Clinton death betting….


Abel Danger Abel Danger is a resource and archive for the David Hawkins and Field McConnell forensic economic research material on 9/11, climategate, the global warming hoax, economic fraud and murder for hire. This blog also acts as an intelligence and counter-intelligence resource for the little people.

Home Books Audios Videos Lawsuits Transcripts Info Sources Glossary Contact

May
22
#2676: Big-Jet Serco Death-Bet Broker – Small Business Clinton Vigs – SECNAV Zulu Frags
by
United States Marine Field McConnell
Plum City Online – (AbelDanger.net)
May 22, 2016

1. Abel Danger (AD claims that shareholders in Serco – the world’s largest air traffic controller – have been using insurance broker Marsh & McLennan to calculate pay outs due in death-betting and insurance claims after mass-casualty events linked to the engineered crashes of big jets.

2. AD claims that Serco’s former SBA 8(a) protégé company Base One Technologies equipped patent lawyer Hillary Clinton with a home-based server to calculate the vigs due to the brokers, mentors and/or protégés who have participated in spot fixing deaths and times in big-jet events.

3. AD claims that Serco provided the Secretary of the Navy (SECNAV) with Zulu timing signals to synchronize news injects, media plays and big-jet frags of Marsh offices on floors 93-99 in the WTC North Tower on 9/11 and EgyptAir Flight MS804 on 19 May 2016.

4. United States Marine Field McConnell invites James Comey – FBI director and former director of Serco banker HSBC – to investigate Serco big-jet service to the death-pool insurance industry and Clinton’s Small Business Administration server role in the fragging of Marsh and EgyptAir. (http://www.abeldanger.net/2010/01/field-mcconnell-bio.htm)

Long range Navy fragging by Tor.

9/11 Alexander Haig Had Inside Knowledge Of The World Trade Center Bombing

Big jet fragging of Marsh & McLennan in WTC#1 2016 – BBC News – EgyptAir Flight MS804 Made Sharp Turns B4 Crashing into Mediterranean – 19/5/16

Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders!
(Mobile Playback Version)
White’s Club death-bet bookmaker services dates back to 1743 and – as Cameron’s friend, Churchill’s grandson and Serco CEO Rupert Soames well knows – only the technology to spot fix the precise time of death has changed.

Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders!
(Mobile Playback Version)

Serco’s National Visa Center

[Serco’s] Defense Ammunition Center

Serco… Would you like to know more?

“Reuters World | Thu
May 19, 2016 5:12am EDT
Related: WORLD, EGYPT
Xl Catlin lead underwriter for missing EgyptAir plane: sources
Insurer XL Catlin is the lead underwriter and Marsh is the broker for the EgyptAir plane which vanished from radar screens in the southern Mediterranean early on Thursday, insurance industry sources said.
Officials at XL Catlin and Marsh declined to comment.
(Reporting by Carolyn Cohn; editing by Susan Thomas)”

“EgyptAir crash: Flight data points to ‘internal explosion’ on plane once daubed with graffiti saying ‘We will bring this plane down’
22 MAY 2016 • 7:54AM
EgyptAir flight MS804 crashed with 56 passengers and 10 crew on board All passengers, including British geologist Richard Osman, feared dead
Who are the victims? What we know so far
‘Smoke detected inside the aircraft cabin’
Experts say flight data ‘seems to point towards a bomb’
Body parts and suitcases from the missing flight found
EgyptAir flight MS804 disappears: everything we know

Data from the final moments before EgyptAir flight MS804 crashed into the Mediterranean suggest an “internal explosion” tore through the right side of the aircraft, a pilot said last night.

Investigators trying to determine whether the A320 was brought down by terrorism or a technical fault are poring over a series of warnings indicating smoke filled the cabin shortly before it disappeared from radar.

French authorities confirmed that smoke detectors went off aboard the flight a few minutes before it crashed but said it was not clear what caused the smoke or fire.

A commercial pilot with a major European airline told The Telegraph that other parts of the data log suggested that windows in the right side of the cockpit were blown out by an explosion inside the aircraft.

“It looks like the right front and side window were blown out, most probably from inside out,” said the pilot, who flies an A330 similar to the crashed A320 and spoke on condition of anonymity.

The data was taken from the plane’s Acars system, which sends short transmissions from the aircraft to receivers on the ground. Until investigators find the aircraft’s black boxes, which are still missing in the Mediterannean, the Acars offers the best sens on what was happening aboard.

Three different warnings showed there were faults in the windows next to the co-pilot, suggesting they could have been blasted outwards by an onboard bomb. That does not mean the explosion came from the cockpit but indicates the right side of the plane was more badly damaged than the left.

The pilot suggested the smoke detectors may have been triggered not fire but by fog which filled the cabin as it lost air pressure in the moments after the explosion.

Meanwhile, the Egyptian military released images of shoes, handbags and other forlorn items pulled out of the sea near the crash site. Video footage showed unused life vests and torn up parts of seats scattered across the deck of an Egyptian naval ship.

French and Egyptian ships are focused on trying to recover the black boxes, which would reveal what said in the cockpit before the plane crashed.

Although no terrorist group has claimed responsibility, French detectives are examining a pool of around 85,000 people with “red badge” security clearance that gives them access to restricted areas of Charles de Gaulle airport.

The task is complicated by the fact that many work for sub-contractors and turnover is high. Screenings are often limited to checking an employee has no criminal convictions and does not appear on a terror watch list.

Last December around 70 red badges were withdrawn from staff at Charles de Gaulle who were found to have praised the attacks in Paris, prayed at mosques linked to radicalism or showing signs of growing religiosity like refusing to shake hands with women.”

“EgyptAir Flight 804 (MS804/MSR804)[a] was a scheduled international passenger flight from Paris Charles de Gaulle Airport to Cairo International Airport, operated by EgyptAir, which crashed into the Mediterranean Sea on 19 May 2016 at 02:30 Egypt Standard Time (UTC+2).

Smoke or condensation was detected in one of the aircraft’s lavatories and in the avionics bay shortly before its radical course change and rapid descent, eventually disappearing from radar. No mayday or emergency call was received by air traffic control. Experts are investigating the cause of the disaster.

There were 66 people on board: 56 passengers, 7 aircrew, and 3 security personnel. A multinational search and recovery operation is under way. Wreckage from the aircraft was found in the Mediterranean Sea approximately 290 km (180 mi) north of Alexandria, Egypt.”

“Real-time interactive wagering on event outcomes
WO 2001083058
A8 ABSTRACT
Systems and methods for real-time interactive wagering on event outcomes are presented. Clients are first qualified and given wagering limits before being allowed to interactively wager on event outcomes. Event outcomes may be based on, for example, financial markets and indices, sporting and entertainment events, casino performances, and natural phenomena such as weather and earthquakes. Events on which wagers can be placed include both those with known and unknown outcome probabilities, and wagers can be a fixed-odds type or a spread-bet type. Wager transactions, including acceptances and confirmations, are executed in real time. Clients can customize displays of events on which they are authorized to wager. Real-time client credit management, automatic dealer hedging, automatic price-spread adjustments, and automatic client and dealer defined wagering limits are also provided.

Publication number: WO2001083058 A8
Publication type: Application
Application number: PCT/US2001/013683
Publication date: Mar 21, 2002
Filing date: Apr 30, 2001
Priority date: May 1, 2000
Also published as: CA2407679A1, 15 More »
Inventors: Philip M Ginsberg, Andrew C Gilbert, Howard W Lutnick, Lewis Findlay
Applicant: Cfph Llc
Export Citation: BiBTeX, EndNote, RefMan
Classifications (17), Legal Events (17)”

“Marsh & McLennan Companies, Inc. is a global professional services firm, headquartered in New York City with businesses in insurance brokerage, risk management, reinsurance services, talent management, investment advisory, and management consulting.[3] Burroughs, Marsh & McLennan was formed by Henry W. Marsh and Donald R. McLennan in Chicago in 1905. It was renamed as Marsh & McLennan in 1906.

The reinsurance firm Guy Carpenter & Company is acquired in 1923 a year after its founding by Guy Carpenter. In 1975, it acquired the human resources consulting firm Mercer. In 1997, it bought Johnson & Higgins, shortly after, it bought Sedgwick.[5] In 2003, it purchased the consultancy business Oliver, Wyman & Company and merged these with some of the consultancy businesses from previous acquisitions, particularly the Mercer business under the brand name of Oliver Wyman.

In August 2007, Marsh completed the sale of its Putnam Investments division to Great-West Lifeco Inc., a financial services holding company controlled by Canada-based Power Financial Corp. after it settled charges of market timing.[6] September 11 attacks[edit]

At the time of the September 11 attacks in the United States in 2001, the corporation held offices on eight floors of the North Tower of the World Trade Center, from 93 to 100.[7] When American Airlines Flight 11 crashed into the building, their offices spanned the entire impact zone, from floors 93 to 99.[8] Everybody present in the offices at the time of the attack died, and the firm lost 295 employees and 63 contractors.[1]”

“XL Catlin leads EgyptAir programme
Adam McNestrie
19 May 2016 XL
Catlin is the lead underwriter for the all-risk programme exposed to the loss of EgyptAir flight MS804, The Insurance Insider can reveal.

Sources said that the hull value for the Airbus A320 is around $18mn. Marsh is EgyptAir’s broker.

