Reverse CSI 12: Serco’s Spot Fixed Times, Wilbur’s Rothschild Dead Pool Bridge, Con Air’ First Ladies’ Patented Snuff

David ‘Sherlock’ Hawkins, co-founder of Abel Danger with Field McConnell, is developing reverse-engineered CSI storyboards for 3-act radio dramas and/or theatre plays to give injured communities a scene-by-scene analysis of the high-value-target or mass-casualty events which appear to be associated with the negligent, willful, reckless or fraudulent use of patented spot-fixing dead-pool devices by agents of Serco (formerly the radio patent monopoly company RCA GB 1929) and its investment banker N M Rothschild & Sons Ltd., including the late Victor Rothschild and current U.S. Commerce Secretary Wilbur Ross, since the Tizard Mission of September 1940.

Abel Danger research indicates that Wilbur Ross, who apparently hosted a Serco shareholder meeting on the 47th floor of the North Tower (WTC1) on 9/11, has been selling ‘dead-pool’ seats on the federal bridge certification authority (FBCA) network and allowing insiders including former IP lawyers and First Ladies of the United States Hillary Clinton and Michelle Obama to bet on victim deaths and deploy “Con Air” SWAT teams to time-stamp snuff films for a dead pool where the root key is held by the UK MoD!

Act 1: Script & Spot; Act 2: Shoot & Snuff; Act 3: Spin & Spoil

Field McConnell tracked an early example of what appear to be a Rothschild/Serco spot-fixing dead pool to the snuff film recorded on August 12, 1944 by combat camera man Lt. David J. McCarthy through the Perspex nose of a USAAF F-8 Mosquito of the radio-initiated explosion which killed Joseph Patrick Kennedy Jr. in a BQ-8 aircraft, loaded with 21,170lb of Torpex (Developed at the Royal Gunpowder Factory, Waltham Abbey, U.K. as a more powerful military alternative to TNT).

In the case of the apparent 2014 hacking of Boeing 777ER aircraft of MH Flights 370 and 17, the latter apparently shot down by a missile carrying a patented proximity fuze, Ross’s Rothschild colleagues appears to have sold seats on the federal bridge to agents of the Netherlands Ministry of Defence and the Australian Defence Organisation as DoD Approved External PKIs in 2013, who allegedly downloaded the associated snuff films into archives administered by former First Ladies Hillary Clinton and Michelle Obama

Hawkins alleges that Kristine “Con Air” Marcy, Field McConnell’s sister, used money stolen from the DOJ Asset Forfeiture Fund in 1985 to equip dead-pool operatives on the U.S. Marshals prisoner transportation network with AWACS weapons directors, proximity fuzes and Inmarsat timing to spot fix the 9/11 attacks and build a federal-bridge snuff-film archive in the custody of Serco for the First Lady extortion of U.S. Presidents Bill Clinton, George W. Bush, Barack Hussein Obama and Donald J. Trump.

Please help David at with the funds he needs to reverse engineer crime scene investigations into high-value-target and mass-casualty events and obtain justice for injured communities—first of all in the court of public opinion and then in a court of law.

Reverse CSI 12 – Images & videos

The Dead Pool (1988) Trailer

AWACS weapons directors switch from simulation to live fire

Kristine Marcy allegedly used the DOJ Asset Forfeiture Fund in 1984 to buy a Boeing 727 for the deployment of Con Air SWAT teams and AWACS weapons directors as dead pool operatives for Rothschild agent Wilbur Ross

Reverse CSI 12 – References

“Digital Fires Instructor Serco[Marine Corps Base!] Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”

Joseph Patrick Kennedy Jr. (July 25, 1915 – August 12, 1944) was a United States Navy lieutenant. He was killed in action during World War II while serving as a land-based patrol bomber pilot, and was posthumously awarded the Navy Cross.  …. Operation Aphrodite (U.S. Army Air Corps) & Operation Anvil (U.S. Navy) made use of unmanned, explosive-laden Army Air Corps Boeing B-17 Flying Fortress and Navy Consolidated PB4Y-1 Liberator bombers that were deliberately crashed into their targets under radio control.[6] These aircraft could not take off safely on their own, so a crew of two would take off and fly to 2,000 feet (610 m) before activating the remote control system, arming the detonators, and parachuting from the aircraft.

Kennedy was appointed a Lieutenant on July 1, 1944.[5] After the U.S. Army Air Corps operation missions were drawn up on July 23, 1944, Lieutenants Wilford John Willy[7] and Kennedy were designated as the first Navy flight crew. Willy, who was the executive officer of Special Air Unit ONE, had also volunteered for the mission and “pulled rank” over Ensign James Simpson, who was Kennedy’s regular co-pilot. Kennedy and Willy (co-pilot) flew a BQ-8 “robot” aircraft (drone; a converted B-24 Liberator) for the U.S. Navy’s first Aphrodite mission. Two Lockheed Ventura mother planes and a Boeing B-17 navigation plane took off from RAF Fersfield at 1800 on August 12, 1944. Then the BQ-8 aircraft, loaded with 21,170 lb (9,600 kg) of Torpex, took off. It was to be used against the U-boat pens at Heligoland in the North Sea.[8][9]

Following them in a USAAF F-8 Mosquito to film the mission were pilot Lt. Robert A. Tunnel and combat camera man Lt. David J. McCarthy, who filmed the event from the perspex nose of the aircraft.[10] As planned, Kennedy and Willy remained aboard as the BQ-8 completed its first remote-controlled turn at 2,000 ft (610 m) near the North Sea coast. Kennedy and Willy removed the safety pin, arming the explosive package, and Kennedy radioed the agreed code Spade Flush, his last known words. Two minutes later (and well before the planned crew bailout, near RAF Manston), the Torpex explosive detonated prematurely and destroyed the Liberator, killing Kennedy and Willy instantly. Wreckage landed near the village of Blythburgh in Suffolk, England, causing widespread damage and small fires, but there were no injuries on the ground. According to one report, a total of 59 buildings were damaged in a nearby coastal town.”

