Reverse CSI 9 – Con Air Serco’s North Tower AWACS, Rothschild Patented Death Pool Anthrax, First Ladies’ Starnet Blackmail Bridge
David ‘Sherlock’ Hawkins, co-founder of Abel Danger, is developing 3-act CSI storyboards for radio dramas and theatre plays involving scene-by-scene reverse engineering of the 9/11 mass-casualty events and the subsequent ‘Amerithrax’ HVT attacks on media and Senate leaders, allegedly executed with patented devices in the custody of Serco and its investment banker N M Rothschild & Sons Ltd.
In Reverse CSI 9, Hawkins identifies images and references (below) for an Act 3 Scene 3 storyboard to focus on patented devices used by Kristine “Con Air” Marcy, Field McConnell’s sister, to integrate Con Air SWAT teams with AWACS weapons directors and support a Starnet dead-pool child-pornography blackmail ring allegedly set up on the federal bridge certification authority network so that former United States First Ladies and IP lawyers Hillary Clinton and Michelle Obama could intimidate witnesses, spin fake news and organize the spoliation of evidence of the ongoing criminalization of the U.S. Marshals prisoner transportation network which Marcy launched in 1985 when she bought a Boeing 727 with money confiscated through the DOJ Asset Forfeiture Fund.
In the planned radio drama to be established with selected talk show hosts, Hawkins expects to show how a child-pornography blackmail ring allegedly operated by Kristine Marcy and the former First Ladies Hillary Clinton and Michelle Obama, has intimidated witnesses, spun fake news and spoliated evidence which would otherwise connect the Amerithrax / sabotage spore powder attacks on U.S. Commerce Secretary Wilbur Ross, the former Rothschild investment banker for Serco and U.S. President Donald Trump, who apparently hosted a Serco death pool on the 47th floor of the North Tower (WTC1)where insiders bet on body counts on 9/11.
Images & Video for storyboard collage
CSI 9 Act 3 Scene 3 – First Ladies’ Starnet Blackmail Bridge
Media Coverage of Starnet Raid – August 20, 1999
Kristine Marcy allegedly used the DOJ Asset Forfeiture Fund in 1984 to buy a Boeing 727 for the deployment of Con Air SWAT teams and AWACS weapons directors with patented devices to crime scenes involving mass casualty events such as the attack on the NYC Twin Towers on 9/11 or HVT events.
Revealed: Barack Obama’s gay transgender prostitute nanny who made him laugh by trying on his mother’s lipstick. Evie, 66, cared for future Commander in Chief she called Barry in late 60s. Offered job after she impressed Obama’s mother with steak and rice. When family left Indonesia, she became a sex worker and now lives in a slum.
References for storyboard – CSI 9 Act 3 Scene 3
“Digital Fires Instructor Serco – [Marine Corps Base!] Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”
“History – National Prisoner Transportation System On August 20, 1985, the U.S. Marshals Service acquired its first Boeing 727 used for prisoner transportation. The Marshals Service operated the National Prisoner Transportation System, one of the largest transporters of prisoners in the world.”
“Serco Awarded $95 Million Patent Classification Contract with the U.S. Patent and Trademark Office November 30, 2015 RESTON, VA – November 30, 2015 – Serco Inc., a provider of professional, technology, and management services, announced today the Company has been awarded a patent classification services contract with the United States Patent and Trademark Office (USPTO). Serco will provide initial patent classification and reclassification services to support USPTO’s core mission of examining, granting, and disseminating patents and trademarks. The recompete contract has a one-year base period with four one-year option periods, and is valued at $95 million over the five-year period, if all options and award terms are exercised.”
“The 2001 anthrax attacks, also known as Amerithrax from its Federal Bureau of Investigation (FBI) case name, occurred within the United States over the course of several weeks beginning on September 18, 2001, one week after the September 11 attacks. Letters containing anthrax spores were mailed to several news media offices and two Democratic U.S. Senators (Tom Daschle and Patrick Leahy), killing 5 people and infecting 17 others. According to the FBI, the ensuing investigation became “one of the largest and most complex in the history of law enforcement”.”