Talbot is the lead underwriter for the hull war slip, with the rest believed to be on one of Marsh’s line-slips in the Lloyd’s market.

The all-risk cover would pick up the passenger liability claims regardless of the cause of…”

“Egypt Says It and U.S. Plan A Naval Exercise Next Week
AP Published: October 28, 1984
CAIRO, Oct. 27— The Egyptian Navy and the United States Sixth Fleet will hold joint maneuvers in the Mediterranean from Nov. 5 to 7, Egypt’s official press agency quoted the Defense Minister as having said today.

The exercise, named ”Sea Breeze,” will involve 17 United States vessels, including aircraft carriers, and will consist of a simulated ”intensive attack” on Egypt by air and naval forces, including F-14 and F-15 fighter-bombers, Defense Minister Abdel Halim Abu Ghazala told the Middle East News Agency.

United States-built E-2C early warning aircraft will participate in the exercise, the first time the planes have flown in Egypt, Mr. Abu Ghazala said, according to the press agency account.

Egypt and the United States have conducted joint military maneuvers three times since 1980.”

“Serco Awarded $131 Million C4I Sustainment Contract Supporting the U.S. Navy
April 7, 2016
RESTON, VIRGINIA – April 7, 2016 – Serco Inc., a provider of professional, technology, and management services, announced today that the Company has been awarded a new contract to deliver lifecycle sustainment support for the U.S. Naval Facilities Engineering Command’s (NAVFAC) command, control, communications, computers and intelligence (C4I) systems at locations worldwide. The five year contract and options are valued at $131 million. The contract was initially awarded in December 2015 and a stop work order was issued due to a protest which has been resolved.

Serco will provide critical preventive and corrective maintenance, information assurance, asset management, technical systems updates, service call resolution, and configuration management for C4I systems. Serco has been performing sustainment support for over 13 years under various Space and Naval Warfare Systems Command (SPAWAR) contracts. The Company expects to hire approximately 60 new technicians to support the work at naval bases around the world.

“We are excited that the Navy turned to Serco to support this growing program that keeps the Navy’s C4I systems operational and our warfighters safe,” said Dan Allen, Chairman and CEO of Serco Inc. “I am proud of the team here at Serco for winning this new contract. We utilized our decade-long experience and innovation to design a winning solution for the Navy.” About Serco Inc.: Serco Inc. is a leading provider of professional, technology, and management services. We advise, design, integrate, and deliver solutions that transform how clients achieve their missions. Our customer-first approach, robust portfolio of services, and global experience enable us to respond with solutions that achieve outcomes with value. Headquartered in Reston, Virginia, Serco Inc. has approximately 9,000 employees and an annual revenue of $1 billion. Serco Inc. is a wholly-owned subsidiary of Serco Group plc, a $5.9 billion international business that helps transform government and public services around the world. More information about Serco Inc. can be found at http://www.serco-na.com.”

“The Office of the Secretary of the Navy, also known within DoD as the Navy Secretariat or simply just as the Secretariat in a DoN setting, is the immediate headquarters staff that supports the Secretary in discharging his duties. The principal officials of the Secretariat include the Under Secretary of the Navy (the Secretary’s principal civilian deputy), the Assistant Secretaries of the Navy (ASN), the General Counsel of the Department of the Navy, the Judge Advocate General of the Navy (JAG), the Naval Inspector General (NIG), the Chief of Legislative Affairs, and the Chief of Naval Research. The Office of the Secretary of the Navy has sole responsibility within the Department of the Navy for acquisition, auditing, financial and information management, legislative affairs, public affairs, research, and development.[6]”

“Onion routing was developed in the mid-1990s at the U.S. Naval Research Laboratory by employees Paul Syverson, Michael G. Reed, and David Goldschlag[2][3] to protect U.S. intelligence communications online.[4] It was further developed by the Defense Advanced Research Projects Agency (DARPA) and patented by the Navy in 1998.[3][5][6]

Computer scientists Roger Dingledine and Nick Mathewson joined Syverson in 2002 to develop what would become the largest and best known implementation of onion routing, Tor, then called The Onion Routing project or TOR project. After the Naval Research Laboratory released the code for Tor under a free license,[4][7][8] Dingledine, Mathewson and five others founded The Tor Project as a non-profit organization in 2006, with the financial support of the Electronic Frontier Foundation and several other organizations.[9][10]”

“November 30, 2015 RESTON, VA – November 30, 2015 – Serco Inc., a provider of professional, technology, and management services, announced today the Company has been awarded a patent classification services contract with the United States Patent and Trademark Office (USPTO). Serco will provide initial patent classification and reclassification services to support USPTO’s core mission of examining, granting, and disseminating patents and trademarks. The recompete contract has a one-year base period with four one-year option periods, and is valued at $95 million over the five-year period, if all options and award terms are exercised.”

“RS Information Systems (RSIS) is an African American-owned, small disadvantaged business focused on mid- and high-level Information Technology (IT) and Engineering services.

Headquartered in McLean, Virginia, and built upon a foundation of technical and programmatic excellence, RSIS is also a financially sound firm, recognized by Washington Technology as number 50, of Top 100 Federal Prime Contractors (IT Services), and whose diverse professional talent base includes 60 percent minorities, women, and veterans. RSIS brings to the Northrop Grumman NexGen Team and NexGen clients, innovative solutions in network and systems engineering and management; end-user technical support; systems integration, implementation, operations, and maintenance; software engineering and applications development; and security engineering. We deliver our core technical competencies and program management and integration skills to these DoD clients, including support of National Missile Defense, the Space Warfare Center, and other high visibility programs, as well as a diverse base of civilian clients. Our Office of Naval Research project has been certified SEI CMM Level 2.”

“Preparing the 8(a) application package
You do not need to pay anyone to prepare your 8(a) application. SBA designed the application forms so the applicant can complete the application. However, a consultant can assist in completing the application. Please be advised that no one can guarantee that an application for 8(a) program participation will be approved. The application process is intended to assure that each applicant receives a fair, unbiased review, free from favoritism and influence. Any irregularities in the application review process should be immediately referred to the SBA Inspector General.

Definition of Socially and Economically Disadvantaged Individuals

Socially disadvantaged individuals are those who have been subjected to racial or ethnic prejudice or cultural bias because of their identities as members of groups without regard to their individual qualities. The social disadvantage must stem from circumstances beyond their control. In the absence of evidence to the contrary, the following individuals are presumed to be socially disadvantaged:

Black Americans; Hispanic Americans (persons with origins from Latin America, South America, Portugal and Spain); Native Americans (American Indians, Eskimos, Aleuts, and Native Hawaiians); Asian Pacific Americans (persons with origins from Japan, China, the Philippines, Vietnam, Korea, Samoa, Guam, U.S. Trust Territory of the Pacific Islands [Republic of Palau], Commonwealth of the Northern Mariana Islands, Laos, Cambodia [Kampuchea], Taiwan, Burma, Thailand, Malaysia, Indonesia, Singapore, Brunei, Republic of the Marshall Islands, Federated States of Micronesia, Macao, Hong Kong, Fiji, Tonga, Kiribati, Tuvalu, or Nauru); Subcontinent Asian Americans (persons with origins from India, Pakistan, Bangladesh, Sri Lanka, Bhutan, the Maldives Islands or Nepal); And members of other groups designated from time to time by the SBA.

In addition, an individual who is not a member of one of the above-named groups may apply for 8(a) certification. However, the applicant must establish social disadvantage on the basis of clear and convincing evidence.

Economically disadvantaged individuals are socially disadvantaged individuals whose ability to compete in the free enterprise system has been impaired due to diminished capital and credit opportunities, as compared to others in the same or similar line of business and competitive market area who are not socially disadvantaged. For purposes of program entry, an individual whose personal net worth (excluding the equity in their personal residence and business) exceeds $250,000 will not be considered economically disadvantaged.
Woman-Owned Businesses [Obama’s structural feminists]

A woman-owned business may be recognized as a “socially disadvantaged firm” if the owner is a member of one of the groups for which social disadvantage is presumed. If the woman is not a member of one of the groups for which social disadvantage is presumed, she must establish her individual disadvantage on the basis of clear and convincing evidence that she has suffered discriminatory treatment because of her gender and that this treatment has impeded her entry into or advancement in the business world. SBA will consider any pertinent evidence but will give particular attention to evidence of discriminatory practices suffered in the areas of education, employment and the business world.”

“The term fragging is used to describe the deliberate killing or attempted killing by a soldier of a fellow soldier, usually a superior officer or non-commissioned officer. The word was coined by military personnel of the United States during the Vietnam War, when such killings were most often attempted with a fragmentation grenade,[2] sometimes making it appear as though the killing was accidental or during combat with the enemy. The term fragging is now often used to encompass any means used to deliberately and directly cause the death of military colleagues. The high number of fragging incidents in the latter years of the Vietnam War were symptomatic of the unpopularity of the war with the American public and the breakdown of discipline in the U.S. Armed Forces. Documented and suspected fragging incidents totaled nearly nine hundred from 1969 to 1972. Fragging has not been as frequent since the Vietnam War ended.”