Torpex was developed at the Royal Gunpowder Factory, Waltham Abbey, in the United Kingdom as a more powerful military alternative to TNT. RDX was developed in 1899. Though very stable and serving as the reference point by which the sensitivity of other explosives are judged, it was too expensive for most military applications and reserved for use in the most important products, such as torpedoes. Aluminium powder was also added to the mix to further enhance the effect. Although both RDX and TNT have a negative oxygen balance, the superheated aluminium component tends to contribute primarily by extending the expansion time of the explosive product gases. Beeswax was also added as a phlegmatizing agent, to reduce sensitivity to shock and impact. Later, beeswax was replaced with paraffin wax, and calcium chloride was added as a moisture absorber to reduce the production of hydrogen gas under high humidity.”

Dyno Industrier’s Process for the preparation of aluminum-containing high-energy explosive compositions Priority date  1980-02-29 1983-03-08 US4376083A Grant  Abstract A castable high-energy explosive composition comprising trinitrotoluene (TNT) and crystalline explosives of the RDX or HMX type as well as aluminum powder, and, optionally, flegmatizing agents and stablizers consisting of wax, lecithin and nitrocellulose (NC), is prepared by dispersing crystals of RDX (or HMX) in water with wax, under heavy stirring and a temperature above the melting point of the wax, then adding aluminum powder, treated in order to tolerate water, to the dispersion, and then, optionally, cooling in order to separate the explosive as granules. A further step comprises melting and dispersing TNT in hot water under heavy stirring, optionally under the addition of wetted NC and lecithin, then reducing the temperature to below 80° C., and separating the solidifying, dispersed explosive droplets in the form of granules. The final step comprises mixing the products from the former steps in specific ratios so as to provide the final explosive compositions known by the name “Hexotonal” or “Octonal”, respectively. Alternatively, the mixtures of granules from the first two steps are melted together and cast on a drum, ribbon or plate, or the first two are combined in the same reactor before any part of the dispersed phases has solidified. … An additional class of high-energy explosives having modified explosive properties, for instance high blasting effect especially below water, may be obtained by adding aluminum powder to the above mentioned explosive compositions of the Hexotol and Octol type, respectively. Said class is in the U.S. termed “Aluminized explosives” whereas in Europe it has the generic name “Hexotonal” or “Octonal”, respectively, depending on whether the origin is hexogen or octogen. More specifically, representatives of said class are known by such names as Torpex, H-6, HBX-1, HBX-3, Hexotonal, SSM 8870, and HTA-3, the last mentioned being based on HMX. Said grades are in particular used for military purposes, such as the filling of shells, missiles and rockets, as well as mines, depth bombs, torpedoes etc.”

Serco Awarded $95 Million Patent Classification Contract with the U.S. Patent and Trademark Office November 30, 2015 RESTON, VA – November 30, 2015 – Serco Inc., a provider of professional, technology, and management services, announced today the Company has been awarded a patent classification services contract with the United States Patent and Trademark Office (USPTO). Serco will provide initial patent classification and reclassification services to support USPTO’s core mission of examining, granting, and disseminating patents and trademarks. The recompete contract has a one-year base period with four one-year option periods, and is valued at $95 million over the five-year period, if all options and award terms are exercised.”

Malaysia Airlines Flight 17 (MH17)[a] was a scheduled passenger flight from Amsterdam to Kuala Lumpur that was shot down on 17 July 2014 while flying over eastern Ukraine, killing all 283 passengers and 15 crew on board.[1] Contact with the aircraft, a Boeing 777-200ER, was lost when it was about 50 km (31 mi) from the Ukraine–Russia border and wreckage of the aircraft fell near Hrabove in Donetsk Oblast, Ukraine, 40 km (25 mi) from the border.[2] The shoot-down occurred in the War in Donbass, during the Battle of Shakhtarsk, in an area controlled by pro-Russian rebels.[3] The crash was Malaysia Airlines‘ second aircraft loss during 2014 after the disappearance of Flight 370 on 8 March.[4]

The responsibility for investigation was delegated to the Dutch Safety Board (DSB) and the Dutch-led joint investigation team (JIT), who concluded that the airliner was downed by a Buk surface-to-air missile launched from pro-Russian separatist-controlled territory in Ukraine.[5][6] According to the JIT, the Buk that was used originated from the 53rd Anti-Aircraft Rocket Brigade of the Russian Federation,[7][8] and had been transported from Russia on the day of the crash, fired from a field in a rebel-controlled area, and the launcher returned to Russia after it was used to shoot down MH17.[9][7][10] On the basis of the JIT’s conclusions, the governments of the Netherlands and Australia hold Russia responsible for the deployment of the Buk installation and are taking steps to hold Russia formally accountable.[11]

The DSB and JIT findings confirmed earlier claims by American and German intelligence sources as to the missile type and launch area. In 2014 the US intelligence had also said that Russia had supplied the Buk missile to pro-Russian insurgents, and that the insurgents most plausibly shot down MH17 in error, misidentifying it as a military aircraft.[12][13][14]

Ukrainian Prime Minister Arseniy Yatsenyuk laid the blame on professional soldiers that he said came from Russia, stating that “it wasn’t drunken militants with Ukrainian passports [who shot down the Malaysian plane], it was done by Russian professionals and coordinated from Russia”, adding that “the whole world has learned about the Russian lies and Russian propaganda.”[15] As of May 2018, the Russian government rejects claims that Russia bears any responsibility for the crash, and denies involvement. The Russian defense ministry said that it had never deployed anti-aircraft missile systems in Ukraine.[8][16] Several false conspiracy theories about the crash have since appeared in Russian media, including that the aircraft was followed by a Ukrainian military jet.[17][13] The Russian Government holds Ukraine responsible since the crash happened in the Ukrainian flight information region.[18][19][20][21]