“MONDAY, MAY 28, 2007 Technical Intelligence in Retrospect: The 2001 Anthrax Letters Powder
Technical Intelligence in Retrospect: The 2001 Anthrax Letters Powder
Authors: Dany Shoham; Stuart M. Jacobsen
Published in: International Journal of Intelligence and CounterIntelligence, Volume 20, Issue 1 March 2007 , pages 79 – 105
Introduction: In a sense, the very fact that the late 2001 anthrax letters attack on the United States has still not been solved is no less meaningful and important than that unprecedented act of bioterrorism itself. A wide range of far-reaching implications – geopolitical, legal, strategic, technological, scientific, and medical – emanate from that failure. An attempt is made here to take an integrated look into some of these various aspects so as to gain a better understanding of this potentially colossal event. Special attention is paid to a reconstructive analysis of the sabotage spore powder (SSP) contained in the lethal letters, and its structure. The anthrax bacterium is a pathogen of major concern, whose potency is afforded by the aerial dispersibility attained through the peculiar powdery texture of the material used for this act of bioterrorism. This peculiarity constitutes a key attribute, which can be traced and deciphered through retrospective technical intelligence that may lead to the SSP’s provenance. It further demonstrates the significance of technical intelligence at large as a prime tool of the intelligence services.
In contrast to the wealth of empirical data collected and published with respect to the specific anthrax Ames strain of the 2001 letter attack, the resultant medical cases, and the dispersal of the SSP, a relative paucity of information has been brought out regarding the structure and composition of the SSP itself. That still poses an enigmatic, extremely complex intelligence issue that needs to be elucidated, for numerous reasons. Consequent to the absence of definite intelligence regarding the SSP’s provenance, the need to apply technical intelligence methodologies seems to be vital. The Federal Bureau of Investigation (FBI), the Central Intelligence Agency (CIA), and the Defense Intelligence Agency (DIA) have all been deeply involved, indeed, in an attempt to meet this need.”
“Evonik Degussa GmbH’s Hydrophobic silica Priority date 1999-12-22 2007-10-16 US7282236B2 Grant Abstract Methods of making hydrophobic, pyrogenically produced silica having a tamped density, of 55 to 200 g/l. Said silica is produced by hydrophobizing pyrogenically produced silica by reaction with a halogen free silane and then compacting it with means consisting of a roller compactor or a belt filter press. The silica may be used for the production of dispersions.”
“Police conclude search of Starnet [which forfeited its network to IRS and Customs SWAT teams]
CBC News · Posted: Aug 24, 1999 11:26 AM ET | Last Updated: August 24, 1999
Police have wrapped up several days of searching the offices of Starnet Communications in Vancouver. They entered the company offices and homes of some directors on Friday.
Police were looking for evidence of illegal gambling, distributing child pornography, and money laundering.
Since the raid, Starnet officials say police just don’t understand their business.
The search warrant details 18 months of police investigation. It traces a network of companies registered in American and Caribbean jurisdictions.
The warrant also identifies Vancouver as the centre of Starnet’s operations, even though this is a grey under Canadian law.
Police note that Starnet’s revenues grew dramatically in the past two years, from betting and sex shows and from lucrative licensing agreements for its gaming software.
The investigations and pornography from company sites were grounds for Friday’s raid and seizure of company materials.
RCMP Constable Peter Thiessen says investigators left Starnet offices yesterday morning. He says, “They spent the better part of three days going through the business. And as a result of that search the investigation is continuing, but no charges have been laid.”
Starnet’s many investors were spooked by the raid. Share prices dropped almost 70-percent on Friday. However, the company insists the raid had minimal effect on its operation. Stocks rose slightly yesterday after a day of very heavy trading.
In written statements, company CEO Mark Dohlen said the Wall Street Journal calls Starnet the leader in Internet gaming and entertainment. He says companies like his, those on the cutting edge, are often misunderstood.
Yesterday, Starnet announced it will sell off the sex side of its business. It plans to focus more resources on gaming.
The Police investigation is expected to last for several more months.”
“The White House FBI files controversy of the Clinton Administration, often referred to as Filegate, arose in June 1996 around improper access in 1993 and 1994 to FBI security-clearance documents. Craig Livingstone, director of the White House’s Office of Personnel Security, improperly requested, and received from the FBI, background reports concerning several hundred individuals without asking permission. The revelations provoked a strong political and press reaction because many of the files covered White House employees from previous Republican administrations, including top presidential advisors. Under criticism, Livingstone resigned from his position. Allegations were made that senior White House figures, including First Lady Hillary Rodham Clinton, may have requested and read the files for political purposes, and that the First Lady had authorized the hiring of the underqualified Livingstone.”