“Controlled fragmentation of multi-walled warheads
US 3566794 A
Publication number: US3566794 A
Publication type: Grant
Publication date:2 Mar 1971
Filing date: 26 Nov 1958
Priority date: 26 Nov 1958
Inventors: Carlisle Richard T, Pearson John, Sewell Robert G S
Original Assignee: US Navy
Export Citation: BiBTeX, EndNote, RefMan
Patent Citations (3), Non-Patent Citations (1), Referenced by (18), Classifications (5)

CONTROLLED FRAGMENTATION 01F MULTI-WALLED WARI’IEADS
The invention herein described may be manufactured and used by or for the Government of the United States of America for governmental purposes without the payment of any royalties thereon or therefor. This invention relates to explosive warheads; more specifically it relates to fragmentation warheads for antipersonnel use. This application is similar to application Ser. No. 582,896, filed 4 May 1956, but goes beyond the scope of said application in applying the teachings thereof to multiwalled warhead casings.

Prior attempts at fragmentation control in impulsively loaded bodies such as warheads have generally involved the cutting of grooves on the surfaces, both inner and outer, of such bodies or the placing of plastic liners of predetermined shape between the inner surfaces of such bodies and the explosives contained therein. Such practices produced local regions of high stress which initiated points of fracture, but complete fragmentation control did not result therefrom.

As pointed out in the aforementioned application fragmentation is a function of wall thickness as well as the groove pattern. Applicants have discovered that further control of fragmentation may be attained by utilizing a plurality of walls in the warhead casing, by cutting grooves on the inner surface of each such wall, and by the orientation of the groove patterns so cut on the walls.

Accordingly, it is an object of this invention to provide a method for closer control of the fragmentation of impulsively loaded bodies than the methods of the prior art.

Another object is to produce a greater number of lethal fragments from a given mass of metal through the elimination of very large fragments and very fine ones. Applicants believe that fragments ranging from one-half to 4 grams are the most lethal against personnel and light military equipment.”

“Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”

“Serco do a bunch more that didn’t even make our story: As well as thanking God for his success, CEO Chris Hyman is a Pentecostal Christian who has released a gospel album in America and fasts every Tuesday. Amazingly, he was also in the World Trade Centre on 9/11, on the 47th floor addressing shareholders [including Bilderberg bankers such as HSBC and the Rockefeller-controlled JP Morgan Chase] Serco run navy patrol boats for the ADF, as well as search and salvage operations through their partnership with P&O which form Defence Maritime Services. Serco run two Australian jails already, Acacia in WA and Borallon in Queensland. They’re one of the biggest companies In the UK for running electronic tagging of offenders under house arrest or parole.”

“Origins of the Bilderberg meetings .. The immediate chain of events leading to the setting up of the first conference was as follows. Prince Bernhard set off for the USA in 1952 to visit his old friend Walter Bedell Smith, director of the newly-formed CIA. Smith put the organisation of the American end into the hands of Charles D. Jackson (special assistant for psychological warfare to the US President), who appointed John S. Coleman (president of the Burroughs Corporation. and a member of the Committee for a National Trade Policy), who in turn briefly became US chair of Bilderberg.

Charles Jackson was president of the Committee for a Free Europe (forerunner of the Congress for Cultural Freedom (CCF) whose extensive operations financing and organising anti-Communist social democratic political intellectuals has only recently been fully documented (see Coleman 1989); and ran the CIA-financed Radio Free Europe in Germany. Earlier he had been publisher of Fortune magazine and managing director of Time/Life, and during the war was deputy head of psychological warfare for Eisenhower. At the time of Bernhard’s visit he was working with a committee of businessmen on both sides of the Atlantic which approved the European Payments Union.

It was thus a European initiative, and its aim was, in official bland language, to ‘strengthen links’ between Western Europe and the USA. A selected list of people to be invited to the first conference was drawn up by Retinger, with Prince Bernhard and Rijkens, from the European countries of NATO plus Sweden. The resulting group consisted of the Belgian and Italian prime ministers, Paul van Zeeland and Alcide de Gasperi (CDU), from France both the right wing prime minister Antoine Pinay and the Socialist leader Guy Mollet; diplomats like Pietro Quaroni of Italy and Panavotis Pipinelis of Greece; top German corporate lawyer Rudolf Miller and the industrialist Otto Wolff von Amerongen and the Danish foreign minister Ole Bjorn Kraft (publisher of Denmark’s top daily newspaper); and from England came Denis Healey and Hugh Gaitskell from the Labour Party, Robert Boothby from the Conservative Party, Sir Oliver Franks from the British state, and Sir Colin Gubbins, who had headed the Special Operations Executive (SOL) during the war [and introduced the 8(a) Zulu bomb to the Billderberg]”

“Serco farewell to NPL after 19 years of innovation
8 January 2015
Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco’s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade….

NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading in the City through NPLTime”

“Support Services for Starwood Hotels Group Starwood Hotels Group, owner of some of the [Innholders] world’s most prestigious hotels, has appointed Serco as preferred bidder for a £7m contract to provide a range of support services to the Sheraton Grand in Edinburgh, the Westin in Dublin and the 5 star Turnberry resort on Scotland’s west coast. The contract, which has a 5 year term, is an extension to services already provided to other [Innholders] hotels in the Starwood Group and includes buildings maintenance and security, engineering support and [WiFi] help desk services.”

“Loan Improvement
Jan 31, 2001
SBA modernizes to help feed its growing programs [Field McConnell’s sister Kristine Marcy introduced the 8(a) electronic accelerated loan guarantee program at SBA to ensure funding for the Serco protégés’ participating in the 9/11 carbon cap] BY PATRICIA DAUKANTAS | GCN STAFF Under a five-year plan for overhauling its information technology systems, the Small Business Administration recently acquired new software for financial and other administrative tasks.

By the time SBA celebrates its 50th anniversary in 2003, agency officials want all their programs up and running around the clock, chief financial officer Joseph Loddo said.

In the first phase of the modernization, the agency has upgraded systems for managing its extensive portfolio of guaranteed loans, chief operating officer Kristine Marcy said.

SBA processed its first electronic loan last November through its Sacramento, Calif., office and plans to add more private lenders during fiscal 2001.

The agency’s staffing level has dropped 22 percent over the past eight years, which is another reason to improve IT, Marcy said. Over the past decade, SBA’s portfolio of loans to small and disadvantaged businesses has more than doubled to $50 billion.

‘We’re a small agency with a huge portfolio,’ Marcy said. SBA supplies more than half of the U.S. venture capital available each year.

Seventy percent to 80 percent of the loans are booked through a preferred lender program [structured by Serco], which involves nearly 7,000 banks, Marcy said. SBA guarantees the loans, just as the government backs student and housing loans.

‘The financial and IT businesses were changing so rapidly, we had to make some changes to stay current with the private sector,’ Marcy said. Banks had been asking SBA to make faster decisions on loan guarantees. The agency decided to aim for a turnaround time of one hour.”

“BASE ONE CERTIFICATIONS Base One [a Serco protégé company] is NO longer an 8(a), or HubZone certified company. Base One is a Small Business and a Women Owned Small Disadvantaged Business. Base One previously held certifications by the SBA. Please disregard any references to Base One being currently certified as an 8(a) or HubZone firm by the SBA.

Base One Technologies

Expertly researches, designs, and develops information security policies that protect your data and manage your firm’s information technology risk at levels acceptable to your business.

Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report.

Develops and implements multi-layer Information Security Solutions, practices and procedures. We deploy Intrusion Detection Systems (IDS) and IP Security with VPN solutions using Cisco routers, Frame Relay, firewalls, address and port translation, obscurity standards and authentication technologies (AAA, 3DES, TACACS, etcŠ), to enhance and meet the level of Data Security required for global organizations.

Conducts IT Security and Risk Assessment in Federal government as well as security testing, implementing security for multiple platforms and operating systems around the world.

Ability to conduct business process analysis to provide technical security countermeasures, risk management and data communications security planning for large organizations.

Provides computer security integration for web server and traditional client-server based applications. We secure environments up to as many layers as required by our clients’ policies, industry practices, and regulating bodies – including the desktop and user experience as required. Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions.”
Yours sincerely,
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222

David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation
Posted 17 hours ago by tokyowashi
2 View comments
May
21
EgyptAir 804: Debris reports are fake because of bogus boat search, no rescue helicopters – Plane electronically hijacked and landed in Israel
Jimstone.is
May 20 2016

EgyptAir: FAKE: Report of debris found including two seat cushions, a body part, and luggage; and now I am going to slay the liars.

Pictures – or it did not happen. And with photoshop available, I won’t even believe debris photos anymore after they screwed the story line this badly; let me explain:

This crash would have been an easy one to find if it were real, because it would have happened in a confined area a helicopter could get to easily. They are making it all look complicated by faking the search with boats. In a location like that, you don’t use boats, you use helicopters. It is ALL FAKE. If numerous helicopters were not sent out in the first hours, it is ALL FAKE. Where are the reports of rescue helicopters being sent out, only 100 miles offshore where they could go easily?

WHAT DO YOU MEAN THERE WERE NO RESCUE HELICOPTERS IN THE FIRST HOURS? They “knew” where this plane went down: WHY NO RESCUE HELICOPTERS SENT IMMEDIATELY? WHY NONE? BECAUSE THE PLANE LANDED IN ISRAEL, THAT’S WHY.

This was the bust I held onto yesterday, to nail them when they sprang the next lie. They were talking idiotic searches on boats, when the plane went down in a known location, IN THE WATER, where there would have been a high probability of survivors well within reach of the shortest of the short-range rescue helicopters from 5 different countries. This would not have even needed a long-range rescue helicopter. Not sending helicopters is a dead giveaway there was no crash, because sending helicopters was the only thing that would have been done if a plane really did go down. Boats would be sent later, to pick up the big pieces.