The Ukrainian Air Force was used extensively in operations against the rebels, and several UAF aircraft had been shot down over the rebel-controlled territory, both before and after the MH17 incident. Immediately after the crash, a post appeared on the VKontakte social media profile attributed to Igor Girkin, leader of the Donbass separatist militia, claiming responsibility for shooting down a Ukrainian An-26 military transporter near Torez.[22] This post was removed later the same day, and the separatists then denied shooting down any aircraft.[23][24][25] In late July 2014, communications intercepts were made public in which, it is claimed, separatists are heard discussing an aircraft that they had downed.[26][27][28][29] A video from the crash site, recorded by the rebels and obtained by News Corp Australia, shows the first rebel soldiers to arrive at the crash site. At first they assumed that the downed aircraft was a Ukrainian military jet, and were dismayed when they started to realise that it was a civilian airliner.[30]”

Inmarsat Global Ltd’s Method and apparatus for timing correction in communications systems Priority date  1999-03-05 .. 2009-05-12 US7532891B2 Grant Abstract In a wireless communications system, transceivers transmit short bursts to a base station, which determines timing corrections from the time of receipt of the burst and transmits the timing corrections to the respective transceivers. In one aspect, the base station indicates to the transceivers a plurality of time slots, each transceiver selects one of the time slots at random, formats a burst including an indicator of the selected time slot and transmits the burst in that slot. In another aspect, the base station transmits to each transceiver a timing uncertainty value, which determines how the timing correction will be modified by the transceiver as the interval since last receiving a timing correction increases. Data bursts are transmitted in a format comprising a first unique word, a content field and a second unique word, in that order. The bursts are transmitted in a TDMA channel format which can accommodate both short and long bursts in a block format of constant periodicity.”

BAE Systems PLC Proximity fuze Priority date  1998-12-23 2004-12-28 US6834591B2 Grant Abstract A proximity fuze for use in a tube launched projectile carrying a payload, comprising an oscillator for generating a radio frequency signal which has a varying frequency, a single antenna for transmitting the radio frequency signal and for receiving an echo of the radio frequency signal, a first signal processor for generating a range signal corresponding to the time delay between the transmission of the radio frequency signal and the receipt of the echo signal, second signal processor for comparing the range signal with a reference signal and depending on the result of the comparison generating an activation signal for activating the payload, wherein a directional coupler is used for coupling the radio frequency signal from the oscillator to the antenna and to the signal processor and for coupling the echo signal from the antenna to the signal processor, and wherein the second signal processor comprises a threshold detector, a peak detector and a comparator, the threshold detector being for allowing the comparator to utilise the output from the peak detector only once the range signal has reached a predetermined magnitude.”

Flight MH17 – Downed by a Proximity-Fuse Missile?

Early investigative reports, regarding the disaster of Malaysian Airlines Flight MH17, reveal that it was likely destroyed by a surface-to-air (SAM) missile which had a proximity-fuse detonation system.

How does a proximity-fuse detonation system work? What is its impact on people?

The development of the proximity fuse, during World War II, was one of the top-secrets of the war (and is credited with helping to shorten the conflict). This WWII-era video explains how the system works (and compares it with other types of bomb detonations).

Although MH17 was downed in 2014, if it was actually destroyed by a BUK-delivered missile, that missile would have detonated with a proximity fuse. The principle used during WWII is the same principle used with a Soviet-era BUK missile system.

A proximity-detonation system causes the missile to explode before it hits the target. As a result, shrapnel from the exploding missile comes at the target—in this instance, a plane—which when pierces the plane’s “skin.”

If that, in fact, was the cause of the disaster, what would have happened to the people on board the stricken plane?

More likely than not, they would have been instantly impacted by the blast force which would have caused the plane—likely traveling around 500 miles per hour—to instantly decelerate.

The forces on the plane itself, from such a sudden deceleration event, would have been profound. So would the effect on the passengers and crew. Everyone on board may have lost consciousness soon after it occurred.

Dr. James Vosswinkel, a trauma surgeon, led a study to determine how sudden deceleration effected passengers when TWA Flight 800 crashed off New York’s Long Island in 1996. He, and his colleagues, found that trauma to a human, in a mid-air explosion, occurs from three main sources:

The force of the blast itself, as it impacts the plane;

The massive deceleration when a plane, flying at 500 miles per hour, literally stops in mid-air; and

The impact of the fall as the stricken plane heads toward Earth.

In addition, losing cabin pressure at 33,000 feet can cause a loss of oxygen within seconds. That would also lead to a person’s loss of consciousness.

If travelers aboard Flight 17 had a loss of consciousness, soon after the plane was stricken, they may not have experienced the full trauma of the plane falling more than six miles to the ground.

This video clip, featuring historical newsreel footage about proximity-fuse detonation, is online via YouTube. We learn more about it from its YouTube description:

The proximity fuse was a radio transmitter/receiver that detected an object in its path. When the object was close enough, about 30 feet, the fuse would go off.

Before the proximity fuse, the range to the target had to be estimated and that range dialed into the shell. This was difficult against a maneuvering attack aircraft. The trick was to get the tiny radios rugged enough to withstand firing from an anti-aircraft gun.

…The proximity fuse was such a valuable secret that it was forbidden to be used over enemy territory until late in the war in case the enemy found a dud and become aware and possibly reproduce the technology or develop a countermeasure.

Heralded as an “organizational achievement transcending anything of the time … one of the most effective alliances among the military, academia, and industry,” the development of the Proximity Fuze during World War II was credited for reducing the duration of the war by at least a year. WWII is singularly distinguished as the only war in history in which the outcome of the war was significantly influenced by scientific breakthroughs that created weapons unknown at the war’s commencement.

Development of a radio-transmitter proximity fuse to detonate near a plane would require not just technological breakthroughs involving a variety of fields of expertise, but miniaturization of electronic systems that had never been accomplished, plus near perfect cooperation and coordination of the military forces (specifically the Navy and Army), universities (principally five), diversity of scientists from a variety of fields, industry (engineering laboratories, quality control, and production facilities), amateur radio operators, ordinance experts, testing facilities, along with an unprecedented level of teamwork.

Further, the project had to remain top secret during the war, despite ultimately employing about 1 million people in the production effort.

The system which worked so well during World War II still works today. The Soviet-era BUK missile system employs detonation-fuse technology.