“Barack Obama & the gay connection
May 4, 2016
Fox News host Greg Gutfeld stated that “Obama is now out of the closet” after the president announced his support for gay marriage. In response, former George W. Bush speechwriter, David Frum, stated, “You cannot ‘get’ Gutfeld’s joke unless you ‘get’ that a large part of his audience ardently believes that Obama is in fact gay, that his marriage is a sham, and that Mrs. Obama leads a life of Marie Antoinette–like extravagance to compensate for her husband’s neglect while he disports himself with his personal aides”. Like many gay men, Obama is not monogamous and therefore most of his relationships overlap, sometimes even for years. Consequently, like most of his public persona, his marriage to Michelle Obama is a colossal hoax which has been perpetrated on the American public for the sake of politics.. The notion that the president is gay is corroborated by the fact that Obama routinely goes on business trips and vacations without his wife while Michelle often travels domestically and internationally without her husband, something unprecedented for a sitting U.S. President and his First Lady.
The Obama’s are so distant they’ve spent a record third straight Valentine’s Day apart. Obama generally spends the romantic holiday with male “friends” while Michelle is often accompanied by her daughters or mother. In order to help sell the notion that Barack and Michelle are indeed a real-life couple, a propaganda film entitled “Southside with You” (2016) about the Obama’s first date was released at the Sundance Film Festival on January 24, 2016. As depicted in the report entitled “Was Barack Obama Married in College?”, Obama has been photographed on multiple occasions wearing a ring on his ring finger prior to his engagement to Michelle in 1991.
Since Obama was groomed by the CIA in Switzerland to become America’s first dictator, every part of Obama’s life has been carefully scripted. Consequently, the ring worn by Obama was evidently part of a script designed to: a) draw attention away from the fact that Obama is a homosexual, and b) serve as a sign for women to “stay away” from Obama lest it become apparent that he has no interest in them. In the event that Obama is fully outed as being gay during his presidency and subsequent dictatorship, a story about the ring will likely become a national scandal over speculation about a possible engagement or marriage to a woman prior to Michelle. Needless to say, like the marriage of Bill and Hillary Clinton, the Obama’s marriage is fraudulent in nature and only maintained for public consumption.
“Nortel Networks Ltd’s Method for efficient management of certificate revocation lists and update information Priority date 1995-11-13 1997-12-16 US5699431A Grant Abstract A method which allows implementation of the revocation of public-key certificates facilitates engineering of certificate revocation lists (CRLs). It solves the practical problem of CRLs potentially growing to unmanageable lengths by allowing CRLs to be segmented, based on size considerations or priority considerations related to revocation reasons. The method is used to distribute CRL information to users of certificate-based public-key systems. It is also applied more generally to update any field in a certificate by reference to a secondary source of authenticated information.”
“States Work with Feds for PKI Interoperability BY: Drew Robb | August 14, 2001 The 1977 epic A Bridge Too Far recaptures one of the most fruitless battles of World War II — a costly attempt to capture six bridges that connected Holland and Germany. A major gamble from the outset, the campaign led to defeat and more Allied casualties than in the entire Normandy invasion. Fortunately, the folks at the Federal Bridge Certification Authority (FBCA) are having an easier time of it in an initiative aimed at handling some of the thornier questions in government security — exactly who do you trust when it comes to the handing out and acceptance of digital certificates during e-Government transactions, how do states and federal agencies interoperate to make such certs usable across the government spectrum, and what will it really take to establish “digital” trust to make paperless e-government a reality? The Cast FBCA has gathered an impressive array of federal agencies, states and vendors in an effort to make the initiative a success. On the federal side, there is heavy involvement by the Department of Defense, National Security Agency, General Services Administration, Treasury and the Federal CIOs Council. From the vendor community Entrust Technologies and Baltimore Technologies are directly involved in the FBCA from the technology side, but other PKI/security vendors such as RSA, Cylink, Verisign and Spyrus are also coordinating with the project. At the state level, Illinois is working closely with the FBCA in an interoperability pilot that will probably form the basis of how states share digital certificates with federal and possibly commercial entities. “We are just in the process of developing the cross-certification agreement between FBCA and the State of Illinois CA so we have not tested any applications yet,” said Brent Crossland, Deputy CIO for the State of Illinois. “Our timetable is to have the agreement in place by September along with some initial applications.” According to Crossland, Washington and New Jersey are also in discussions with the FBCA.”
“Barack Obama served three terms in the Illinois Senate from 1997 to 2004, when he was elected to the United States Senate. During this part of his career, Obama continued teaching constitutional lawpart time at the University of Chicago Law School as he had done as a Lecturer from 1992 to 1996, and as a Senior Lecturer from 1996 to 2008.”
