Kelly 300: Serco’s Rothschild Decoy Patents, Con Air Lutnick’s Dum Dum Pool, Mad Dog’s AWACS Theranos Cull
General John F. Kelly
White House Chief of Staff
Washington, D.C. 20528
Open letter from the Cloud Centric Crime Scene Investigators of Abel Danger
June 21, 2018
Dear General Kelly:
Please accept Brief 300 from Field McConnell – United States Marine Corps whistle-blower and Global Operations Director of Abel Danger (AD) – wherein he lists the type of images and references with which we plan a series of training videos and crowd-funded docudramas to show injured communities how Serco (formerly RCA GB 1929) shareholders appear to have used a patent pool of weaponised devices, originally and allegedly assembled (pooled) by the former chairman of Serco‘s investment banker NM Rothschild & Sons Ltd., the late Victor Rothschild, to decoy American defenses away from the attack which killed an estimated 2,403 people on the U.S. Navy’s Pacific Fleet at Pearl Harbor, Hawaii Territory, on the morning of December 7, 1941 and the attack which killed 125 people on the Pentagon’s U.S. Navy Command Center and the Defense Intelligence Agency on the morning of 9/11/2001.
AD believes that Victor Rothschild (31 October 1910 – 20 March 1990), bomb-disposal expert, chemist, biologist and former chairman of the Royal Commission on Gambling, assembled the patent pools which AD has classified into four families – Con Air, Boeing, Lutnick and Dum Dum – from technologies originally transferred by the Tizard Mission to the United States in 1940 and further believes that N M Rothschild now has de facto custody of a ‘Four Horsemen of the Apocalypse’ network whose apparently blackmailed or extorted leaders have been launching man-in-the-middle attacks on the Five Eyes countries and their sovereign state allies since August 20, 1985, when Field McConnell’s sister Kristine Marcy used money allegedly laundered by Rothschild through the U.S. DoJ Asset Forfeiture Fund, to buy a Boeing 727 for the U.S. Marshals prisoner transportation service and launch the largest transporter of prisoners in the world.
AD research suggests that Serco shareholders including the British, Saudi Arabian and Singaporean governments, Pool Re insurers and Kristine Marcy’s associates in the United States Senior Executive Service have been using Southwest Research Institute’s (SwRI) Interactive training system for AWACS weapons directors US6053736A device to switch simulations to live-fire or digital-fire attack since the late 1970s and, by threatening to ‘cull’ target communities with Theranos Ip Company LLC’s Medical [Dum Dum] device for analyte monitoring and drug delivery US8101402B2, they have been able to ensure the silence or consent of the likes of the 72nd United States Secretary of the Navy Gordon England to Con Air attacks on the Pentagon on 9/11 and the silence of the 26th United States Secretary of Defense and former United States Marine Corps general James “Mad Dog” Mattis to the Con Air attack with military grade ‘Pure’ Novichok apparently derived from Northwestern University’s Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents US9623404B2 on former Russian double agent Sergei Skripal and his daughter Yulia in the English city of Salisbury on 4 March 2018.
AD believes that Serco and NM Rothschild used an AWACS switch to activate Jerome H. Lemelson’s Friend or foe detection system and method and expert system military action advisory system and method US 6166679 and spot fix up to 18 ‘Con Air Lutnick Death Pool’ crashes of aircraft linked to flag carriers in the three major airline alliances of OneWorld, SkyTeam and Star Alliance since 2001.
AD believes that Serco – the world’s largest air traffic controller – has been using false news injects to decoy victim communities into accepting the idea that professional pilots can go ‘psycho’ with the manic or depressed behaviours identified by Rosalyn N. Olsen’s Psychological analysis, communication, and educational apparatus US5511981A when, in reality, it has been deploying Con Air SWAT teams through Jerome H. Lemelson’s Prisoner tracking and warning system and corresponding methods US 6054928 A to conceal death-pool bets on Howard W Lutnick’s Real-time interactive wagering on event outcomes US 8512129 B2 with Boeing’s Encryption for asymmetric data links US7023996B2.
Abel Danger invites you to call Field McConnell and have him explain to you how to recognize how Serco air traffic controllers can switch AWACs simulations into live-fire modes; how an N M Rothschild & Sons Ltd. agent such as Wilbur Ross can set up a decoy death pool on Floor 47 of the North Tower (WTC1) in New York on 9/11 and how the Four Horsemen network can use patented ‘culling’ technologies from WWII to intimidate otherwise brave men and women into betraying their country.
SERCO GROUP PLC: List of Subsidiaries AND Shareholders! [Note representatives of Serco‘s private-equity groups, Serco‘s investment banker N M Rothschild (Wilbur Ross?) and Serco shareholders, including the British, Saudi Arabian and Singaporean governments, Pool Re insurers including AXA (Co-developer of Trump Tower) and Allianz and at least 10 Global Custodians with $100 trillion under management and the TIAA pension fund met in a Lutnick (wagering) room on the 47th Floor of North Tower (WTC1) on 9/11!]