What do you do in a real scenario with possible survivors? Send a 25 mph boat and spend 5 hours getting there and then spend 10 hours plodding along at water level looking for pieces within eyeshot at water level? NO. You send a helicopter that can get there in 25 minutes and scan the entire area in a few more minutes. X 20 helicopters and the crash is found instantly, and all survivors are pulled from the water in the FIRST HOUR. How about sending a fighter jet first, that can cover 100 miles in a few minutes, to tell the helicopters right where it went down, so when they arrive 15 minutes later they go right to the crash? The story line, which only involved boats, is CHILDISHLY STUPID, Gilligan’s Island style; thank you Common Core, you make my job of debunking lies easy!

DEBRIS REPORTS ARE FAKE BECAUSE OF STUPID BOAT STORIES: PLANE LANDED IN ISRAEL, PERIOD.

The three people missing from the boarding log, that dropped the passenger count from 59 to 56 (for a total of 66 aboard), are probably what this is really all about. If it were possible to find out who was deleted from the boarding log, we would probably have the answer for why this plane was really taken.

Here is another knockout bash of the official story, which proves Israel has the plane:

Supposedly, a plane went down in a “terror-related incident” less than 100 miles off of Israel’s coast, and ISRAEL DID NOT GO OUT AND SEE WHAT WAS GOING ON? They left it all up to an idiot on a fishing boat? Come on now: they left it ALL UP TO A “CAPTAIN” ON A SMALL BOAT – when it was, according to the Israeli press, a “terror incident” that happened above waters Israel unofficially claims? The story line is too stupid to buy; that is why I let them hang themselves with a “debris report”: because there is no conceivable way this happened at all if Israel did not go out and check on anything.

Israel did not go out and check, because ISRAEL HAS THE PLANE: why go out and check if you have the plane and know it is sitting in hangar 14?

If this were real, Israel would have sent fighter jets, reconnaissance planes, helicopters, submarines, and naval vessels – because it was, after all, a “terror-related incident” that happened over their own turf, and they are persnickety about terror, RIGHT? TOO LATE FOR THAT STORY NOW; THE ZIO PRESS BLEW IT.
Now just wait and see: they will start threading those themes they missed into their story lines, and pray the public won’t notice!

_______
May 19 2016 update

This plane supposedly “went down in the Mediterranean.” Not out in the middle of the Atlantic, not out in the Pacific; it went down in EVERYONE’S BACKYARD. There is no conceivable way the debris trail was not photographed clearly AT DAYBREAK. Israel, Turkey, Egypt, Russia, Italy, and many other countries could have had a fighter jet to the scene in less than an hour; and Egypt, Russia, and Israel could have had one there in 10 minutes. Even helicopters could have been there in a half hour. No clear debris photos ALREADY means they are hoaxing this and Israel probably has the plane.

If this were real, THE STORY WOULD BE ABOUT RESCUE HELICOPTERS SEARCHING, NOT SOME STUPID IDIOT CAPTAIN ON A BOAT!

UPDATE: What I have said all along is now fully confirmed: The “officially found wreckage” was not from the EgyptAir flight – it was just random styrofoam! I am confident I have this nailed; READ IT AND WEEP, ISRAEL: YOU ARE BUSTED – ARCHIVE AND POST!

My all but final conclusion: Plane electronically hijacked and landed in Israel. A 90 degree turn to the left, followed by a 360 degree turn, equals a 90 degree turn to the left, which would be STRAIGHT TOWARDS ISRAEL. Adding to that no debris found despite the plane “going down in everyone’s backyard” clinches it.
Related:

Jim St­one: Is Egyp­tAir MS804 a repeat of Malaysia Airlines MH370? – Dick East­man: Egyp­tAir MS804 is most like­ly a remot­e-con­trol hijack­ing, for th­ese rea­sons
Posted 2 days ago by tokyowashi
4 View comments
May
20
#2675: Serco’s Tor In SECNAV Treason – Zulu 8(a) Charles de Gaulle – Clinton Fragging of EgyptAir?
by
United States Marine Field McConnell
Plum City Online – (AbelDanger.net)
May 19, 2016

1. Abel Danger (AD) claims that Serco operatives at the U.S. Patent and Trademark Office have been assigning patent rights in Navy onion router (Tor) devices to senior civil servants engaged in ongoing misprision of treason in the office of the Secretary of the Navy (SECNAV).

2. AD claims that Serco’s UK government shareholders have equipped Northrop Grumman Hawkeye surveillance aircraft on the FS Charles de Gaulle and the US Navy carrier fleet with Zulu timing devices to help 8(a) Tor user spot fix times of assassination or mass-casualty events.

3. AD is asking if patent lawyer Hillary Clinton authorized SECNAV civil servants to frag the Boeing 767 of EgyptAir Flight 990 on 31 October 1999 when SBA 8(a) companies allegedly crashed the plane in the sea about 60 miles (100 km) south of Nantucket Island, Massachusetts.

4. United States Marine Field McConnell invites James Comey – FBI director and former director of Serco banker HSBC – to investigate Serco and Clinton’s alleged use of illegally-assigned SECNAV patent pools and 8(a) Tor devices to frag EgyptAir Flight 990 in 1999 and Flight MS804 on May 19, 2016. (http://www.abeldanger.net/2010/01/field-mcconnell-bio.htm)

Hillary Clinton’s SECNAV has been organizing French-American Defense Symposia in the United States since the late 1990s in a treasonous end run around the National Command Authority.

2016 – BBC News – EgyptAir Flight MS804 Made Sharp Turns
B4 Crashing into Mediterranean – 19/5/16

EgyptAir MS804 ‘wreckage has been found ‘- BBC News

EgyptAir Flight 990 Air crash – Egypt Air 990
part 1 EgyptAir Flight 990 Air crash – Egypt Air 990

Long range Navy fragging by Tor.

Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders!
(Mobile Playback Version)
White’s Club death-bet bookmaker services dates back to 1743 and – as Cameron’s friend, Churchill’s grandson and Serco CEO Rupert Soames well knows – only the technology to spot fix the precise time of death has changed.

Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders!
(Mobile Playback Version)

Serco’s National Visa Center

[Serco’s] Defense Ammunition Center

Serco… Would you like to know more?

“Q&A: key questions about EgyptAir flight MS804
The Airbus A320 carrying 66 people came down in the Mediterranean on Thursday Do we know what happened to the plane?

The aircraft carrying 66 people was about 175 miles from the Egyptian coast when it disappeared, travelling at an altitude of 11,000 metres (37,000ft).

The plane had left Paris at 11.09pm on Wednesday (21.09 GMT/07.09am Thursday AEST) and disappeared at 2.30am Paris time, about 45 minutes before it was scheduled to land, and only 40 seconds after it left Greek airspace and entered Egyptian space over the Mediterranean.

Live EgyptAir flight MS804: body part, seats and suitcases found in water, says Greece – live

Egyptian military says debris from plane found in Mediterranean, after EgyptAir rowed back on announcement that wreckage had been spotted

The Greek defence minister, Panos Kammenos, said on Thursday that after entering Egyptian airspace the plane fell 6,706 metres (22,000ft) and swerved sharply before it disappeared from radar screens.

On Friday he said debris from the plane, including a “body part”, two seats and suitcases, had been found by Egyptian vessels in the Mediterranean sea. Egypt’s military said it had found personal belongings and parts of the wreckage 180 miles north of the coastal city of Alexandria.

Who was on board?

The plane was carrying 56 passengers and 10 crew: two cockpit crew, five cabin crew and three security personnel. The airline said two babies and one child were on board.

The nationalities of the passengers were as follows: 30 Egyptians, 15 French citizens, two Iraqis and one person each from Britain, Belgium, Sudan, Chad, Canada, Kuwait, Saudi Arabia, Portugal and Algeria.

What kind of aircraft was it?

An Airbus A320, which is considered a safe and reliable plane. Nonetheless, the model has been involved in safety incidents in the recent past, including the Germanwings tragedy in March 2015 that claimed 150 lives. It was also the aircraft Chesley Sullenberger landed on the Hudson river in 2009.

EgyptAir said the captain had 6,275 flying hours, including 2,101 on the A320; the co-pilot had 2,766 flying hours. The plane was manufactured in 2003.

Airbus said it was aware of the report about the plane but otherwise made no comment.

Is there any suggestion of foul play?

Egypt’s aviation minister, Sherif Fathy, has said the Airbus A320’s sudden disappearance was more likely caused by a terrorist attack than technical failure. But the French foreign minister, Jean-Marc Ayrault, said on Friday that there was “absolutely no indication” of why the flight came down.

The aircraft passed through airports in Tunisia and Eritrea in the four journeys it made on Wednesday before the Paris-Cairo flight, but no warning flags were raised. EgyptAir’s vice-chairman, Ahmed Abdel, said there were “no reported snags” from the crew in Cairo or Paris, nor was there any special cargo or notification of dangerous goods on board.

The area of the Mediterranean where the plane went down is heavily trafficked and much monitored, within reach of British listening posts in Cyprus, close to Israel and near to the US Sixth Fleet.

What are the next steps to revealing the aircraft’s fate?