If it is proven that such a missile strike caused the crash of MH17, we now have a better understanding of the mechanism which caused the deaths of all 298 people aboard the plane.”

The analysis of communications between Malaysia Airlines Flight 370[a] and Inmarsat‘s satellite telecommunication network provide the only[1][b] source of information about Flight 370’s location and possible in-flight events after it disappeared from radar coverage at 2:22 Malaysia Standard Time (MYT) on 8 March 2014 (17:22 UTC,7 March), one hour after communication with air traffic control ended and the aircraft departed from its planned flight path while over the South China Sea. Flight 370 was a scheduled commercial flight with 227 passengers and 12 crew which departed Kuala LumpurMalaysia at 0:41 and was scheduled to land in Beijing, China at 6:30 China Standard Time (6:30 MYT; 22:30 UTC, 7 March). Malaysia has worked in conjunction with the Australian Transport Safety Bureau to co-ordinate the analysis, which has also involved the UK’s Air Accidents Investigation BranchInmarsat, and US National Transportation Safety Board, among others. Others have also made efforts to analyse the satellite communications, albeit challenged by a lack of publicly available information for several months after the disappearance. On 29 July 2015, debris was discovered on Réunion Island which was later confirmed to come from Flight 370; it is the first physical evidence that Flight 370 ended in the Indian Ocean.[2]

During flight, the aircraft maintains a datalink with a satellite communication network for data and telephone calls. The datalink connects the aircraft and a ground station via satellite, which translates (changes) the signal’s frequency and amplifies the signal; the ground station is connected to telecommunication networks which allows messages to be sent to and received from other locations, such as the airline’s operations centre. Normal communications from Flight 370 were last made at 1:07 MYT and the datalink between the aircraft and satellite telecommunication network was lost at some point between 1:07 and 2:03, when the aircraft did not acknowledge a message sent from the ground station. Three minutes after the aircraft left the range of radar coverage—at 2:25—the aircraft’s satellite data unit (SDU) transmitted a log-on message, which investigators believe occurred as the SDU started after a power interruption. Between the 2:25 message and 8:19, the SDU acknowledged two ground-to-aircraft telephone calls, which were not answered, and responded to automated, hourly requests from the ground station that were made to determine whether the SDU was still active. None of the communications from 2:25–8:19contain explicit information about the aircraft’s location. The aircraft’s final transmission at 8:19 was a log-on message; the aircraft did not respond to a message from the ground station at 9:15. Investigators believe the 8:19 log-on message was made when the SDU was restarting after the aircraft ran out of fuel and the aircraft’s auxiliary power unit was started.

The search for Flight 370 was launched in Southeast Asia near the location of the last verbal and radar contact with air traffic control. The day after the accident, staff at Inmarsat reviewed the log of communications between their network and Flight 370 and discovered that Flight 370 continued for several hours after contact with air traffic control was lost. On 11 March, they provided a preliminary analysis to investigators based on recorded burst timing offset (BTO) values. Relatively simple calculations can be made from BTO values to determine the distance between the aircraft and satellite at each transmission. When these distances are plotted on Earth, they result in rings which are further reduced to arcs, due to the limited range of the aircraft. Another value—burst frequency offset (BFO)—was analysed to determine the movement of the aircraft relative to the satellite, based on the Doppler shift of the signals, which provides the location of the aircraft along the BTO-derived arcs. Initial analysis of the BFO values showed a strong correlation with a track south into the southern Indian Ocean, west of Australia. On 24 March, Malaysia’s Prime Minister cited this analysis to conclude that Flight 370 ended in the southern Indian Ocean with no survivors. After the initial analysis, the BFO calculations were later adjusted to account for a wobble in the satellite’s orbit and thermal changes in the satellite which affected the recorded BFO values. Further analysis considered the BTO and BFO calculations with flight dynamics, such as possible and probable aircraft speeds, altitudes, and autopilot modes. Two statistical analyses were made and combined with calculations of Flight 370’s maximum range to determine the most probable location of Flight 370 at the time of the 8:19 transmission, which is along the 8:19 BTO arc from approximately 38.3°S 88°E to 33.5°S 95°E.”

 “Con-Air” in 1/6 San Diego Union Tribune [news article] From: (Glenn Campbell, Las Vegas) Date: Tue, 7 Jan 1997 10:37:42 -0800
Subject: “Con-Air” in 1/6 San Diego Union Tribune [news article]

A correspondent passed this 1/6 article on to us. He adds: “The article in the hard-copy paper has a couple of pictures to go with the story (no pix on-line). One picture shows the shoulder patch on the aircrew uniforms, another shows prisoners lined up about to board a Convair 580. The paint job on the plane looked like INS or maybe US Marshals Service, it was a green stripe with an eagle forward of the door.”

(Password required)

The article is relevant here because of recent discussion of Con-Air flights using the “Janet” company name.
In the Disney film, Nicolas Cage plays a hapless prisoner who wanders into a hijack plot aboard a Marshals Service plane carrying a group of high-security inmates.

The Hollywood marshals rough up some of the prisoners, and the plane crashes, leaving the real Marshals Service frowning on the silver screen’s invention, said Kristine Marcy, a top official in charge of detentions.

“We don’t beat up our prisoners, and our planes certainly don’t crash,” Marcy said on a recent trip to San Diego, where she was trying to find more jail space for federal prisoners.

Marcy said the air transportation system inspires a high level of commitment in its personnel.

“People are always willing to be on standby or to work overtime,” she said, noting that the planes are not always used for prisoner transport.

After a hurricane flattened parts of the Virgin Islands last year, the prisoner transportation system flew in some of the first reinforcements to help establish law and order, she said.

After the Oklahoma City bombing, the airline flew evidence to the FBI crime laboratory [Quantico] in Washington, D.C., she said.”

History –  National Prisoner Transportation System On August 20, 1985,  the U.S. Marshals Service acquired its first Boeing 727 used for prisoner transportation.  The Marshals Service operated the National Prisoner Transportation System, one of the largest transporters of prisoners in the world.”