P O Box 39
Plum City WI 54761″
“Digital Fires Instructor Serco – [Marine Corps Base!] Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”
“James Norman Mattis (born September 8, 1950) is the current and 26th United States Secretary of Defense and former United States Marine Corps general who served as 11th Commander of United States Central Command during the Presidency of Barack Obama. .. Mattis was born on September 8, 1950, in Pullman, Washington.He is the son of Lucille (Proulx) Mattis and John West Mattis (1915–1988), a merchant mariner. His mother immigrated to the United States from Canada as an infant and had worked in Army Intelligence in South Africa during the Second World War.Mattis’s father moved to Richland, Washington, to work at a plant supplying fissile material to the Manhattan Project. Mattis was raised in a bookish household that did not own a television. He graduated from Columbia High School in 1968. He earned a B.A. degree in history from Central Washington University in 1971. He earned an M.A. degree in international security affairs from the National War College of National Defense University in 1994.”
“Theranos Founder Elizabeth Holmes Reportedly Indicted on Wire
Fraud Bryan Menegus
Elizabeth Holmes and Ramesh “Sunny” Balwani, the former key executives of blood-testing startup Theranos, have been indicted by a grand jury on nine counts of wire fraud and two counts of conspiracy to commit wire fraud, The Washington Post reports.
The news comes three months after news that both were charged with “massive” fraud by the SEC and agreed resolve the civil charges, and only moments after the company announced Holmes had stepped down as CEO of the company, ceding her role to David Taylor, the company’s general council.
Once bearing a nearly $9 billion valuation, the company attracted some extremely high-profile figures to sing its praises, from former Secretary of State Henry Kissenger to current Secretary of Defense James Mattis. Theranos’s legacy now is as an object lesson in Silicon Valley’s magical thinking. Hobbled by revelations about false claims the company had made about its technology and partnerships, it slashed its already dwindling staff down to “two dozen or fewer” employees in April.
Perhaps this is the end of the long, bizarre saga of Theranos and Holmes—who is barred from holding a position as an executive officer for nearly 10 years, and was previously banned from operating a lab for two. Sadly, the real victims of this horrendously mismanaged company weren’t its deep-pocketed investors, but—if the portrait painted in Wall Street Journal reporter John Carreyrou’s book Bad Blood is any indication—the many well-intentioned engineers, scientists, and other employees which the company churned through at legendary speed, most often for disagreeing with Holmes’s methods or lack thereof.
Did you work for Theranos? Get in touch with us via email or Secure Drop. We’d love to hear your story.”
“Theranos Ip Company LLC ‘s Medical device for analyte monitoring and drug delivery US8101402B2 … Abstract The invention relates to an ingestible, implantable or wearable medical device comprising a microarray which comprises a bioactive agent capable of interacting with a disease marker biological analyte; a reservoir which comprises at least one therapeutic agent and is capable of releasing the therapeutic agent(s) from the medical device; and a plurality of microchips comprising a microarray scanning device capable of obtaining physical parameter data of an interaction between the disease marker biological analyte with the bioactive agent; a biometric recognition device capable of comparing the physical parameter data with an analyte interaction profile; optionally a therapeutic agent releasing device capable of controlling release of the therapeutic agent from the reservoirs; an interface device capable of facilitating communications between the microarray scanning device, biometric recognition device and the therapeutic agent releasing device; and an energy source to power the medical device. Specifically, the invention relates to a medical device capable of detecting an analyte in a bodily fluid comprising at least one microneedle capable of obtaining a sample of a bodily fluid, a first microchannel through which the sample flows and is in fluid communication with the at least one microneedle, a second microchannel in fluid communication with the first microchannel, through which a buffer flows, wherein the second channel comprises a microarray with a bioactive agent, a microarray scanning device to detect an interaction between the bioactive agent and the analyte in the bodily fluid; and an interface device.”
“How did Elizabeth Holmes have the technical and business knowledge and the motivation as a Stanford sophomore to dropout and pursue building Theranos for the next ten years?
Joseph Philleo, USC Economics Updated Nov 5, 2015 · Author has 734 answers and 3.8m answer views
Well, prior to dropping out of Stanford, Miss Holmes:
– Learned Mandarin Chinese
– Lived in China for a bit and sold C++ Compilers to Chinese Universities
– Got accepted to Stanford University
– Was named a “President’s Scholars” her Freshman year and was awarded $3,000 for research.
– Used her fluency in Chinese to win an “internship at the Genome Institute of Singapore. The Institute was working on developing new methods to detect the SARS coronavirus in blood or nasal swabs.”
– Returned to Stanford and wrote a patent application “that described a wearable patch that could monitor variables in the patient’s blood, administer a medication, and adjust its dosage to achieve a desired effect. Further, a cellphone chip could be put on this patch for remote monitoring—so-called telemedicine.”