“Meeting Riconosciuto and Gunderson at the hotel were two representatives of the mujahadeen, waiting to discuss their armament needs. One of the two was named “Ralph Olberg.” The other one was called Tim Osman (or Ossman [Office of Strategic Services (OSS)!]).
“Ralph Olberg” was an American businesman who was leading the procurement of American weapons and technology on behalf of the Afghan rebels. He worked through the Afghan desk at the U.S. State Department, as well as through Senator Hubert Humphrey’s office. Olberg looked after the Afghanis through a curious front called MSH – Management Sciences for Health.
The other man, dressed in Docker’s clothing, was not a native Afghan any more than Olberg was. He was a 28-year-old Saudi. Tim Osman (Ossman) has recently become better known as Osama Bin Ladin. “Tim Osman” was the name assigned to him by the CIA for his tour of the U.S. and U.S. military bases, in search of political support and armaments.”
“The Office of Strategic Services (OSS) was a wartime intelligence agency of the United States during World War II, and a predecessor of the modern Central Intelligence Agency (CIA). The OSS was formed as an agency of the Joint Chiefs of Staff (JCS) to coordinate espionage activities behind enemy lines for all branches of the United States Armed Forces. Other OSS functions included the use of propaganda, subversion, and post-war planning. On December 14, 2016, the organization was collectively honored with a Congressional Gold Medal.”
“Nathaniel Mayer Victor Rothschild, 3rd Baron Rothschild, (1910-1990), was a biologist, a cricketer, a wartime officer for the UK Security Service (MI5), a senior executive with Royal Dutch Shell and N M Rothschild & Sons, and an advisor to the UK governments.
Known throughout his life as Victor, he was the third child and only son of Charles and Rozsika Rothschild. The family home was Tring Park Mansion. He had three sisters, Miriam (1908–2005) who became a distinguished entomologist, Nica (1913–1988), who became a patron of highly influential jazz musicians, and Elizabeth, known as Liberty (1909–1988).
He attended Harrow and Trinity College Cambridge, where he worked in the Zoology Department before gaining a PhD in 1935. At Trinity College, Cambridge, he read Physiology, French and English. While at Cambridge Victor was said to have a playboy lifestyle, enjoying water-skiing in Monaco, driving fast cars, collecting art and rare books and playing cricket for the University and Northamptonshire. Victor married Barbara Hutchinson in 1933, and the couple had three children, Sarah Rothschild (b.1934), Nathaniel Charles (Jacob) Rothschild (b.1936) and Miranda Rothschild (b. 1940). The marriage was later dissolved.
Victor became the third Lord Rothschild in 1937 on the death of his uncle Walter. He sat as a Labour Party peer in the House of Lords, but spoke only twice there during his life (both speeches were in 1946, one about the pasteurization of milk, and another about the situation in Palestine).
During the Second World War Victor worked for the Intelligence Service, and earned the George Medal for his bomb disposal work. In early 1939, he travelled to the United States where he visited the White House to discuss the issue of accepting Jewish refugees from Nazi Germany. In 1939, he was recruited to work for MI5 where he remained for the duration of the War. He was attached to B division, under deputy director Guy Liddell, responsible for counterespionage. In 1940 he produced a series of secret reports on German Espionage Under cover of Commerce and later founded section ‘B1c’ at Wormwood Scrubs, the wartime home of MI5. This was an ‘explosives and sabotage section’, and worked on identifying where Britain’s war effort was vulnerable to sabotage and counter German sabotage attempts. This included personally dismantling examples of German booby traps and disguised explosives. For this, he was awarded won the George Medal in 1944 for dangerous work in hazardous circumstances. This involved dismantling a pair of German time bombs concealed in boxes of Spanish onions in Northampton. By late 1944, Victor was attached to the 105 Special Counter Intelligence Unit of the SHAEF, a joint operation of MI5 and X2, the counterespionage branch of OSS, a precursor of the CIA, operating in Paris.”
“Serco Receives “Supplier of the Year” from Boeing for Enterprise Architecture Expertise
We are extremely honored to receive this recognition for our work in support of Boeing. This prestigious award demonstrates our passion for excellence and ability to apply Serco’s Enterprise Architecture expertise across a broad range of applications.
RESTON, VA (PRWEB) MAY 19, 2011
Serco Inc., a provider of professional, technology, and management services to the federal government, has been recognized as Supplier of the Year by The Boeing Company in the Technology category for its state-of-the-practice Enterprise Architecture solutions.