Police conclude search of Starnet [which forfeited its network to IRS and Customs SWAT teams]

CBC News · Posted: Aug 24, 1999 11:26 AM ET | Last Updated: August 24, 1999

Police have wrapped up several days of searching the offices of Starnet Communications in Vancouver. They entered the company offices and homes of some directors on Friday.

Police were looking for evidence of illegal gambling, distributing child pornography, and money laundering.

Since the raid, Starnet officials say police just don’t understand their business.

The search warrant details 18 months of police investigation. It traces a network of companies registered in American and Caribbean jurisdictions.

The warrant also identifies Vancouver as the centre of Starnet’s operations, even though this is a grey under Canadian law.

Police note that Starnet’s revenues grew dramatically in the past two years, from betting and sex shows and from lucrative licensing agreements for its gaming software.

The investigations and pornography from company sites were grounds for Friday’s raid and seizure of company materials.

RCMP Constable Peter Thiessen says investigators left Starnet offices yesterday morning. He says, “They spent the better part of three days going through the business. And as a result of that search the investigation is continuing, but no charges have been laid.”

Starnet’s many investors were spooked by the raid. Share prices dropped almost 70-percent on Friday. However, the company insists the raid had minimal effect on its operation. Stocks rose slightly yesterday after a day of very heavy trading.

In written statements, company CEO Mark Dohlen said the Wall Street Journal calls Starnet the leader in Internet gaming and entertainment. He says companies like his, those on the cutting edge, are often misunderstood.

Yesterday, Starnet announced it will sell off the sex side of its business. It plans to focus more resources on gaming.

The Police investigation is expected to last for several more months.”

The White House FBI files controversy of the Clinton Administration, often referred to as Filegate,[1] arose in June 1996 around improper access in 1993 and 1994 to FBI security-clearance documents. Craig Livingstone, director of the White House‘s Office of Personnel Security, improperly requested, and received from the FBI, background reports concerning several hundred individuals without asking permission. The revelations provoked a strong political and press reaction because many of the files covered White House employees from previous Republican administrations, including top presidential advisors. Under criticism, Livingstone resigned from his position. Allegations were made that senior White House figures, including First Lady Hillary Rodham Clinton, may have requested and read the files for political purposes, and that the First Lady had authorized the hiring of the underqualified Livingstone.”

Nortel Networks Ltd’s Method for efficient management of certificate revocation lists and update information Priority date  1995-11-13 1997-12-16 US5699431A Grant Abstract A method which allows implementation of the revocation of public-key certificates facilitates engineering of certificate revocation lists (CRLs). It solves the practical problem of CRLs potentially growing to unmanageable lengths by allowing CRLs to be segmented, based on size considerations or priority considerations related to revocation reasons. The method is used to distribute CRL information to users of certificate-based public-key systems. It is also applied more generally to update any field in a certificate by reference to a secondary source of authenticated information.”

States Work with Feds for PKI Interoperability BY: Drew Robb | August 14, 2001 The 1977 epic A Bridge Too Far recaptures one of the most fruitless battles of World War II — a costly attempt to capture six bridges that connected Holland and Germany. A major gamble from the outset, the campaign led to defeat and more Allied casualties than in the entire Normandy invasion. Fortunately, the folks at the Federal Bridge Certification Authority (FBCA) are having an easier time of it in an initiative aimed at handling some of the thornier questions in government security — exactly who do you trust when it comes to the handing out and acceptance of digital certificates during e-Government transactions, how do states and federal agencies interoperate to make such certs usable across the government spectrum, and what will it really take to establish “digital” trust to make paperless e-government a reality? The Cast FBCA has gathered an impressive array of federal agencies, states and vendors in an effort to make the initiative a success. On the federal side, there is heavy involvement by the Department of Defense, National Security Agency, General Services Administration, Treasury and the Federal CIOs Council. From the vendor community Entrust Technologies and Baltimore Technologies are directly involved in the FBCA from the technology side, but other PKI/security vendors such as RSA, Cylink, Verisign and Spyrus are also coordinating with the project. At the state level, Illinois is working closely with the FBCA in an interoperability pilot that will probably form the basis of how states share digital certificates with federal and possibly commercial entities. “We are just in the process of developing the cross-certification agreement between FBCA and the State of Illinois CA so we have not tested any applications yet,” said Brent Crossland, Deputy CIO for the State of Illinois. “Our timetable is to have the agreement in place by September along with some initial applications.” According to Crossland, Washington and New Jersey are also in discussions with the FBCA.”

 “The Office of Strategic Services (OSS) was a wartime intelligence agency of the United States during World War II, and a predecessor of the modern Central Intelligence Agency (CIA). The OSS was formed as an agency of the Joint Chiefs of Staff (JCS)[3] to coordinate espionage activities behind enemy lines for all branches of the United States Armed Forces. Other OSS functions included the use of propaganda, subversion, and post-war planning. On December 14, 2016, the organization was collectively honored with a Congressional Gold Medal.[4]”

Nathaniel Mayer Victor Rothschild, 3rd Baron Rothschild, (1910-1990), was a biologist, a cricketer, a wartime officer for the UK Security Service (MI5), a senior executive with Royal Dutch Shell and N M Rothschild & Sons, and an advisor to the UK governments.

Early life

Known throughout his life as Victor, he was the third child and only son of Charles and Rozsika Rothschild. The family home was Tring Park Mansion. He had three sisters, Miriam (1908–2005) who became a distinguished entomologist, Nica (1913–1988), who became a patron of highly influential jazz musicians, and Elizabeth, known as Liberty (1909–1988).

He attended Harrow and Trinity College Cambridge, where he worked in the Zoology Department before gaining a PhD in 1935. At Trinity College, Cambridge, he read Physiology, French and English. While at Cambridge Victor was said to have a playboy lifestyle, enjoying water-skiing in Monaco, driving fast cars, collecting art and rare books and playing cricket for the University and Northamptonshire. Victor married Barbara Hutchinson in 1933, and the couple had three children, Sarah Rothschild (b.1934), Nathaniel Charles (Jacob) Rothschild (b.1936) and Miranda Rothschild (b. 1940). The marriage was later dissolved.