An Egyptian army spokesman says searches are continuing in the area where the debris was found. The location is the centre of a major international air and sea operation to find the aircraft’s two black box flight recorders, which might hold the key to what happened.

The water in that section of the Mediterranean can be 2,000 metres (6,500ft) deep. The equipment involved in the search for MH370 is able to search depths of at least 6,000 metres.

If the EgyptAir A320 is the same as the Germanwings model that crashed last year, it will have two recording components: a cockpit voice recorder, which tapes what the pilots say, and a flight data recorder, which stores some of the 2,500 technical measurements in a modern aircraft.

Both are stored at the back of the aircraft and wrapped in titanium or stainless steel, to best survive a crash. They are able to withstand one hour of 1,100C heat and weight of up to 227kg. The boxes can take years to be found – two years in the case of Air France flight 447, which disappeared in 2009 in the Atlantic.

What are authorities saying?

Greece’s lead air accident investigator, Athanasios Binis, said: “The most important thing is that the plane’s two black boxes are found. If the cockpit flight recorder and flight data recorder are found, along with wreckage, then a real investigation can begin.

“There are three reasons for a plane [to go down]. Meteorological, technical and human. The first has now been ruled out because the weather was quite good. Whether a technical factor or human factor, either inside or outside the plane, is to blame remains to be seen. All possibilities are open.”

François Hollande, the French president, said: “We have a duty to know everything about the cause and what has happened. No theory is ruled out and none is certain right now. “When we have the truth we will draw our conclusions; whether this was an accident or something else, perhaps terrorist. We will have the truth.”

Panos Kammenos, the Greek defence minister, said: “The plane carried out a 90-degree turn to the left and a 360-degree turn to the right, falling from 37,000 to 15,000ft and the signal was lost at around 10,000ft.”

The Egyptian prime minister, Sherif Ismail, said it was too early to rule out any explanation for the incident, including terrorism: “We cannot exclude anything at this time or confirm anything. All the search operations must be concluded so we can know the cause.”

Serafeim Petrou, the head of Greece’s air traffic controllers board, said: “The plane did not give any vocal or electronic signal before it disappeared,” adding that “nothing can be excluded” on causes: “An explosion could be a possibility but, then, so could damage to the fuselage. I think at this point we are talking about wreckage, wreckage at the bottom of the sea and tracing the cause is going to take time.”

Jean-Paul Troadec, the ex-president of the French air accident investigation bureau, said “we have to remain very careful” about possible causes. “We can make certain hypotheses … there’s a strong possibility of an explosion on board from a bomb or a suicide bomber. The idea of a technical accident, when weather conditions were good, seems also possible but not that likely. We could also consider a missile … If the crew didn’t send an alert signal, it’s because what happened was very sudden. A problem with an engine or a technical fault would not produce an immediate accident. In this case, the crew did not react, which makes us think of a bomb.”

The director of Greece’s Civil Aviation Authority, Konstantinos Lintzerakos, said air traffic controllers were in contact with the pilot as the plane passed through Greek airspace, and that he did not report any problems. Controllers tried to make contact again with the pilot 10 miles before the flight exited the Greek flight information range, Lintzerakos added, but the pilot did not respond.”

“EgyptAir Flight 990 (MS990/MSR990) was a regularly scheduled flight from Los Angeles International Airport, United States, to Cairo International Airport, Egypt, with a stop at John F. Kennedy International Airport, New York City. On 31 October 1999, the Boeing 767 operating the route crashed into the Atlantic Ocean about 60 miles (100 km) south of Nantucket Island, Massachusetts, killing all 217 people on board. The official “probable cause” of the crash was deliberate action by the relief first officer.[1][2]

As the crash occurred in international waters, the responsibility for investigating the accident fell to the Egyptian Civil Aviation Authority (ECAA) per International Civil Aviation Organization Annex 13. As the ECAA lacked the resources of the much larger American National Transportation Safety Board (NTSB), the Egyptian government asked the NTSB to handle the investigation. Two weeks after the crash, the NTSB proposed handing the investigation over to the Federal Bureau of Investigation, as the evidence suggested that a criminal act had taken place and that the crash was intentional rather than accidental. This proposal was unacceptable to the Egyptian authorities, and hence the NTSB continued to lead the investigation. As the evidence of a deliberate crash mounted, the Egyptian government reversed its earlier decision and the ECAA launched its own investigation. The two investigations came to very different conclusions: the NTSB found the crash was caused by deliberate action of the relief first officer Gameel Al-Batouti;[1] the ECAA found the crash was caused by mechanical failure of the aircraft’s elevator control system.[3]

The Egyptian report suggested several control failure scenarios as possible causes of the crash, focusing on a possible failure of one of the right elevator’s power control units.[3] While the NTSB’s report did not determine a specific reason for the relief first officer’s alleged actions, their report stated the impact was “a result of the relief first officer’s flight control inputs”.[1][4] Supporting its deliberate-act conclusion, the NTSB report determined that no mechanical failure scenario could result in aircraft movements that matched those recorded by the flight data recorder (FDR), and that even had any of the failure scenarios put forward by the Egyptian authorities occurred, the aircraft would still have been recoverable because of the 767’s redundant elevator control system.[1]”

“Serco Awarded $131 Million C4I Sustainment Contract Supporting the U.S. Navy
April 7, 2016 RESTON, VIRGINIA – April 7, 2016 – Serco Inc., a provider of professional, technology, and management services, announced today that the Company has been awarded a new contract to deliver lifecycle sustainment support for the U.S. Naval Facilities Engineering Command’s (NAVFAC) command, control, communications, computers and intelligence (C4I) systems at locations worldwide. The five year contract and options are valued at $131 million. The contract was initially awarded in December 2015 and a stop work order was issued due to a protest which has been resolved.

Serco will provide critical preventive and corrective maintenance, information assurance, asset management, technical systems updates, service call resolution, and configuration management for C4I systems. Serco has been performing sustainment support for over 13 years under various Space and Naval Warfare Systems Command (SPAWAR) contracts. The Company expects to hire approximately 60 new technicians to support the work at naval bases around the world.

“We are excited that the Navy turned to Serco to support this growing program that keeps the Navy’s C4I systems operational and our warfighters safe,” said Dan Allen, Chairman and CEO of Serco Inc. “I am proud of the team here at Serco for winning this new contract. We utilized our decade-long experience and innovation to design a winning solution for the Navy.”

About Serco Inc.: Serco Inc. is a leading provider of professional, technology, and management services. We advise, design, integrate, and deliver solutions that transform how clients achieve their missions. Our customer-first approach, robust portfolio of services, and global experience enable us to respond with solutions that achieve outcomes with value. Headquartered in Reston, Virginia, Serco Inc. has approximately 9,000 employees and an annual revenue of $1 billion. Serco Inc. is a wholly-owned subsidiary of Serco Group plc, a $5.9 billion international business that helps transform government and public services around the world. More information about Serco Inc. can be found at http://www.serco-na.com.”

“The Office of the Secretary of the Navy, also known within DoD as the Navy Secretariat or simply just as the Secretariat in a DoN setting, is the immediate headquarters staff that supports the Secretary in discharging his duties. The principal officials of the Secretariat include the Under Secretary of the Navy (the Secretary’s principal civilian deputy), the Assistant Secretaries of the Navy (ASN), the General Counsel of the Department of the Navy, the Judge Advocate General of the Navy (JAG), the Naval Inspector General (NIG), the Chief of Legislative Affairs, and the Chief of Naval Research. The Office of the Secretary of the Navy has sole responsibility within the Department of the Navy for acquisition, auditing, financial and information management, legislative affairs, public affairs, research, and development.[6]

“Onion routing was developed in the mid-1990s at the U.S. Naval Research Laboratory by employees Paul Syverson, Michael G. Reed, and David Goldschlag[2][3] to protect U.S. intelligence communications online.[4] It was further developed by the Defense Advanced Research Projects Agency (DARPA) and patented by the Navy in 1998.[3][5][6]

Computer scientists Roger Dingledine and Nick Mathewson joined Syverson in 2002 to develop what would become the largest and best known implementation of onion routing, Tor, then called The Onion Routing project or TOR project. After the Naval Research Laboratory released the code for Tor under a free license,[4][7][8] Dingledine, Mathewson and five others founded The Tor Project as a non-profit organization in 2006, with the financial support of the Electronic Frontier Foundation and several other organizations.[9][10]”

“November 30, 2015 RESTON, VA – November 30, 2015 – Serco Inc., a provider of professional, technology, and management services, announced today the Company has been awarded a patent classification services contract with the United States Patent and Trademark Office (USPTO). Serco will provide initial patent classification and reclassification services to support USPTO’s core mission of examining, granting, and disseminating patents and trademarks. The recompete contract has a one-year base period with four one-year option periods, and is valued at $95 million over the five-year period, if all options and award terms are exercised.”

“RS Information Systems (RSIS) is an African American-owned, small disadvantaged business focused on mid- and high-level Information Technology (IT) and Engineering services.

Headquartered in McLean, Virginia, and built upon a foundation of technical and programmatic excellence, RSIS is also a financially sound firm, recognized by Washington Technology as number 50, of Top 100 Federal Prime Contractors (IT Services), and whose diverse professional talent base includes 60 percent minorities, women, and veterans. RSIS brings to the Northrop Grumman NexGen Team and NexGen clients, innovative solutions in network and systems engineering and management; end-user technical support; systems integration, implementation, operations, and maintenance; software engineering and applications development; and security engineering. We deliver our core technical competencies and program management and integration skills to these DoD clients, including support of National Missile Defense, the Space Warfare Center, and other high visibility programs, as well as a diverse base of civilian clients. Our Office of Naval Research project has been certified SEI CMM Level 2.”