– “Filed the patent application in September 2003, as Medical device for analyte monitoring and drug delivery.”
– Won her parents permission to use her college tuition for the creation of Theranos
– Convinced others (her professor, brother, Mr. Balwani) to join her.
I’d say she’s just as qualified as anyone else to start a company.
Furthermore, for the first two / three years of its founding, Theranos wasn’t actually a blood testing company. It was a company trying to pursue Miss. Holmes’s “cellphone chip” patent. However, that ended up not working out (due to economics – technologically I think it was okay).
So, rather than go under, Theranos decided to pivot. To stay alive they utilized a few pretty good scientists (most notably, Dr. Gibbons who committed suicide in 2013) and began doing blood tests for clinical trials. This apparently provided them enough revenue and time to continue working on their “revolutionary” blood testing procedures.
In 2013 the company came out of stealth mode and was apparently brimming with technology and patents, pronouncing themselves a success. By then, the company was pretty expansive (over 500 employees). While Miss. Holmes may have been involved in the direction of research, her role was (likely) primarily business and managerial. With respect to this role, it seems Miss Holmes has done a good job (until recently). She’s been able to build an impressive (albeit old and unfit) Board of Directors, partner with Walgreens, and create massive publicity around her company.
That being said – the future of Theranos will depend entirely on the validity of its technology. If it works, great – then the WSJ owes the company an apology. If not, no amount of business acumen or media hype can make gold out of garbage.”
“‘Pure’ Novichok used in Skripal attack, watchdog confirms
By Laura Smith-Spark and Simon Cullen, CNN
Updated 11:23 AM ET, Thu April 12, 2018
What is Novichok and how does it kill? 01:34
London (CNN) The Organisation for the Prohibition of Chemical Weapons confirmed the UK’s findings that Novichok was used to target the former Russian double agent Sergei Skripal and his daughter Yulia in the English city of Salisbury.
While the statement from the OPCW does not specifically name Novichok, it says technical experts “confirm the findings of the United Kingdom relating to the identity of the toxic chemical that was used in Salisbury and severely injured three people.”
The UK government says its scientists have identified the agent as a military-grade Novichok nerve agent.
The OPCW, the international chemical weapons watchdog, said its team “notes that the toxic chemical was of high purity. The latter is concluded from the almost complete absence of impurities.”
Britain has accused Russia of attempting to murder the Skripals using Novichok. Russia has repeatedly denied involvement in the attack, seeking to blame Britain instead.
In a statement Thursday, Russian Foreign Ministry spokeswoman Maria Zakharova said Moscow “will not take on faith any conclusions regarding the Skripal case until Russian experts are provided with access to the victims themselves, as well as to the materials mentioned in the OPCW’s expert report and the entire volume of information available to London.”
The OPCW sent a team of specialists to the UK last month to investigate the March 4 attack. The experts took samples from several locations as well as biomedical samples from the Skripals and police officer Nick Bailey, who was also exposed to the nerve agent.”
“Northwestern University’s Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents US9623404B2 Abstract A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.
An embodiment of the method includes exposing the chemical warfare nerve agent to a metal-organic-framework (MOF), and catalytically decomposing the nerve agent with the MOF. The chemical warfare nerve agent may be an organophosphate, an organophosphorus compound, or combinations thereof. For example, the chemical warfare nerve agent may comprises cyanogen chloride, hydrogen cyanide, ethyldichloroarsine (ED), methyldichloroarsine (MD), phenyldichloroarsine (PD), lewisite (L), sulfur mustard (HD, H, HT, HL, HQ), nitrogen mustard (NH1, NH2, NH3), Tabun (GA), Sarin (GB), Soman (GD), Cyclosarin (GF), GV, Methyl fluorophosphoryl homocholine iodid (MFPhCh), EA-3148, VE, VG, VM, VP, VR, VX, Novichok agents, phoshene oxime (CX), chlorine, chloropicrin (PS), phosgene (CG), diphosgene (DP), disulfur decafluoride, agent 15 (BZ), dimethylheptylpyran (DMHP), EA-3167, kolokol-1, LSD-25, PAVA spray, sleeping gas, pepper spray (OC), CS, mace® (CN), CR, and combinations thereof. In an embodiment, the container is a respirator cartridge. An embodiment of the method includes filling the cartridge with a MOF (e.g. pellets, disks or a monolithic MOF body) capable of detoxifying chemical warfare nerve agents. In an embodiment, the MOF is part of a stacked bed containing other layers of materials in a respirator cartridge.”
“Rothschild ‘spied as the Fifth Man’
By DAVID LEITCH
Sunday 23 October 1994 00:02
Click to follow
The Independent Online
THE LATE Lord Rothschild, scientist, think-tank head, first- class cricketer, bomb-disposal expert and MI5 agent, was a super-spy for the Russians, according to a forthcoming book.