Victor became the third Lord Rothschild in 1937 on the death of his uncle Walter. He sat as a Labour Party peer in the House of Lords, but spoke only twice there during his life (both speeches were in 1946, one about the pasteurization of milk, and another about the situation in Palestine).

Wartime service

During the Second World War Victor worked for the Intelligence Service, and earned the George Medal for his bomb disposal work. In early 1939, he travelled to the United States where he visited the White House to discuss the issue of accepting Jewish refugees from Nazi Germany. In 1939, he was recruited to work for MI5 where he remained for the duration of the War. He was attached to B division, under deputy director Guy Liddell, responsible for counterespionage. In 1940 he produced a series of secret reports on German Espionage Under cover of Commerce and later founded section ‘B1c’ at Wormwood Scrubs, the wartime home of MI5. This was an ‘explosives and sabotage section’, and worked on identifying where Britain’s war effort was vulnerable to sabotage and counter German sabotage attempts. This included personally dismantling examples of German booby traps and disguised explosives. For this, he was awarded won the George Medal in 1944 for dangerous work in hazardous circumstances. This involved dismantling a pair of German time bombs concealed in boxes of Spanish onions in Northampton. By late 1944, Victor was attached to the 105 Special Counter Intelligence Unit of the SHAEF, a joint operation of MI5 and X2, the counterespionage branch of OSS, a precursor of the CIA, operating in Paris.”

Serco Receives “Supplier of the Year” from Boeing for Enterprise Architecture Expertise

We are extremely honored to receive this recognition for our work in support of Boeing. This prestigious award demonstrates our passion for excellence and ability to apply Serco‘s Enterprise Architecture expertise across a broad range of applications.


Serco Inc., a provider of professional, technology, and management services to the federal government, has been recognized as Supplier of the Year by The Boeing Company in the Technology category for its state-of-the-practice Enterprise Architecture solutions.

The Boeing Supplier of the Year award is the company’s premier supplier honor, presented annually to its top suppliers in recognition of their commitment to excellence and customer satisfaction. This year’s 16 winners represent an elite group among more than 17,525 active Boeing suppliers in nearly 52 countries around the world. This selection was based on stringent performance criteria for quality, delivery performance, cost, environmental initiatives, customer service and technical expertise. This is the second time Serco has been recognized as Supplier of the Year by Boeing. In January 2011, Serco also received the Boeing Performance Excellence Gold Award in recognition of the Company’s performance excellence.

“We are extremely honored to receive this recognition for our work in support of Boeing. This prestigious award demonstrates our passion for excellence and ability to apply Serco’s Enterprise Architecture expertise across a broad range of applications,” said Ed Casey, Chairman and CEO of Serco. “We continue to grow our EA practice, and over the past 15 years we have deployed solutions to support enterprises and systems across federal and commercial environments.”

Serco’s Enterprise Architecture Center of Excellence is based in Colorado Springs, CO. The team provides a variety of services in support of Boeing’s business units as well as research and development efforts. Serco’s architecture employs object-oriented (OO)/Unified Modeling Language (UML) to define, design and satisfy defense agencies’ mission-critical requirements, including Command, Control, Communications, Computers and Intelligence (C4I). This approach improves system developer’s understanding of operational requirements and how best to integrate enterprise operations and systems for the optimal fulfillment of C4I and other operational needs.”

Boeing Co’s  Intervention flight management system Priority date 1986-08-15 1989-03-07 US4811230A Grant (Probably installed on a U S Marshals’ Con Air Boeing 727 and the Boeing production line after conversation between Kristine Marcy and her brother Field McConnell in December 1988)

Southwest Research Institute’s (SwRI) Interactive training system for AWACS weapons directors Priority date  1997-10-17 2000-04-25 US6053736A Grant Abstract A training system for training AWACS weapons directors. The training system is programmed so that the student can select between a number of different training modes. These include interactive courseware, simulation, and live exercise modes. The system includes a voice recognition unit that is trained to recognize AWACS terminology and to interactively teach them.

Darren Rubin’s Biological active bullets, systems, and methods US9200877B1

Airliner irreversible-control anti-hijack system 2005-01-18 US6845302B2 Grant including ATI (automatic/tranquil-Infusion)

Howard Lutnick’s Real-time interactive wagering on event outcomes CA 2460367 A.

 “Jerome H. Lemelson’s Prisoner tracking and warning system and corresponding methods US6054928A A system and method for tracking, monitoring and learning prisoner or parolee behavior involves obtaining prisoner or parolee data and monitoring data for at least one individual prisoner or parolee, storing the prisoner or parolee data and monitored data into a database, learning prisoner or parolee behavior from the prisoner or parolee data and the monitored data in the database, and updating the prisoner or parolee data and the monitored data in the database. Expert system (i.e. including but not limited to fuzzy logic, reinforcement learning, neural networks, artificial intelligence, etc.) algorithms are executed for determining and analyzing deviated behavior by the prisoner or parolee. A parole level is assigned to the prisoner or parolee and it is determined whether the prisoner or parolee is to be moved up or down a parole level depending on whether the prisoner or parolee behavior does not constitute or does constitute prisoner or parolee violations. Furthermore, the system tracks, monitors, and learns the behavior of the prisoner or parolee by controlling and regulating the permitted/prohibited locations or sectors, the permitted/prohibited location or sector dwell times, the permitted/prohibited travel routes, the permitted/prohibited travel times that the prisoner or parolee spends at or between various locations.”

Darren Rubin’s Biological active bullets, systems, and methods 2015-12-01US9200877B1Grant A novel biological active bullet able to be discharged from a firearm, the ammunition essentially comprising a bullet in a cartridge, the bullet associated with/containing at least one biological active substance, along with a method of use of delivering with this bullet at least one biological active substance having at least one biological effect in the target upon impact and penetration, in addition to the bullet wound, and thus, having additional functions and applications than prior art bullets.