“Preparing the 8(a) application package

You do not need to pay anyone to prepare your 8(a) application. SBA designed the application forms so the applicant can complete the application. However, a consultant can assist in completing the application. Please be advised that no one can guarantee that an application for 8(a) program participation will be approved. The application process is intended to assure that each applicant receives a fair, unbiased review, free from favoritism and influence. Any irregularities in the application review process should be immediately referred to the SBA Inspector General.

Definition of Socially and Economically Disadvantaged Individuals

Socially disadvantaged individuals are those who have been subjected to racial or ethnic prejudice or cultural bias because of their identities as members of groups without regard to their individual qualities. The social disadvantage must stem from circumstances beyond their control. In the absence of evidence to the contrary, the following individuals are presumed to be socially disadvantaged:

Black Americans; Hispanic Americans (persons with origins from Latin America, South America, Portugal and Spain); Native Americans (American Indians, Eskimos, Aleuts, and Native Hawaiians); Asian Pacific Americans (persons with origins from Japan, China, the Philippines, Vietnam, Korea, Samoa, Guam, U.S. Trust Territory of the Pacific Islands [Republic of Palau], Commonwealth of the Northern Mariana Islands, Laos, Cambodia [Kampuchea], Taiwan, Burma, Thailand, Malaysia, Indonesia, Singapore, Brunei, Republic of the Marshall Islands, Federated States of Micronesia, Macao, Hong Kong, Fiji, Tonga, Kiribati, Tuvalu, or Nauru); Subcontinent Asian Americans (persons with origins from India, Pakistan, Bangladesh, Sri Lanka, Bhutan, the Maldives Islands or Nepal); And members of other groups designated from time to time by the SBA.

In addition, an individual who is not a member of one of the above-named groups may apply for 8(a) certification. However, the applicant must establish social disadvantage on the basis of clear and convincing evidence.

Economically disadvantaged individuals are socially disadvantaged individuals whose ability to compete in the free enterprise system has been impaired due to diminished capital and credit opportunities, as compared to others in the same or similar line of business and competitive market area who are not socially disadvantaged. For purposes of program entry, an individual whose personal net worth (excluding the equity in their personal residence and business) exceeds $250,000 will not be considered economically disadvantaged.

Woman-Owned Businesses [Obama’s structural feminists]

A woman-owned business may be recognized as a “socially disadvantaged firm” if the owner is a member of one of the groups for which social disadvantage is presumed. If the woman is not a member of one of the groups for which social disadvantage is presumed, she must establish her individual disadvantage on the basis of clear and convincing evidence that she has suffered discriminatory treatment because of her gender and that this treatment has impeded her entry into or advancement in the business world. SBA will consider any pertinent evidence but will give particular attention to evidence of discriminatory practices suffered in the areas of education, employment and the business world.”

“The term fragging is used to describe the deliberate killing or attempted killing by a soldier of a fellow soldier, usually a superior officer or non-commissioned officer. The word was coined by military personnel of the United States during the Vietnam War, when such killings were most often attempted with a fragmentation grenade,[2] sometimes making it appear as though the killing was accidental or during combat with the enemy. The term fragging is now often used to encompass any means used to deliberately and directly cause the death of military colleagues. The high number of fragging incidents in the latter years of the Vietnam War were symptomatic of the unpopularity of the war with the American public and the breakdown of discipline in the U.S. Armed Forces. Documented and suspected fragging incidents totaled nearly nine hundred from 1969 to 1972. Fragging has not been as frequent since the Vietnam War ended.”

“Controlled fragmentation of multi-walled warheads
US 3566794 A
Publication number: US3566794 A
Publication type: Grant
Publication date:2 Mar 1971
Filing date: 26 Nov 1958
Priority date: 26 Nov 1958
Inventors: Carlisle Richard T, Pearson John, Sewell Robert G S
Original Assignee: US Navy
Export Citation: BiBTeX, EndNote, RefMan
Patent Citations (3), Non-Patent Citations (1), Referenced by (18), Classifications (5)

CONTROLLED FRAGMENTATION 01F MULTI-WALLED WARI’IEADS
The invention herein described may be manufactured and used by or for the Government of the United States of America for governmental purposes without the payment of any royalties thereon or therefor. This invention relates to explosive warheads; more specifically it relates to fragmentation warheads for antipersonnel use. This application is similar to application Ser. No. 582,896, filed 4 May 1956, but goes beyond the scope of said application in applying the teachings thereof to multiwalled warhead casings.

Prior attempts at fragmentation control in impulsively loaded bodies such as warheads have generally involved the cutting of grooves on the surfaces, both inner and outer, of such bodies or the placing of plastic liners of predetermined shape between the inner surfaces of such bodies and the explosives contained therein. Such practices produced local regions of high stress which initiated points of fracture, but complete fragmentation control did not result therefrom.

As pointed out in the aforementioned application fragmentation is a function of wall thickness as well as the groove pattern. Applicants have discovered that further control of fragmentation may be attained by utilizing a plurality of walls in the warhead casing, by cutting grooves on the inner surface of each such wall, and by the orientation of the groove patterns so cut on the walls.

Accordingly, it is an object of this invention to provide a method for closer control of the fragmentation of impulsively loaded bodies than the methods of the prior art.

Another object is to produce a greater number of lethal fragments from a given mass of metal through the elimination of very large fragments and very fine ones. Applicants believe that fragments ranging from one-half to 4 grams are the most lethal against personnel and light military equipment.”

“Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”

“Serco do a bunch more that didn’t even make our story: As well as thanking God for his success, CEO Chris Hyman is a Pentecostal Christian who has released a gospel album in America and fasts every Tuesday. Amazingly, he was also in the World Trade Centre on 9/11, on the 47th floor addressing shareholders. Serco run navy patrol boats for the ADF, as well as search and salvage operations through their partnership with P&O which form Defence Maritime Services. Serco run two Australian jails already, Acacia in WA and Borallon in Queensland. They’re one of the biggest companies In the UK for running electronic tagging of offenders under house arrest or parole.”

“Origins of the Bilderberg meetings .. The resulting [founder] group consisted of Robert Boothby from the Conservative Party, Sir Oliver Franks from the British state, and Sir Colin Gubbins, who had headed the Special Operations Executive (SOL) during the war [and allegedly introduced Serco’s 8(a) Zulu fragmentation bomb to the Bilderberg] ”

“Serco farewell to NPL after 19 years of innovation
8 January 2015
Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco’s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade….

NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading in the City through NPLTime”

“Support Services for Starwood Hotels Group Starwood Hotels Group, owner of some of the [Innholders] world’s most prestigious hotels, has appointed Serco as preferred bidder for a £7m contract to provide a range of support services to the Sheraton Grand in Edinburgh, the Westin in Dublin and the 5 star Turnberry resort on Scotland’s west coast. The contract, which has a 5 year term, is an extension to services already provided to other [Innholders] hotels in the Starwood Group and includes buildings maintenance and security, engineering support and [WiFi] help desk services.”

“Loan Improvement
Jan 31, 2001
SBA modernizes to help feed its growing programs [Field McConnell’s sister Kristine Marcy introduced the 8(a) electronic accelerated loan guarantee program at SBA to ensure funding for the Serco protégés’ participating in the 9/11 carbon cap] BY PATRICIA DAUKANTAS | GCN STAFF Under a five-year plan for overhauling its information technology systems, the Small Business Administration recently acquired new software for financial and other administrative tasks.

By the time SBA celebrates its 50th anniversary in 2003, agency officials want all their programs up and running around the clock, chief financial officer Joseph Loddo said.

In the first phase of the modernization, the agency has upgraded systems for managing its extensive portfolio of guaranteed loans, chief operating officer Kristine Marcy said.

SBA processed its first electronic loan last November through its Sacramento, Calif., office and plans to add more private lenders during fiscal 2001.

The agency’s staffing level has dropped 22 percent over the past eight years, which is another reason to improve IT, Marcy said. Over the past decade, SBA’s portfolio of loans to small and disadvantaged businesses has more than doubled to $50 billion.

‘We’re a small agency with a huge portfolio,’ Marcy said. SBA supplies more than half of the U.S. venture capital available each year.

Seventy percent to 80 percent of the loans are booked through a preferred lender program [structured by Serco], which involves nearly 7,000 banks, Marcy said. SBA guarantees the loans, just as the government backs student and housing loans.

‘The financial and IT businesses were changing so rapidly, we had to make some changes to stay current with the private sector,’ Marcy said. Banks had been asking SBA to make faster decisions on loan guarantees. The agency decided to aim for a turnaround time of one hour.”

“BASE ONE CERTIFICATIONS Base One [a Serco protégé company] is NO longer an 8(a), or HubZone certified company. Base One is a Small Business and a Women Owned Small Disadvantaged Business. Base One previously held certifications by the SBA. Please disregard any references to Base One being currently certified as an 8(a) or HubZone firm by the SBA.

Base One Technologies

Expertly researches, designs, and develops information security policies that protect your data and manage your firm’s information technology risk at levels acceptable to your business.

Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report.