The Boeing Supplier of the Year award is the company’s premier supplier honor, presented annually to its top suppliers in recognition of their commitment to excellence and customer satisfaction. This year’s 16 winners represent an elite group among more than 17,525 active Boeing suppliers in nearly 52 countries around the world. This selection was based on stringent performance criteria for quality, delivery performance, cost, environmental initiatives, customer service and technical expertise. This is the second time Serco has been recognized as Supplier of the Year by Boeing. In January 2011, Serco also received the Boeing Performance Excellence Gold Award in recognition of the Company’s performance excellence.
“We are extremely honored to receive this recognition for our work in support of Boeing. This prestigious award demonstrates our passion for excellence and ability to apply Serco’s Enterprise Architecture expertise across a broad range of applications,” said Ed Casey, Chairman and CEO of Serco. “We continue to grow our EA practice, and over the past 15 years we have deployed solutions to support enterprises and systems across federal and commercial environments.”
Serco’s Enterprise Architecture Center of Excellence is based in Colorado Springs, CO. The team provides a variety of services in support of Boeing’s business units as well as research and development efforts. Serco’s architecture employs object-oriented (OO)/Unified Modeling Language (UML) to define, design and satisfy defense agencies’ mission-critical requirements, including Command, Control, Communications, Computers and Intelligence (C4I). This approach improves system developer’s understanding of operational requirements and how best to integrate enterprise operations and systems for the optimal fulfillment of C4I and other operational needs.”
Southwest Research Institute’s (SwRI) Interactive training system for AWACS weapons directors Priority date 1997-10-17 2000-04-25 US6053736A Grant Abstract A training system for training AWACS weapons directors. The training system is programmed so that the student can select between a number of different training modes. These include interactive courseware, simulation, and live exercise modes. The system includes a voice recognition unit that is trained to recognize AWACS terminology and to interactively teach them.
Darren Rubin’s Biological active bullets, systems, and methods US9200877B1
Airliner irreversible-control anti-hijack system 2005-01-18 US6845302B2 Grant including ATI (automatic/tranquil-Infusion)
Howard Lutnick’s Real-time interactive wagering on event outcomes CA 2460367 A.
“Jerome H. Lemelson’s Prisoner tracking and warning system and corresponding methods US6054928A A system and method for tracking, monitoring and learning prisoner or parolee behavior involves obtaining prisoner or parolee data and monitoring data for at least one individual prisoner or parolee, storing the prisoner or parolee data and monitored data into a database, learning prisoner or parolee behavior from the prisoner or parolee data and the monitored data in the database, and updating the prisoner or parolee data and the monitored data in the database. Expert system (i.e. including but not limited to fuzzy logic, reinforcement learning, neural networks, artificial intelligence, etc.) algorithms are executed for determining and analyzing deviated behavior by the prisoner or parolee. A parole level is assigned to the prisoner or parolee and it is determined whether the prisoner or parolee is to be moved up or down a parole level depending on whether the prisoner or parolee behavior does not constitute or does constitute prisoner or parolee violations. Furthermore, the system tracks, monitors, and learns the behavior of the prisoner or parolee by controlling and regulating the permitted/prohibited locations or sectors, the permitted/prohibited location or sector dwell times, the permitted/prohibited travel routes, the permitted/prohibited travel times that the prisoner or parolee spends at or between various locations.”
“BAE Systems PLC Proximity fuze Priority 1998-12-23 2004-12-28 US6834591B2 Grant. Abstract A proximity fuze for use in a tube launched projectile carrying a payload, comprising an oscillator for generating a radio frequency signal which has a varying frequency, a single antenna for transmitting the radio frequency signal and for receiving an echo of the radio frequency signal, a first signal processor for generating a range signal corresponding to the time delay between the transmission of the radio frequency signal and the receipt of the echo signal, second signal processor for comparing the range signal with a reference signal and depending on the result of the comparison generating an activation signal for activating the payload, wherein a directional coupler is used for coupling the radio frequency signal from the oscillator to the antenna and to the signal processor and for coupling the echo signal from the antenna to the signal processor, and wherein the second signal processor comprises a threshold detector, a peak detector and a comparator, the threshold detector being for allowing the comparator to utilise the output from the peak detector only once the range signal has reached a predetermined magnitude.”