The Fifth Man, by the Australian author Roland Perry, claims to prove that Victor Rothschild stole ‘all major UK/US weapons developments in the Second World War’, including biological warfare, the atomic bomb and radar.
Specifically, he alleges that Rothschild, not Klaus Fuchs, or, as is generally believed, the civil servant John Cairncross, first alerted Stalin to Allied plans to build an atom bomb using plutonium 235.
Perry also claims that Rothschild, who died in 1990, was involved ‘in so many aspects of spying that he seemed like a super-agent, sabotaging every Western intelligence initiative for 20 years after the war’.
The evidence offered is largely derived from three days of interviews in Moscow with seven retired KGB officers, some identified only by initials.”
“During the Second World War Victor worked for the Intelligence Service, and earned the George Medal for his bomb disposal work. In early 1939, he travelled to the United States where he visited the White House to discuss the issue of accepting Jewish refugees from Nazi Germany. In 1939, he was recruited to work for MI5 where he remained for the duration of the War. He was attached to B division, under deputy director Guy Liddell, responsible for counterespionage. In 1940 he produced a series of secret reports on German Espionage Under cover of Commerce and later founded section ‘B1c’ at Wormwood Scrubs, the wartime home of MI5. This was an ‘explosives and sabotage section’, and worked on identifying where Britain’s war effort was vulnerable to sabotage and counter German sabotage attempts. This included personally dismantling examples of German booby traps and disguised explosives. For this, he was awarded won the George Medal in 1944 for dangerous work in hazardous circumstances. This involved dismantling a pair of German time bombs concealed in boxes of Spanish onions in Northampton. By late 1944, Victor was attached to the 105 Special Counter Intelligence Unit of the SHAEF, a joint operation of MI5 and X2, the counterespionage branch of OSS, a precursor of the CIA, operating in Paris.
After the War, Victor combined his academic interests with work for industry, joining the zoology department at Cambridge University. For his work on fertilization, he gained a DSc in 1950. He served as Chairman of the Agricultural Research Council from 1948 to 1958 and in 1961 he began work for Shell Research Ltd., serving as its Chairman from 1963 until his retirement in 1970. Victor was the first Director General of the Central Policy Review Staff from 1971 to 1974 (known popularly as ‘The Think Tank’), a unit which researched policy specifically for the Government. In 1976 Victor chaired the Royal Commission on Gambling. In 1982 he published An Enquiry into the Social Science Research Council at the behest of Sir Keith Joseph, and he continued to work in security as an adviser to Margaret Thatcher. Throughout his life he was a valued adviser on intelligence and science to both Conservative and Labour Governments.”
“The Tizard Mission, officially the British Technical and Scientific Mission, was a British delegation that visited the United States during the Second World War in order to obtain the industrial resources to exploit the military potential of the research and development (R&D) work completed by the UK up to the beginning of World War II, but that Britain itself could not exploit due to the immediate requirements of war-related production. It received its popular name from the program’s instigator, Henry Tizard. Tizard was a British scientist and chairman of the Aeronautical Research Committee, which had propelled the development of radar. .. The objective of the mission was to cooperate in science and technology with the U.S., which was neutral and, in many quarters, unwilling to become involved in the war. The U.S. had greater resources for development and production, which Britain desperately wanted to use. The information provided by the British delegation was subject to carefully vetted security procedures, and contained some of the greatest scientific advances made during the war. The shared technology included radar (in particular the greatly improved cavity magnetron which the American historian James Phinney Baxter III later called “the most valuable cargo ever brought to our shores”), the design for the proximity VT fuse, details of Frank Whittle’s jet engine and the Frisch–Peierls memorandum describing the feasibility of an atomic bomb. Though these may be considered the most significant, many other items were also transported, including designs for rockets, superchargers, gyroscopic gunsights, submarine detection devices, self-sealing fuel tanks and plastic explosives.”
“The attack on Pearl Harbor was a surprise military strike by the Imperial Japanese Navy Air Service against the United States naval base at Pearl Harbor, Hawaii Territory, on the morning of December 7, 1941. The attack, also known as the Battle of Pearl Harbor, led to the United States’ entry into World War II. The Japanese military leadership referred to the attack as the Hawaii Operation and Operation AI, and as Operation Z during its planning.
Japan intended the attack as a preventive action to keep the U.S. Pacific Fleet from interfering with its planned military actions in Southeast Asia against overseas territories of the United Kingdom, the Netherlands, and the United States. Over the course of seven hours there were coordinated Japanese attacks on the U.S.-held Philippines, Guam and Wake Island and on the British Empire in Malaya, Singapore, and Hong Kong.”
“Evidence: The Pentagon Attack At 9:37 on the morning of 9/11/2001 the west side of the Pentagon was attacked by a jetliner, presumably American Airlines Flight 77. The attack killed 125 people in and around the Pentagon in addition to those aboard the plane.