Develops and implements multi-layer Information Security Solutions, practices and procedures. We deploy Intrusion Detection Systems (IDS) and IP Security with VPN solutions using Cisco routers, Frame Relay, firewalls, address and port translation, obscurity standards and authentication technologies (AAA, 3DES, TACACS, etcŠ), to enhance and meet the level of Data Security required for global organizations.

Conducts IT Security and Risk Assessment in Federal government as well as security testing, implementing security for multiple platforms and operating systems around the world.

Ability to conduct business process analysis to provide technical security countermeasures, risk management and data communications security planning for large organizations.

Provides computer security integration for web server and traditional client-server based applications. We secure environments up to as many layers as required by our clients’ policies, industry practices, and regulating bodies – including the desktop and user experience as required. Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions.”

Yours sincerely,
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222

David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation
Posted 2 days ago by tokyowashi
2 View comments
May
20
Anglo-Americans (NATO-Israel) Manipulating Geopolitical Events For War – EgyptAir Flight 804 a Warning to Stop Resisting or Else? – Looking for Provocations to Light the Fuse – Wars of Financial Looting – The Deputy Scaremonger – British Up To Their 200 Year Plan to Destroy Russia – British General Richard Shirreff Has Consulted His Crystal Ball – The World is Being Psychologically Prepared for War – These F–king Lunatics Have Taken Over the Asylum
Source: KATEHON

Is the crash of Egyptair Flight 804 linked to the France-led resistance against US escalation vs. Russia?
by Umberto Pascali
May 20, 2016

US establishment is frantically trying to force European countries to approve missile systems aimed at Russia. They are desperate to entrap Europe into a military confrontation (with a soon-to-come provocation to light the fuse) with Russia. July is the deadline.

U.S. officials believe that if NATO doesn’t use its July summit in Warsaw to take control of the missile-defense system and declare it operational, Russia will declare that the alliance is bending to its will.

The new missile system is supposed to keep Europe in a perennial confrontation with Russia against its own interests. The American elites are terrified of the coming presidential elections when a Trump (or Sanders?) administration could rescue the US from the never ending policies of ” Wars & Financial Looting”. France has been leading the resistance against the missile system (recently implanted even in impoverished Romania) that would be nominally a NATO program, but in reality it’s a US controlled operation against Europe.

Just today, the Wall Street Journal denounced France for its opposition to the diktat from Washington. The newspaper, a known voice of Wall Street and the Bush-Clinton’s, explained that the French resistance must be broken in time for the July NATO meeting when the NATO countries are supposed to accept “ownership” and become “responsible” for the “missile shield”:

French officials said they are withholding their approval for the North Atlantic Treaty Organization to take control of the US-built European missile-defense system, a position the alliance and American officials hope they can persuade Paris to change before the alliance summit in July.

“It is not just a technical question— there is a political aspect,” a French official told the Journal. “If it is [a] NATO system, NATO takes the responsibility if you shoot down the missile. NATO takes responsibility if you miss.” The US side wants the issue be forced into the Europe’s throat already at the May 19 NATO foreign ministers meeting in Brussels.

Germany, and even Italy seem to be on the same page with France on rejecting pressure. This is a situation (European leaders resisting the Anglo-Americans plans) similar to others in the recent past when France and Belgium were hit by extremely sophisticated military attacks in the form of terrorism. Is the crash of EgyptAir flight 804 from Paris to Cairo a warning to stop resisting or else?
________
Source: Russia Insider

BRACE YOURSELF: Ex-Deputy NATO Commander Predicts Russia Will Start WW3 in May 2017

We’re not kidding, he is actually that specific

by Dean Parker
May 20, 2016

This is unbelievable. We know top NATO officers tend to be peculiar characters (recall the famous warmongers Philip Breedlove and Wesley Clark) but so far they stayed clear of claiming magical powers.

This is no longer the case British general Richard Shirreff who between 2011 and 2014 served as the Deputy Supreme Allied Commander Europe has consulted his crystal ball and has concluded that in the fifth month next year Russia will invade Latvia, Estonia, Lithuania and Ukraine.

We’re not joking, he really is that specific. Unless NATO bulks up its presence in Eastern Europe come this time next year Russians will be invading NATO territory and doubtlessly provoking World War III:

A startling claim that the west is on course for war with Russia has been delivered by the former deputy commander of NATO, the former British general Sir Alexander Richard Shirreff.

In a book published on Wednesday, 2017 War With Russia, Shirreff argues that the events in Crimea have destroyed the post-cold-war settlement and set the stage for conflict, beginning next year.

In a chilling scenario, he predicts that Russia, in order to escape what it believes to be encirclement by NATO, will seize territory in eastern Ukraine, open up a land corridor to Crimea and invade the Baltic states.

Shirreff, who was deputy supreme allied commander Europe from 2011 to 2014 and before that served in Northern Ireland, Iraq and the Balkans, is risking his reputation by making such a bold prediction. But he claims his narrative is closely modeled on his NATO experience of war-gaming future conflicts.

His scenario is specific, naming Latvia as the first of the Baltic countries to be invaded, in May next year. Such specifics open him to potential ridicule.

At the book launch at London’s Royal United Services Institute, he heavily caveated the scenario by saying it was still avoidable provided NATO took the necessary steps to pre-position forces in large enough numbers in the Baltic states. NATO is planning to make a start on just such a move at a NATO summit in Warsaw in July.

Faced with scepticism from journalists at the book launch – the Baltic states, unlike Ukraine, are members of NATO, and Russian action against any of them would in theory trigger a response – Shirreff said history was full of irrational decisions by leaders.

He said Putin could invade the Baltic states and then threaten nuclear action if NATO threatened to intervene.

Now just in case you thought this was a case of lone nut:

Shirreff’s warning about the danger posed by Russia is echoed in the foreword by US admiral James Stavridis, former supreme allied commander Europe, who writes: “Under President Putin, Russia has charted a dangerous course that, if it is allowed to continue, may lead inexorably to a clash with NATO. And that will mean a war that could so easily go nuclear.”

That’s right, the American Stavridis who was Shirreffs boss and top NATO military commander wrote the foreword to his assessment. Lunatics have truly taken over the asylum. – Best way to prevent WW3 is to send a lot of NATO troops into the Baltic states and make Russia a lot more nervous. Makes sense. If you’re sniffing the good glue they have over at the NATO HQ.
Posted 3 days ago by tokyowashi
0 Add a comment
May
20
Jim St­one: Is Egyp­tAir MS804 a repeat of Malaysia Airlines MH370? – Dick East­man: Egyp­tAir MS804 is most like­ly a remot­e-con­trol hijack­ing, for th­ese rea­sons
Is Egyp­tAir MS804 a repeat of Malaysia Airlines MH370?

Jimstone.is
May 19 2016

UPDATE: No wreckage found, as reported earlier. Now it looks like it could be another MH370!

I have sifted through the reports and concluded that all the wreckage reports are from a single Greek ship captain who does not seem to know what he is talking about, and “authorities” jumping the gun. No credible photos have been produced yet from any source whatsoever. CNN has a hoax posted. All others have the same hoax posted. To date, NO CONFIRMED WRECKAGE FOUND.

UPDATE: It was confirmed that before takeoff, the plane was changed from an Airbus A320 to a Boeing 737-800. If your news source is still talking Airbus, they are BUNK.

Pardon me as I sift through the wreckage of news reports.

My early conclusion: Plane electronically hijacked and landed in Israel. A 90 degree turn to the left, followed by a 360 degree turn, equals a 90 degree turn to the left, which would be STRAIGHT TOWARDS ISRAEL.

The latest reports simply have the pilots going silent – no fireball, no debris, just a sudden change of course and drop in altitude with deactivated transponder and silent pilots, like we saw with MH370. CONCLUSION: If this is true, the plane was diverted to Israel. It had no fuel to go elsewhere, and no one else could have done this. After showing a sudden turn towards Israel and sudden dive of the aircraft, the radar was blanked also. 66 people aboard. HMMMMMMMMM … 66 people aboard. Down from an originally reported 69. Yep. Time to find out if those 3 air marshals reported to be aboard were provided by Israeli security companies! THEY WOULD BE NEEDED TO THREATEN THE PASSENGERS AND CONFISCATE CELL PHONES AND MAKE THREATS TO PREVENT PASSENGERS FROM MAKING PHONE CALLS AFTER THE PLANE WAS FORCED DOWN IN EITHER TEL AVIV OR SOME HELL BASE IN THE ISRAELI DESERT. BINGO, I THINK WE MIGHT HAVE IT: DEBRIS TRAIL, OR THAT IS THE STORY. WHY THREE AIR MARSHALS FOR 56 PASSENGERS? BINGO!!!!

Now we *really* need the background of the passengers aboard. If there is no debris trail (I have confirmed all the reports on debris trails are a hoax so far) and if none actually shows up, the plane was forced to land in Israel – there is no other possibility. DEBRIS TRAIL OR ISRAEL, PERIOD, END OF DISCUSSION!

QUESTION: How do you revise the number of passengers and crew to 66 after the plane took off? Common Core boarding log math tabulators???? How does that type of number, which is set in stone at the boarding booth, get changed later? ISRAELI SHOOTDOWN, OR ISRAELI ELECTRONIC HIJACKING, that’s how.

LET’S SEE THE CRYSTAL-CLEAR DEBRIS TRAIL AND RECOVERED BODIES TO PROVE THE ABOVE IS NOT TRUE!