Jerome H. Lemelson’s [conman] Friend or foe detection system and method and expert system military action advisory system and method 2000-12-26 US6166679A Grant Abstract A friend or foe detection system and method is disclosed. Friend or foe warning unit 20 has a geographic locating system, a communication system for communicating with each of the warning units, and a military force detection system for detecting military forces in a combat area and has a signal routing and control circuitry 50 for controlling operations. A number of components, devices, or sub-systems, such as a transmitter/receiver radio 28, an antenna 26, a microphone 30, a speaker 32, a battery 34, a display 36, a microprocessor 38, a memory 40, a camera 56, a radar/lidar input 54, on/off switch 52, a GPS location system 45 that includes a GPS processor 46, a GPS receiver 42, a GPS antenna 44, are coupled to the circuitry 50. Display 36 provides a display to the user of the unit 20 and shows the location of friendly forces as well as unfriendly or unidentified forces in the area. Display 36 displays text messages for the user of the warning unit 20. The microprocessor 38 together with memory 40 provide microprocessor control of the operations of the warning unit 20. The geographic locating system includes GPS processor 46, GPS receiver 42, and GPS antenna 44, and it is used to determine the exact location of the warning unit 20. The unit 20 is able to broadcast and receive military force information, such as location and status (i.e. friendly, unfriendly, unidentified statuses). An expert system military action advisory system and method for advising military troops or personnel of firing decisions is also disclosed. A firing index is determined based on the membership variables, and the firing index is used to help make the firing decisions. The membership variables and the firing index are defined for an expert system or fuzzy logic system, and the expert system or fuzzy logic system helps determine making the firing decisions. The system and method operate by transmitting target and friendly force GPS coordinate information to determine danger. Alternatively, only target coordinates are transmitted with fire danger indices calculated on a distributed basis by individual warning units and transmitted to the source of fire without friendly force location coordinates to assist in making final firing decisions.”

Boeing Co’s Encryption for asymmetric data links Priority date  2001-05-04 US 7023996B2 Grant Abstract A method is provided for asymmetrically encrypting data communicated between a ground platform and multiple airborne platforms. The method includes packet encrypting ground-based data so as to preserve routing information while encrypting the remaining data. The packet-encrypted data is then transmitted to the airborne platforms. The method also includes bulk encrypting airborne-based data so as to maximize security. The bulk-encrypted data is then transmitted to the ground platform.”

Vencore Services and Solutions Inc, Cyveillance Inc   Social Engineering Protection Appliance 2015-09-01 US9123027B2 Grant  Abstract Methods and systems for detecting social engineering attacks comprise: extracting one or more non-semantic data items from an incoming email; determining whether the one or more non-semantic data items match information stored in a data store of previously collected information; performing behavioral analysis on the one or more non-semantic data items; analyzing semantic data associated with the email to determine whether the non-semantic data matches one or more patterns associated with malicious emails; and based on the determining, performing, and analyzing, identifying the email as potentially malicious or non-malicious. The system also includes processes for collecting relevant information for storage within the data store and processes for harvesting information from detected social engineering attacks for entry into the data store and seeding of the collection processes.

 “Motorola Solutions Inc’s  Dynamic encryption key selection for encrypted radio transmissions 1993-06-22 US5222137A Grant Abstract A radio (100) transmits and receives encrypted signals having unencrypted key identifiers, allowing other radios having the corresponding key identifiers and encryption keys to communicate with radio (100). Prior to transmitting an encrypted message, radio (100) selects a unique key identifier automatically and uses the corresponding encryption key to encrypt the message that will be transmitted. Radio (100) transmits the key identifier in an unencrypted format with the encrypted message in order to allow other radios to determine the encryption key used in encrypting the message. When receiving an encrypted message, radio (100) uses the predetermined process stored in the radio (100) to properly select the proper encryption key for use in decrypting the incoming message.”

AWACS Weapons Directors – In a recent exercise, ROADRUNNER ‘98, several agencies interacted to create several battlespace missions in which “friendly” fighter aircraft and command and control crewmembers participated as trainees, while supporting roles and enemy forces were either played by operational personnel (virtual players) or created by intelligent agent technology (constructed forces).

QinetiQ Acquires Cyveillance, Inc. to Strengthen Cyber Security Dominance with Leading Open Source Intelligence Solutions Combined Services Will Offer Comprehensive, Superior Intelligence Solutions to Both Commercial and Government Customers

May 06, 2009 08:57 AM Eastern Daylight Time

ARLINGTON, Va.–(BUSINESS WIRE)–Cyveillance today announced that it has signed an agreement to be acquired by QinetiQ North America, a provider of information technology and engineering solutions to the U.S. government. Under terms of the agreement, pending regulatory approval, Cyveillance will become a QinetiQ North America subsidiary. The company will continue to deliver Internet risk and threat intelligence to commercial organizations worldwide, while providing QinetiQ North America with the technology and expertise to enhance its innovative government-focused Cyber Security and Intelligence solutions.”

Cyveillance launches Cyber Threat Centre

Posted 17 September 2014 · Add Comment

QinetiQ company Cyveillance, has launched its comprehensive cloud-based intelligence platform, the Cyber Threat Centre.

The Centre allows security and risk professionals to undertake their own collection and analysis of online threat intelligence, and to identify and respond to threats faster and more effectively.

The Cyber Threat Centre combines web search, social media monitoring, global intelligence reports, and a suite of investigative tools and databases in an easy-to-use, cloud-based portal. Professionals who are responsible for physical and IT security, incident response, cyber investigations, and online compliance can distill information from thousands of sources outside the firewall into useable intelligence, tailored for their business needs.

“The Cyber Threat Centre is built on our experience from more than 16 years in the cyber security industry,” said Cyveillance President Scott Kaine. “It is the natural evolution of our offerings. By taking advantage of the fact that we have already done the work of collecting and tagging vast amounts of data, the Cyber Threat Centre enables security and risk professionals to spend more time on analysis, and less time searching and configuring multiple different portals and data feeds.”

The Centre gives organizations access to the same powerful sources, tools and databases already used by Cyveillance analysts, as well as extensive data for cyber investigations and better intelligence. Cyveillance continues to grow its traditional threat analyst practice, which provides tailored, customer-specific threat intelligence to organisations around the world.