The Pentagon was struck on its west side, and primarily in Wedge 1. The impact was primarily on the first floor, where most of the plane punctured the facade and plowed through the continuous floor space comprising Rings F, E, and C.
The greatest loss of life was in the Navy Command Center, a command-and-control center situated in the first floor of the C- and D-Rings of Wedge-1. Numerous workers in the adjacent offices of the Defense Intelligence Agency were also killed.
On 9/11/01, Wedge 1 was nearing the completion of a renovation program, which included retrofitting facade walls with blast-resistant reinforcements.
Retrofitting the Pentagon for Blast Resistance
Pentagon Battered but Firm
The aircraft impact punctured the facade over a contiguous area measuring approximately 96 feet wide on the first floor, and 18 feet wide on the second floor. Damage to the facade extended beyond the punctured areas.
Pentagon — Exterior Impact Damage
a detailed examination of damage to the Pentagon’s façade”
“Con Air Lutnick Death Pool #1– September 11 2001 – American Airlines Flight 11, a Boeing 767-200ER with 92 people on board, is hijacked after taking off from Boston, and is flown into the north tower of the World Trade Center in New York City; all on board are killed as well as around 1600 people on the ground and in the building; the collapse of both towers brings the total death toll from the two crashes to at least 2,763, the worst disaster involving commercial aircraft.
Con Air Lutnick Death Pool #2 – September 11 2001 United Airlines Flight 175, a Boeing 767-200 with 65 people on board, is hijacked after taking off from Boston and is flown into the south tower of the World Trade Center in New York City; all on board are killed as well as around 900 people on the ground and in the building; the collapse of both towers brings the total death toll from the two crashes to at least 2,763, the worst disaster involving commercial aircraft.
Con Air Lutnick Death Pool #3 – September 11 2001 – American Airlines Flight 77, a Boeing 757-200 with 64 people on board, is hijacked after taking off from Dulles International Airport and is flown into The Pentagon; all on board are killed as well as 125 people in the building and on the ground.
Con Air Lutnick Death Pool #4 – September 11 2001 – United Airlines Flight 93, a Boeing 757-200 with 44 people on board, is hijacked after taking off from Newark, New Jersey; passengers struggle with the hijackers, and the aircraft crashes in a field near Shanksville, Pennsylvania, killing all on board.
Con Air Lutnick Death Pool #5 – November 12 2001 – American Airlines Flight 587, an Airbus A300, crashes into a Queens neighborhood in New York City when the plane’s vertical tail fin snaps off just after takeoff due to overuse of the rudder by the first officer during a wake turbulence encounter. All 251 passengers and nine crew members on board are killed as well as five people on the ground.
Con Air Lutnick Death Pool #6 – May 25 2002 – China Airlines Flight 611, a Boeing 747-200B, disintegrates above the Taiwan Strait in mid-flight due to maintenance error; killing all 225 people on board.
Con Air Lutnick Death Pool #7 – January 1 2007 – Adam Air Flight 574, a Boeing 737-400 with 102 people on board, crashes into the ocean off the island of Sulawesi in Indonesia, killing all on board in the worst ever crash involving the 737-400.
Con Air Lutnick Death Pool #8 – May 5 2007 – Kenya Airways Flight 507, a Boeing 737-800 with 114 people on board, crashes near Douala, Cameroon, killing all on board.
Con Air Lutnick Death Pool #9 – September 14 2008 – Aeroflot Flight 821, a Boeing 737, crashes on approach to Perm Airport from Moscow due to pilot error, killing all 88 people on board in the worst ever accident involving the Boeing 737-500.
Con Air Lutnick Death Pool #10 – June 1 2009 – Air France Flight 447, an Airbus A330 en route from Rio de Janeiro to Paris, crashes in the Atlantic Ocean, killing all 228 occupants, including 12 crew; bodies and aircraft debris are not recovered until several days later; the aircraft itself is not found until 2011. The crash remains the deadliest involving the A330.
Con Air Lutnick Death Pool #11 – January 25 2010 – Ethiopian Airlines Flight 409, a Boeing 737-800, crashes into the Mediterranean Sea shortly after takeoff from Beirut Rafic Hariri International Airport; the flight was heading to the Ethiopian capital, Addis Ababa; all 90 people on board perish.
Con Air Lutnick Death Pool #12 – May 9 2012 – In the Mount Salak Sukhoi Superjet 100 crash, a Sukhoi Superjet 100 crashes into Mount Salak, Indonesia, on an exhibition flight, killing all 45 passengers and crew on board.
Con Air Lutnick Death Pool #13 – March 8 2014 – Malaysia Airlines Flight 370, a Boeing 777 en route from Kuala Lumpur to Beijing with 227 passengers and 12 crew on board, disappears from radar over the Gulf of Thailand. A wing part was later found in Réunion.
