simulation and Media Support The method of delivering an exercise is flexible and will be designed with the client to meet their requirements with options ranging from simple paper-based delivery through to full use of their real communications systems and advance computer simulation. In addition, media play can also be added in the form of news injects and the provision of experienced journalists and television crews to help test procedures and also assist in training key staff.”

“Jerome H. Lemelson’s Prisoner tracking and warning system and corresponding methods 2000-04-25 US6054928A Grant Abstract A system and method for tracking, monitoring and learning prisoner or parolee behavior involves obtaining prisoner or parolee data and monitoring data for at least one individual prisoner or parolee, storing the prisoner or parolee data and monitored data into a database, learning prisoner or parolee behavior from the prisoner or parolee data and the monitored data in the database, and updating the prisoner or parolee data and the monitored data in the database. Expert system (i.e. including but not limited to fuzzy logic, reinforcement learning, neural networks, artificial intelligence, etc.) algorithms are executed for determining and analyzing deviated behavior by the prisoner or parolee. A parole level is assigned to the prisoner or parolee and it is determined whether the prisoner or parolee is to be moved up or down a parole level depending on whether the prisoner or parolee behavior does not constitute or does constitute prisoner or parolee violations. Furthermore, the system tracks, monitors, and learns the behavior of the prisoner or parolee by controlling and regulating the permitted/prohibited locations or sectors, the permitted/prohibited location or sector dwell times, the permitted/prohibited travel routes, the permitted/prohibited travel times that the prisoner or parolee spends at or between various locations. Inventor Jerome H. Lemelson, deceased … Priority date 1998-06-04 2000-04-25 US6054928A Grant”

“Jerome H. Lemelson’s Friend or foe detection system and method and expert system military action advisory system and method US 6166679 A
ABSTRACT

A friend or foe detection system and method is disclosed. Friend or foe warning unit 20 has a geographic locating system, a communication system for communicating with each of the warning units, and a military force detection system for detecting military forces in a combat area and has a signal routing and control circuitry 50 for controlling operations. A number of components, devices, or sub-systems, such as a transmitter/receiver radio 28, an antenna 26, a microphone 30, a speaker 32, a battery 34, a display 36, a microprocessor 38, a memory 40, a camera 56, a radar/lidar input 54, on/off switch 52, a GPS location system 45 that includes a GPS processor 46, a GPS receiver 42, a GPS antenna 44, are coupled to the circuitry 50. Display 36 provides a display to the user of the unit 20 and shows the location of friendly forces as well as unfriendly or unidentified forces in the area. Display 36 displays text messages for the user of the warning unit 20. The microprocessor 38 together with memory 40 provide microprocessor control of the operations of the warning unit 20. The geographic locating system includes GPS processor 46, GPS receiver 42, and GPS antenna 44, and it is used to determine the exact location of the warning unit 20. The unit 20 is able to broadcast and receive military force information, such as location and status (i.e. friendly, unfriendly, unidentified statuses). An expert system military action advisory system and method for advising military troops or personnel of firing decisions is also disclosed. A firing index is determined based on the membership variables, and the firing index is used to help make the firing decisions. The membership variables and the firing index are defined for an expert system or fuzzy logic system, and the expert system or fuzzy logic system helps determine making the firing decisions. The system and method operate by transmitting target and friendly force GPS coordinate information to determine danger. Alternatively, only target coordinates are transmitted with fire danger indices calculated on a distributed basis by individual warning units and transmitted to the source of fire without friendly force location coordinates to assist in making final firing decisions.

Publication number: US6166679 A
Publication type: Grant
Application number: US 09/231,326
Publication date: Dec 26, 2000
Filing date: Jan 13, 1999
Priority date: Jan 13, 1999
Fee status: Paid
Also published as: US6201495, US6437727, US20010006372
Inventors: Jerome H. Lemelson, deceased, 3 More »
Original Assignee: Lemelson Jerome H., Pedersen; Robert D., Pedersen; Steven R.
Export Citation: BiBTeX, EndNote, RefMan
Patent Citations (32), Referenced by (74), Classifications (11),Legal Events (4)
External Links: USPTO, USPTO Assignment, Espacenet”

“Inventor Howard W. Lutnick et al … Original Assignee CFPH LLC .. System and method for convenience gaming US8696443B2 … A convenience gaming system is provided. The convenience gaming system allows users to access applications via gaming communication devices coupled to a communication network. At least a portion of the network may be wireless. The gaming applications include gambling, financial, entertainment service, and other types of transactions. The system may include a user location determination feature to prevent users from conducting transactions from unauthorized areas.

Inventor: Lee M. Amaitis; Joseph M. Asher; Howard W. Lutnick; Darrin M. Mylet; Alan B. Wilkins
Current Assignee: Interactive Games LLC Original Assignee CFPH LLC
Priority date: 2004-02-25 US8696443B2″

719 Total Views 2 Views Today
Please follow and like us:
0

Related Post