“The Cyber Threat Centre is a user-friendly, scalable offering that puts the tools directly in the hands of our global customers and partners,” added Sanjay Razdan, Managing Director for QinetiQ New Technologies.”

Serco Receives “Supplier of the Year” from Boeing for Enterprise Architecture Expertise

RESTON, VA (PRWEB) MAY 19, 2011 Serco Inc., a provider of professional, technology, and management services to the federal government, has been recognized as Supplier of the Year by The Boeing Company in the Technology category for its state-of-the-practice Enterprise Architecture solutions. … Serco‘s Enterprise Architecture Center of Excellence is based in Colorado Springs, CO. The team provides a variety of services in support of Boeing’s business units as well as research and development efforts. Serco‘s architecture employs object-oriented (OO)/Unified Modeling Language (UML) to define, design and satisfy defense agencies’ mission-critical requirements, including Command, Control, Communications, Computers and Intelligence (C4I). This approach improves system developer’s understanding of operational requirements and how best to integrate enterprise operations and systems for the optimal fulfillment of C4I and other operational needs.

About Serco Inc.: Serco Inc. is a leading provider of professional, technology, and management services focused on the federal government. We advise, design, integrate, and deliver solutions that transform how clients achieve their missions. Our customer-first approach, robust portfolio of services, and global experience enable us to respond with solutions that achieve outcomes with value. Headquartered in Reston, Virginia, Serco Inc. has approximately 11,000 employees, annual revenue of $1.5 billion, and is ranked in the Top 30 of the largest Federal Prime Contractors by Washington Technology. Serco Inc. is a wholly-owned subsidiary of Serco Group plc, a $6.6 billion international business that helps transform government and public services around the world. More information about Serco Inc. can be found at”

Motorola announced that their semiconductor division would be divested on October 6, 2003, to create Freescale. Freescale completed its IPO on July 16, 2004.

On September 15, 2006, Freescale agreed to a $17.6 billion buyout by a consortium led by Blackstone Group and its co-investors, Carlyle GroupTPG Capital, and Permira.[26] The buyout offer was accepted on November 13, 2006, following a vote by company shareholders. The purchase, which closed on December 1, 2006, was the largest private buyout of a technology company until the Dell buyout of 2013 and is one of the ten largest buyouts of all time.[27]

Freescale filed to go public on February 11, 2011, and completed its IPO on May 26, 2011. Freescale is traded on the New York Stock Exchange under the ticker symbol FSL. At the time of the IPO, the company had $7.6 billion in outstanding debt on its books,[28] and the company is being investigated for misconduct related to this IPO.[29]”

Serco suffers profits collapse but on ‘path to recovery’ says CEO Troubled outsourcer Serco details full extent of its woes and kicks off £555m rights issue By Alan Tovey, Industry Editor 11:22AM GMT 12 Mar 2015 Troubled outsourcer Serco has launched a £555m rights issue as it starts on what chief executive Rupert Soames called “the path of recovery”. Shares in the company, which had more than half a billion pounds wiped off its market value in November when it stunned the market with a huge profit warning, [after fraudulently charging UK government for transporting fake prisoners in Con Air SWAT teams] tumbled again as Mr Soames set out the full extent of the Serco‘s troubles. …  The company’s rights issue, on which Rothschild is advising [cf Victor Rothschild, Pearl Harbor and the Henry Tizard Patent Pool, will see 549m new shares issued. The scheme is on a 1:1 basis and is priced at 101p, a deeply discounted 51.1pc compared with the previous closing price, and a 34pc discount on theoretical ex-rights price. The fundraising – which is subject to shareholder approval – is fully underwritten and the proceeds will be used to cut Serco’s debt by £450m. At the end of the year Serco’s net debt stood at £682m. The company said that subject to the rights issue’s completion, it had struck an agreement with its creditors to refinance its funding.”

Serco Inc. Capabilities Chemical, Biological, Radiological, Nuclear and Explosive (CBRNE) Software Support Develop, demonstrate, implement and transition technologies to improve software/hardware development, fielding and sustainment support for chemical/biological detection and reconnaissance systems, individual and collective protection systems, decontamination systems, and information management systems for the Warfighter and First Responder, Homeland Defense and civil support activities.”

Boeing Begins World Headquarters Operations in Chicago

The Boeing Company began operations on schedule today [Sep 4, 2001] at its new world headquarters building in downtown Chicago.

Approximately 200 employees began unpacking and familiarizing themselves with the building, located on the Chicago River at 100 North Riverside. The company expects approximately 400 employees to be working on the building’s top 12 floors by the end of the year.

Boeing and a team of more than 70 subcontractors, vendors and consultants delivered the finished office space, sophisticated telecommunications system, and computing infrastructure on schedule after 117 days of focused, intense effort. The aggressive schedule was driven by the company’s commitment to employees with families to coordinate the opening with local school schedules.

Boeing Chairman and CEO Phil Condit – who will officially commemorate the opening of the new Boeing World Headquarters during a ceremony at the building tomorrow – announced in March a broad rearchitecture of the company that included the headquarters relocation. In addition, the leaders of the company’s business units were given increased authority and responsibility to run their operations based on the needs of their customers, markets and communities where they do business.

“Boeing is in the midst of many exciting changes, and our new world headquarters in Chicago is part of our ongoing transformation,” Condit said. “We intend to grow our enterprise here and create businesses that open frontiers and advance technology, while allowing our business leaders in other locations to drive their businesses to their full potential.”

The building is designed with a vision of instant access to information by anyone from anywhere. More than 225 miles of data, communications and security cable were installed to support the more than 300 computers and 500 telephones needed on opening day.

Office spaces have been equipped with more than 3,000 data and telephone connections to support future information technology advancements along with systems needed to meet the goal of wireless connectivity in the future Boeing employees in Chicago are just a mouse click away from any Boeing facility, customer or supplier in 145 countries. Boeing employees, customers and suppliers visiting the new world headquarters will find a number of “mobile desk” touchdown spaces that provide Internet and LAN access, and equipment needed to be productive while away from their home offices.”


1027 Total Views 1 Views Today
Please follow and like us:

Related Post