Con Air Lutnick Death Pool #14 – July 17 2014 – Malaysia Airlines Flight 17, a Boeing 777 en route from Amsterdam to Kuala Lumpur, is shot down over eastern Ukraine, killing all 283 passengers and 15 crew on board in the deadliest civilian airliner shootdown incident.
Con Air Lutnick Death Pool #15 – December 28 2014 – Indonesia AirAsia Flight 8501, an Airbus A320 en route from Surabaya, Indonesia to Singapore, crashes into waters off Borneo, killing all 155 passengers and seven crew on board.
Con Air Lutnick Death Pool #16 – March 24 2015 – Germanwings Flight 9525, an Airbus A320, crashes in southern France en route from Barcelona, Spain to Düsseldorf, Germany as a result of a deliberate act by the first officer. All 144 passengers and 6 crew on board the aircraft die in the crash.
Con Air Lutnick Death Pool #17 – October 31 2015 – Metrojet Flight 9268, an Airbus A321, explodes in mid-air over the Sinai Peninsula due to a terrorist bomb, 23 minutes after takeoff from Sharm-El-Sheikh, killing all 224 passengers and crew on board.
Con Air Lutnick Death Pool #18 – May 19 2016 – EgyptAir Flight 804, an Airbus A320, crashes into the eastern Mediterranean Sea after a series of sharp descending turns. All 56 passengers and 10 crew are killed.”
“Serco Awarded $95 Million Patent Classification Contract with the U.S. Patent and Trademark Office
November 30, 2015
RESTON, VA – November 30, 2015 – Serco Inc., a provider of professional, technology, and management services, announced today the Company has been awarded a patent classification services contract with the United States Patent and Trademark Office (USPTO). Serco will provide initial patent classification and reclassification services to support USPTO’s core mission of examining, granting, and disseminating patents and trademarks. The recompete contract has a one-year base period with four one-year option periods, and is valued at $95 million over the five-year period, if all options and award terms are exercised.
Serco’s highly trained Scientists and Engineers are responsible for reviewing, analyzing, and applying classification symbols to newly submitted patent applications to assist with the USPTO examination process. Throughout the classification process, our team performs comprehensive performance management; quality assurance; information security; training; knowledge management; and IT support, engineering, and development of custom software.
Serco has supported the USPTO under this program since its inception in 2006, and currently processes approximately 1,600 applications a day, and over 400,000 applications annually. Under the contract, Serco has been instrumental in assisting the USPTO as it transitioned to a new international classification standard called Cooperative Patent Classification (CPC) and will continue to provide services within CPC that enables the USPTO to align and lead within the global intellectual property environment. Work on this program will continue to take place in Harrisonburg, Virginia.
“We are extremely honored to have been selected to continue to deliver patent classification services to the U.S. Patent and Trademark Office,” said Dan Allen, Chairman and CEO of Serco Inc. “Our team continues our focus on operational excellence and incorporating innovative solutions, for classification services, in the most economic and efficient manner.”
About Serco Inc.: Serco Inc. is a leading provider of professional, technology, and management services. We advise, design, integrate, and deliver solutions that transform how clients achieve their missions. Our customer-first approach, robust portfolio of services, and global experience enable us to respond with solutions that achieve outcomes with value. Headquartered in Reston, Virginia, Serco Inc. has approximately 10,000 employees and an annual revenue of $1.2 billion. Serco Inc. is a wholly-owned subsidiary of Serco Group plc, a $5.9 billion international business that helps transform government and public services around the world. More information about Serco Inc. can be found at www.serco-na.com.”
“Rosalyn N. Olsen’s Psychological analysis, communication, and educational apparatus 1996-04-30 US5511981A Grant An apparatus that aids in the diagnosis and analysis of an individual suffering from a psychological ailment. The apparatus contains a top end and a bottom end wherein the top end represents a manic region and the bottom end represents a depression region. Between these two regions are the mild depression region, the normal region, and the hypomania region proceeding in order from bottom to top. Various elements that represent psychological states are provided so that the user can place the elements that represent that person’s current state onto the appropriate region.”
“Raytheon Co’s Identification friend or foe (IFF) system US8325081B2 Abstract A method and apparatus for reducing transponder responses to reflected signals utilizes data in an interrogator message to confirm that if two interrogations are received within a predetermined period of time and if the two interrogator signals correspond to a side lobe followed by a reflected main beam signal, the presence of multipath reflection can be correctly identified and the reply to the main beam interrogation can be suppressed.”
“Healthcare in the UK & Europe Serco is trusted to manage vital healthcare services in the UK & Europe. With over two decades of delivering excellent services for the NHS, we have built a strong portfolio of support services. We employ over 5,000 people in various roles, from facilities management and managing estates and assets, to care coordination and business process services…. In the UK & Europe, we have over two decades of delivering award winning services for the NHS and currently serving 14 Acute Trusts, 5 Mental Health Trusts, 2 Community Services Trusts, 8 Clinical Commissioning Groups, 4 Regional/National NHS Organisations, and 1 Community Interest Company. We employ over 5,000 staff, with significant growth due to stronger outsourcing drives, and have reduced health service staffing costs by up to 35%.”