Darren Rubin’s Biological active bullets, systems, and methods 2015-12-01US9200877B1 Grant A novel biological active bullet able to be discharged from a firearm, the ammunition essentially comprising a bullet in a cartridge, the bullet associated with/containing at least one biological active substance, along with a method of use of delivering with this bullet at least one biological active substance having at least one biological effect in the target upon impact and penetration, in addition to the bullet wound, and thus, having additional functions and applications than prior art bullets.
“Jerome H. Lemelson’s Friend or foe detection system and method and expert system military action advisory system and method 2000-12-26 US6166679A Grant Abstract A friend or foe detection system and method is disclosed. Friend or foe warning unit 20 has a geographic locating system, a communication system for communicating with each of the warning units, and a military force detection system for detecting military forces in a combat area and has a signal routing and control circuitry 50 for controlling operations. A number of components, devices, or sub-systems, such as a transmitter/receiver radio 28, an antenna 26, a microphone 30, a speaker 32, a battery 34, a display 36, a microprocessor 38, a memory 40, a camera 56, a radar/lidar input 54, on/off switch 52, a GPS location system 45 that includes a GPS processor 46, a GPS receiver 42, a GPS antenna 44, are coupled to the circuitry 50. Display 36 provides a display to the user of the unit 20 and shows the location of friendly forces as well as unfriendly or unidentified forces in the area. Display 36 displays text messages for the user of the warning unit 20. The microprocessor 38 together with memory 40 provide microprocessor control of the operations of the warning unit 20. The geographic locating system includes GPS processor 46, GPS receiver 42, and GPS antenna 44, and it is used to determine the exact location of the warning unit 20. The unit 20 is able to broadcast and receive military force information, such as location and status (i.e. friendly, unfriendly, unidentified statuses). An expert system military action advisory system and method for advising military troops or personnel of firing decisions is also disclosed. A firing index is determined based on the membership variables, and the firing index is used to help make the firing decisions. The membership variables and the firing index are defined for an expert system or fuzzy logic system, and the expert system or fuzzy logic system helps determine making the firing decisions. The system and method operate by transmitting target and friendly force GPS coordinate information to determine danger. Alternatively, only target coordinates are transmitted with fire danger indices calculated on a distributed basis by individual warning units and transmitted to the source of fire without friendly force location coordinates to assist in making final firing decisions.”
“Boeing Co’s Encryption for asymmetric data links Priority date 2001-05-04 US 7023996B2 Grant Abstract A method is provided for asymmetrically encrypting data communicated between a ground platform and multiple airborne platforms. The method includes packet encrypting ground-based data so as to preserve routing information while encrypting the remaining data. The packet-encrypted data is then transmitted to the airborne platforms. The method also includes bulk encrypting airborne-based data so as to maximize security. The bulk-encrypted data is then transmitted to the ground platform.”
“Vencore Services and Solutions Inc, Cyveillance Inc Social Engineering Protection Appliance 2015-09-01 US9123027B2 Grant Abstract Methods and systems for detecting social engineering attacks comprise: extracting one or more non-semantic data items from an incoming email; determining whether the one or more non-semantic data items match information stored in a data store of previously collected information; performing behavioral analysis on the one or more non-semantic data items; analyzing semantic data associated with the email to determine whether the non-semantic data matches one or more patterns associated with malicious emails; and based on the determining, performing, and analyzing, identifying the email as potentially malicious or non-malicious. The system also includes processes for collecting relevant information for storage within the data store and processes for harvesting information from detected social engineering attacks for entry into the data store and seeding of the collection processes.
“Motorola Solutions Inc’s Dynamic encryption key selection for encrypted radio transmissions 1993-06-22 US5222137A Grant Abstract A radio (100) transmits and receives encrypted signals having unencrypted key identifiers, allowing other radios having the corresponding key identifiers and encryption keys to communicate with radio (100). Prior to transmitting an encrypted message, radio (100) selects a unique key identifier automatically and uses the corresponding encryption key to encrypt the message that will be transmitted. Radio (100) transmits the key identifier in an unencrypted format with the encrypted message in order to allow other radios to determine the encryption key used in encrypting the message. When receiving an encrypted message, radio (100) uses the predetermined process stored in the radio (100) to properly select the proper encryption key for use in decrypting the incoming message.”
AWACS Weapons Directors – In a recent exercise, ROADRUNNER ’98, several agencies interacted to create several battlespace missions in which “friendly” fighter aircraft and command and control crewmembers participated as trainees, while supporting roles and enemy forces were either played by operational personnel (virtual players) or created by intelligent agent technology (constructed forces).