“Southwest Research Institute’s (SwRI) Interactive training system for AWACS weapons directors US6053736A Abstract A training system for training AWACS weapons directors. The training system is programmed so that the student can select between a number of different training modes. These include interactive courseware, simulation, and live exercise modes. The system includes a voice recognition unit that is trained to recognize AWACS terminology and to interactively teach them. Original Assignee Priority date 1997-10-17 … 2000-04-25 Grant
“Jerome H. Lemelson’s Prisoner tracking and warning system and corresponding methods US 6054928 A
A system and method for tracking, monitoring and learning prisoner or parolee behavior involves obtaining prisoner or parolee data and monitoring data for at least one individual prisoner or parolee, storing the prisoner or parolee data and monitored data into a database, learning prisoner or parolee behavior from the prisoner or parolee data and the monitored data in the database, and updating the prisoner or parolee data and the monitored data in the database. Expert system (i.e. including but not limited to fuzzy logic, reinforcement learning, neural networks, artificial intelligence, etc.) algorithms are executed for determining and analyzing deviated behavior by the prisoner or parolee. A parole level is assigned to the prisoner or parolee and it is determined whether the prisoner or parolee is to be moved up or down a parole level depending on whether the prisoner or parolee behavior does not constitute or does constitute prisoner or parolee violations. Furthermore, the system tracks, monitors, and learns the behavior of the prisoner or parolee by controlling and regulating the permitted/prohibited locations or sectors, the permitted/prohibited location or sector dwell times, the permitted/prohibited travel routes, the permitted/prohibited travel times that the prisoner or parolee spends at or between various locations.
Publication number: US6054928 A
Publication type: Grant
Application number: US 09/090,665
Publication date: 25 Apr 2000
Filing date: 4 Jun 1998
Priority date: 4 Jun 1998
Fee status: Paid
Also published as: US6437696, US20020067272
Inventors: Jerome H. Lemelson, deceased, 3 More »
Original Assignee: Lemelson Jerome H., Pedersen; Robert D., Hiett; John H.
Export Citation: BiBTeX, EndNote, RefMan
Patent Citations (55), Referenced by (257), Classifications (17),Legal Events (3)
External Links: USPTO, USPTO Assignment, Espacenet”
“Jerome H. Lemelson’s Friend or foe detection system and method and expert system military action advisory system and method US 6166679 A
A friend or foe detection system and method is disclosed. Friend or foe warning unit 20 has a geographic locating system, a communication system for communicating with each of the warning units, and a military force detection system for detecting military forces in a combat area and has a signal routing and control circuitry 50 for controlling operations. A number of components, devices, or sub-systems, such as a transmitter/receiver radio 28, an antenna 26, a microphone 30, a speaker 32, a battery 34, a display 36, a microprocessor 38, a memory 40, a camera 56, a radar/lidar input 54, on/off switch 52, a GPS location system 45 that includes a GPS processor 46, a GPS receiver 42, a GPS antenna 44, are coupled to the circuitry 50. Display 36 provides a display to the user of the unit 20 and shows the location of friendly forces as well as unfriendly or unidentified forces in the area. Display 36 displays text messages for the user of the warning unit 20. The microprocessor 38 together with memory 40 provide microprocessor control of the operations of the warning unit 20. The geographic locating system includes GPS processor 46, GPS receiver 42, and GPS antenna 44, and it is used to determine the exact location of the warning unit 20. The unit 20 is able to broadcast and receive military force information, such as location and status (i.e. friendly, unfriendly, unidentified statuses). An expert system military action advisory system and method for advising military troops or personnel of firing decisions is also disclosed. A firing index is determined based on the membership variables, and the firing index is used to help make the firing decisions. The membership variables and the firing index are defined for an expert system or fuzzy logic system, and the expert system or fuzzy logic system helps determine making the firing decisions. The system and method operate by transmitting target and friendly force GPS coordinate information to determine danger. Alternatively, only target coordinates are transmitted with fire danger indices calculated on a distributed basis by individual warning units and transmitted to the source of fire without friendly force location coordinates to assist in making final firing decisions.
Publication number: US6166679 A
Publication type: Grant
Application number: US 09/231,326
Publication date: Dec 26, 2000
Filing date: Jan 13, 1999
Priority date: Jan 13, 1999
Fee status: Paid
Also published as: US6201495, US6437727, US20010006372
Inventors: Jerome H. Lemelson, deceased, 3 More »
Original Assignee: Lemelson Jerome H., Pedersen; Robert D., Pedersen; Steven R.