“QinetiQ Acquires Cyveillance, Inc. to Strengthen Cyber Security Dominance with Leading Open Source Intelligence Solutions Combined Services Will Offer Comprehensive, Superior Intelligence Solutions to Both Commercial and Government Customers
May 06, 2009 08:57 AM Eastern Daylight Time
ARLINGTON, Va.–(BUSINESS WIRE)–Cyveillance today announced that it has signed an agreement to be acquired by QinetiQ North America, a provider of information technology and engineering solutions to the U.S. government. Under terms of the agreement, pending regulatory approval, Cyveillance will become a QinetiQ North America subsidiary. The company will continue to deliver Internet risk and threat intelligence to commercial organizations worldwide, while providing QinetiQ North America with the technology and expertise to enhance its innovative government-focused Cyber Security and Intelligence solutions.”
“Cyveillance launches Cyber Threat Centre
Posted 17 September 2014 · Add Comment
QinetiQ company Cyveillance, has launched its comprehensive cloud-based intelligence platform, the Cyber Threat Centre.
The Centre allows security and risk professionals to undertake their own collection and analysis of online threat intelligence, and to identify and respond to threats faster and more effectively.
The Cyber Threat Centre combines web search, social media monitoring, global intelligence reports, and a suite of investigative tools and databases in an easy-to-use, cloud-based portal. Professionals who are responsible for physical and IT security, incident response, cyber investigations, and online compliance can distill information from thousands of sources outside the firewall into useable intelligence, tailored for their business needs.
“The Cyber Threat Centre is built on our experience from more than 16 years in the cyber security industry,” said Cyveillance President Scott Kaine. “It is the natural evolution of our offerings. By taking advantage of the fact that we have already done the work of collecting and tagging vast amounts of data, the Cyber Threat Centre enables security and risk professionals to spend more time on analysis, and less time searching and configuring multiple different portals and data feeds.”
The Centre gives organizations access to the same powerful sources, tools and databases already used by Cyveillance analysts, as well as extensive data for cyber investigations and better intelligence. Cyveillance continues to grow its traditional threat analyst practice, which provides tailored, customer-specific threat intelligence to organisations around the world.
“The Cyber Threat Centre is a user-friendly, scalable offering that puts the tools directly in the hands of our global customers and partners,” added Sanjay Razdan, Managing Director for QinetiQ New Technologies.”
“Serco Receives “Supplier of the Year” from Boeing for Enterprise Architecture Expertise
RESTON, VA (PRWEB) MAY 19, 2011 Serco Inc., a provider of professional, technology, and management services to the federal government, has been recognized as Supplier of the Year by The Boeing Company in the Technology category for its state-of-the-practice Enterprise Architecture solutions. … Serco’s Enterprise Architecture Center of Excellence is based in Colorado Springs, CO. The team provides a variety of services in support of Boeing’s business units as well as research and development efforts. Serco’s architecture employs object-oriented (OO)/Unified Modeling Language (UML) to define, design and satisfy defense agencies’ mission-critical requirements, including Command, Control, Communications, Computers and Intelligence (C4I). This approach improves system developer’s understanding of operational requirements and how best to integrate enterprise operations and systems for the optimal fulfillment of C4I and other operational needs.
About Serco Inc.: Serco Inc. is a leading provider of professional, technology, and management services focused on the federal government. We advise, design, integrate, and deliver solutions that transform how clients achieve their missions. Our customer-first approach, robust portfolio of services, and global experience enable us to respond with solutions that achieve outcomes with value. Headquartered in Reston, Virginia, Serco Inc. has approximately 11,000 employees, annual revenue of $1.5 billion, and is ranked in the Top 30 of the largest Federal Prime Contractors by Washington Technology. Serco Inc. is a wholly-owned subsidiary of Serco Group plc, a $6.6 billion international business that helps transform government and public services around the world. More information about Serco Inc. can be found at http://www.serco-na.com.”
“Motorola announced that their semiconductor division would be divested on October 6, 2003, to create Freescale. Freescale completed its IPO on July 16, 2004.
On September 15, 2006, Freescale agreed to a $17.6 billion buyout by a consortium led by Blackstone Group and its co-investors, Carlyle Group, TPG Capital, and Permira. The buyout offer was accepted on November 13, 2006, following a vote by company shareholders. The purchase, which closed on December 1, 2006, was the largest private buyout of a technology company until the Dell buyout of 2013 and is one of the ten largest buyouts of all time.
Freescale filed to go public on February 11, 2011, and completed its IPO on May 26, 2011. Freescale is traded on the New York Stock Exchange under the ticker symbol FSL. At the time of the IPO, the company had $7.6 billion in outstanding debt on its books, and the company is being investigated for misconduct related to this IPO.”
“Serco suffers profits collapse but on ‘path to recovery’ says CEO
Troubled outsourcer Serco details full extent of its woes and kicks off £555m rights issue
By Alan Tovey, Industry Editor 11:22AM GMT 12 Mar 2015
Troubled outsourcer Serco has launched a £555m rights issue as it starts on what chief executive Rupert Soames called “the path of recovery”. Shares in the company, which had more than half a billion pounds wiped off its market value in November when it stunned the market with a huge profit warning, [after fraudulently charging UK government for transporting fake prisoners in Con Air SWAT teams] tumbled again as Mr Soames set out the full extent of the Serco‘s troubles. … The company’s rights issue, on which Rothschild is advising cf Victor Rothschild, Pearl Harbor and the Henry Tizard Patent Pool, will see 549m new shares issued. The scheme is on a 1:1 basis and is priced at 101p, a deeply discounted 51.1pc compared with the previous closing price, and a 34pc discount on theoretical ex-rights price. The fundraising – which is subject to shareholder approval – is fully underwritten and the proceeds will be used to cut Serco‘s debt by £450m. At the end of the year Serco‘s net debt stood at £682m. The company said that subject to the rights issue’s completion, it had struck an agreement with its creditors to refinance its funding.”
“Serco Inc. Capabilities Chemical, Biological, Radiological, Nuclear and Explosive (CBRNE) Software Support Develop, demonstrate, implement and transition technologies to improve software/hardware development, fielding and sustainment support for chemical/biological detection and reconnaissance systems, individual and collective protection systems, decontamination systems, and information management systems for the Warfighter and First Responder, Homeland Defense and civil support activities.”
“Boeing Begins World Headquarters Operations in Chicago
The Boeing Company began operations on schedule today [Sep 4, 2001] at its new world headquarters building in downtown Chicago.
Approximately 200 employees began unpacking and familiarizing themselves with the building, located on the Chicago River at 100 North Riverside. The company expects approximately 400 employees to be working on the building’s top 12 floors by the end of the year.
Boeing and a team of more than 70 subcontractors, vendors and consultants delivered the finished office space, sophisticated telecommunications system, and computing infrastructure on schedule after 117 days of focused, intense effort. The aggressive schedule was driven by the company’s commitment to employees with families to coordinate the opening with local school schedules.
Boeing Chairman and CEO Phil Condit – who will officially commemorate the opening of the new Boeing World Headquarters during a ceremony at the building tomorrow – announced in March a broad rearchitecture of the company that included the headquarters relocation. In addition, the leaders of the company’s business units were given increased authority and responsibility to run their operations based on the needs of their customers, markets and communities where they do business.
“Boeing is in the midst of many exciting changes, and our new world headquarters in Chicago is part of our ongoing transformation,” Condit said. “We intend to grow our enterprise here and create businesses that open frontiers and advance technology, while allowing our business leaders in other locations to drive their businesses to their full potential.”
The building is designed with a vision of instant access to information by anyone from anywhere. More than 225 miles of data, communications and security cable were installed to support the more than 300 computers and 500 telephones needed on opening day.
Office spaces have been equipped with more than 3,000 data and telephone connections to support future information technology advancements along with systems needed to meet the goal of wireless connectivity in the future Boeing employees in Chicago are just a mouse click away from any Boeing facility, customer or supplier in 145 countries. Boeing employees, customers and suppliers visiting the new world headquarters will find a number of “mobile desk” touchdown spaces that provide Internet and LAN access, and equipment needed to be productive while away from their home offices.”
Consider assisting Abel Danger‘s David Hawkins with his Reverse Engineering CSI storyboards by going to Patreon to take back the narrative on crime scenes the media will not report on. Abel Danger (AD) started as a two man team back in 2006. That was when aviation pilot whistleblower Field McConnell contacted David Hawkins, a Cambridge graduate and global forensics economist. Over a decade later, a globally based network of average people join us to listen, share and partake in our C2CSI (Cloud Centric Crime Scene Investigations). We invite you to help fund us through Patreon to prepare presentation treatments and plot points for up to five injured-community theater clubs where David and the AD team will describe in a series of ten minute videos the suggested names for each clubs, the cast of real characters to be played and the story lines which connect plot points and wrongful deaths with the use of patented devices at some of the most iconic crime scenes of recent times.