Export Citation: BiBTeX, EndNote, RefMan
Patent Citations (32), Referenced by (74), Classifications (11),Legal Events (4)
External Links: USPTO, USPTO Assignment, Espacenet”
“Inventor Howard W. Lutnick et al … Original Assignee CFPH LLC .. System and method for convenience gaming US8696443B2 … A convenience gaming system is provided. The convenience gaming system allows users to access applications via gaming communication devices coupled to a communication network. At least a portion of the network may be wireless. The gaming applications include gambling, financial, entertainment service, and other types of transactions. The system may include a user location determination feature to prevent users from conducting transactions from unauthorized areas.
Inventor: Lee M. Amaitis; Joseph M. Asher; Howard W. Lutnick; Darrin M. Mylet; Alan B. Wilkins
Current Assignee: Interactive Games LLC Original Assignee CFPH LLC
Priority date: 2004-02-25 US8696443B2″
“Boeing Co’s Encryption for asymmetric data links US7023996B2 Abstract A method is provided for asymmetrically encrypting data communicated between a ground platform and multiple airborne platforms. The method includes packet encrypting ground-based data so as to preserve routing information while encrypting the remaining data. The packet-encrypted data is then transmitted to the airborne platforms. The method also includes bulk encrypting airborne-based data so as to maximize security. The bulk-encrypted data is then transmitted to the ground platform. Priority date 2001-05-04 2006-04-04 US7023996B2 Grant”
“Boeing Co’s Encryption for asymmetric data links US7023996B2
A method is provided for asymmetrically encrypting data communicated between a ground platform and multiple airborne platforms. The method includes packet encrypting ground-based data so as to preserve routing information while encrypting the remaining data. The packet-encrypted data is then transmitted to the airborne platforms. The method also includes bulk encrypting airborne-based data so as to maximize security. The bulk-encrypted data is then transmitted to the ground platform. Priority date 2001-05-04 2006-04-04 US7023996B2 Grant”
“Serco Inc. Capabilities Chemical, Biological, Radiological, Nuclear and Explosive (CBRNE) Software Support Develop, demonstrate, implement and transition technologies to improve software/hardware development, fielding and sustainment support for chemical/biological detection and reconnaissance systems, individual and collective protection systems, decontamination systems, and information management systems for the Warfighter and First Responder, Homeland Defense and civil support activities. Robotics research using emerging software and hardware technologies such as 3D modeling and simulation and 3D printing for rapid prototyping innovations. Remote Weapon System Software and Control Unit Software Innovative methods in software engineering throughout the life cycle of program, in-house development, maintaining software to respond to future needs, and keeping interoperable with other Army systems. PC-based SW, embedded SW efforts, and the combination of both. Development of sensors and control systems, including lethal and non–lethal applications, military research operations, emergency response, testing, and training. Areas of expertise (1) Graphical User Interfaces (GUIs), (2) munition platform SW and/or munition effects SW, (3) fuse function, guidance, and control of flight SW, (4) sensor SW, (5) radio SW, (6) navigational guidance SW, (7) webbased graphical user interfaces (GUIs), and (8) training simulation SW. Information Systems and Infrastructure Support Manage information technology and computer/building infrastructure information systems. Provide centralized computing support; administrative information systems support; voice, data and video telecommunication support; and technology facilities maintenance. Design, build, install Audio Visual and smart building components to create automated state-of-the-art conference room capabilities. Develop, demonstrate, implement and transition technologies to improve concepts and designs that address DoD information technology needs, including logistics systems support and development, such as automated RFID inventory systems supporting office and depot controls. Information Assurance (IA) Engineering Support Development of prototype software that will streamline and automate Risk Management Framework (RMF). Army ordnance, tactical and battlefield automated weapon systems with embedded software require continual IA engineering and periodic validation to ensure that risk management is applied on Information Systems (IS). RMF defines a DoD-wide formal and standard set of activities, general tasks and a management structure process for the Certification & Accreditation (C&A) of a DoD IS that will maintain the Information Assurance (IA) posture throughout the system’s life cycle.”
“The Emergency Planning College also known as “the Hawkhills” is a company based in the United Kingdom which is involved in activities to promote organisational resilience. Since 2010 the college has been operated by Serco, delivering training approved by the Civil Contingencies Secretariat (CCS) of the Cabinet Office. The college buildings are located at Easingwold near York in England. … Simulation and Media Support The method of delivering an exercise is flexible and will be designed with the client to meet their requirements with options ranging from simple paper-based delivery through to full use of their real communications systems and advance computer simulation. In addition, media play can also be added in the form of news injects and the provision of experienced journalists and television crews to help test procedures and also assist in training key staff.”
“A proxy war, occasionally also called a proxy fight, is an armed conflict between two states or non-state actors which act on the instigation or on behalf of other parties that are not directly involved in the hostilities. In order for a conflict to be considered a proxy war, there must be a direct, long-term relationship between external actors and the belligerents involved. The aforementioned relationship usually takes the form of funding, military training, arms, or other forms of material assistance which assist a belligerent party in sustaining its war effort.”