Original early report follows – for as long as no credible wreckage or bodies are found, the above is what I am going with; but here is the initial report, which was based on early reports which now appear to be inaccurate:

The lack of response from the pilots, and the flight pattern of the aircraft as it crashed, strongly indicate a missile strike to the nose of the aircraft. If it was a bomb in the cargo hold or cabin, the pilots could have still talked as the plane broke up, and the breakup would have been faster. This breakup involved a 90 degree turn and a full 360 degree turn. This means the wings were still on the plane, and enough time passed for the pilots to radio a distress call. Lack of this proves a hit to the cockpit. Obviously “Islamic terrorists” are going to be blamed (and already are), but this is most probably an Obama, Clinton and Nut Yahoo production due to the altitude and location of the event, and the difficulty of getting a missile as high as the plane was flying. Only a missile could have done this. Easily accomplished from Israeli airspace.

And remember, it is still an “act of terror” if Israel does it. Trump could be totally right about the “terror” angle, and totally wrong about who actually did it.

Hoax news sites are reporting ISIS responsibility and muddying the waters. Everything still points to missile strike by Israel. This is not a “bomb in the cabin” type incident, which would have given the pilots time to radio out. They were in contact with the ground when this happened, said nothing about anything, and vanished. That equals missile strike to the cockpit; and in that area, only Israel or the Egyptian government could have done it, and I seriously doubt Egypt doing this. Who was aboard this aircraft? Same old important question….

* * * * *
Egyp­tAir MS804 is most like­ly a remot­e-con­trol hijack­ing, for th­ese rea­sons

Dick Eastman (oldickeastman@q.com)
May 19, 2016

The way EgyptAir MS804 broke with air traffic monitoring on May 19, 2016, making an unscheduled turn to port of 90 degrees, followed by a turn to starboard a full 360 degrees while descending to 15,000 feet and then to 10,000 feet – where it was lost to radar – is too much like Malaysia Airlines MH370, which also turned and descended before disappearing on March 8, 2014. MH370 also did not crash. It was seen in Maldives flying due south, towards the British/US intelligence headquarters for the region, Diego Garcia. I suspect that EgyptAir MS804, when below radar and when all transponders and voice communication with the cockpit were shut off, headed for the one place likely to be able to keep the receiving of the plane hijacked in the Mediterranean so near to Egypt a successful secret: Israel.

Whether EgyptAir MS804 was the usual Airbus A320 or whether another plane, a Boeing 737-800, was substituted does not matter. Electronic hijacking was possible with either a Boeing or an Airbus plane: American Airlines Flight 587 (an Airbus A300) manifested clear instances of remote-controlled takeover of the flight during the crash episode on November 12, 2001 – as did EgyptAir 990 (a Boeing 767) before its crash in its flight from New York’s JFK to Cairo on October 31, 1999.

Let’s review some facts about AA587 and EgyptAir 990, as well as an incident that happened at Miami International in 1999.

Flight 587 took off from JFK with nothing unusual when, over Queens NY, the rudder on the vertical stabilizer began shifting back and forth its full range, causing the plane to experience severe sideways movements, called yawing, that slammed passengers back and forth. This back and forth broke the bonding of the lamination that held on the tail fin. This remote-controlled sabotage eventually broke off the stabilizer from the plane.

When the rudder was gone, the plane was still able to fly; but now the remote controller began operating the ailerons (flaps, elevators), causing the plane to make extreme turns – at one point turning 10 degrees in one second. The flight recorder clearly shows that the plane banked to port, even as the data shows the pilots were working the cockpit controls to move the plane in the opposite direction. The voice record of this portion of the flight has never been released by the NTSB. Then the electronic hijackers chose to finish the job: the nose dropped and, still before the crash, the voice record cut off. The plane was in a dive full-throttle, then the plane put down its flaps – at which point the engines separated from the wings, the pods’ brackets pulled from their roots.

Happening just two months and one day after the September 11 event, the crash was covered with all of the secrecy and deceit of the investigation into that larger event.

Another American event needs mention here. In 1999, an American Airlines Airbus A300, as it prepared to land at Miami International, also experienced its rudder suddenly moving from side to side completely on its own, as the pilots reported. The NTSB reported “rudder movements extreme.” No cause was found.

Early in the morning of October 31, 1999, EgyptAir 804 took off from JFK to Cairo, Egypt, with top Egyptian military personnel aboard, as well as other passengers (mostly Americans). At about 2:00 AM, the pilot left the cockpit to go to the toilet. The language aboard the plane had been in Arabic but, while the copilot was alone, another voice was picked up on the voice recorder saying just two words in English: “Control it.” Immediately after this, the plane, which had been on autopilot, deviated in its course. The copilot, noticing this, exclaimed with a prayer, “Tawakkalt ala Allah,” which may be equivalent to an English-speaking Christian saying “God protect us” – appropriate words under this unusual circumstance.

The copilot then, the event recorder shows, tried to disengage the autopilot. The plane continued to move independently and inappropriately for autopilot control. The copilot repeated his prayer. The plane next entered a dive. Sixteen seconds into this dive, the pilot returned to the cabin, asking, in Arabic, “What’s happening?”

Both pilot and copilot worked their controls to pull up from the dive, but without results. The plane, still diving, then went full-throttle. The copilot attempted to close the fuel lines, which would have stopped the engines. Then, also not under cockpit control, the right and left elevators moved in opposite directions. The ailerons on both wings moved full up. The pilot ordered the copilot to shut the engines. The copilot replied, “They’re shut.” They were switched off, but that made no difference.

Pilot and copilot attempted to lift the plane out of the dive. The last words heard on the recording were of the captain repeating, in Arabic, “Pull! Pull!” Then, just as with Flight 587, the voice recorder shut off before the crash occurred.

Long before any of these crashes, the United States developed software called PROMIS, intended to take over the flight of planes that had been taken over by on-board human hijackers. Furthermore, Dov Zakheim, involved in 9-11, was CEO of SPC (System Planning Corporation) International, developers of remote-control flight systems for military and commercial aircraft. Dov Zakheim is a dual US–Israeli citizen.
Related:

EgyptAir 804: Debris reports are fake because of bogus boat search, no rescue helicopters – Plane electronically hijacked and landed in Israel

Posted 3 days ago by tokyowashi
2 View comments
May
19
Gadget Bent – Shake Hands With The Devil by Field McConnell – Chapter Three
Gadget Bent

Shake Hands With The Devil

by Field McConnell

Chapter Three

Way back in Chapter 1 the date was 27 February, 1991 and the chapter had ended with Agent Chips exposing the ongoing drug business that has kept the British Empire awash in cash, at least in the days before Abel Danger became capable of killing both the Octopus and the Vampire.

Exiting at 9th floor Chips led DICE by the hand, stopped at Room 911, scanned with his Clipper Squirt Gun, checked for Juicy Fruit and hair strands, put his key in the hole thinking of another project for later. Closing the door behind DICE he locked and bolted the door and noticed DICE turned down the king size bed. He was hoping to catch a glimpse but she cupped her ear and summonsed him to join her and whispered “stay dressed, they’re coming”. He joined her on her left side, closer the door. He reached under his pillow and drew his .357 as DICE positioned her 20 gauge coach gun, both chambers with turkey load, while they waited wondering what would come next, or who.

They both heard a key in the door, the door opened and the chain lock being extended to the max travel position. They heard two loud thuds and suddenly the lights in the Metropole flickered twice before the entire hotel went dark. Chips, ever the doting gentleman, checked her privates to ensure his co-agent had not been rendered androgynous such as the members of the Clinton and Bush Crime families as well as refuse such as Blair, Cameron, Heath and the balance of the UK Dolts who would years later murder Dr. David Kelly, Robin Cook and Christopher Shale to try and obfuscate the 1989 purloining of 6 nuke devices from Pelindaba, South Africa when the global elitists touting multiculturalism would have that discussion stop short of equal access to nuclear weapons. Interesting that the Brits and Israel couldn’t trust South Africa but they also had misplaced their trust in those Maggie Thatcher and her son entrusted the transfer to as three of the weapons were misappropriated and re-routed to Chicago which along with Montreal is a co-anus of North America.

Agent DICE turned on the tactical illuminator on her double barrel coach gun and illuminated the house phone so that Chips could see the red light was blinking indicating a message awaiting Chips, most likely, or Agent DICE, or both of them. Chips became erect and ambulated to the phone at the desk, seated himself and dialed 8 to retrieve the recorded message.

“Chips, hope you and DICE are OK, the goons from Porton Down are on the 9th floor and they intend to batter ram the door to 911 at 1911. NOTSO and I will have the equivalent of a Fulton Extractor outside your window at 1859, time now 1845, if you get this message please be ready with just one duffle each. The four of us are to redeploy to Crawley to await the package. Barry M. Hall.”

Chips looked at his $10 Walmart and saw the time was 1848 so he knew he had time for a quickie but resisted the temptation. DICE summonsed him to her side and whispered “Chips, it’s the right time of the night” which made him think of the Jennifer Warnes song from 1977 and his resignation from the Marine Corps as his intelligence network had arranged for him to fly ADC interceptor aircraft for the North Dakota Air National Guard.

Had Chips not left the Marine Corps and become an ‘air defender’ his future as an aviation whistleblower may never have occurred and he could have ended up as Colonel James Sabow USMC end up; a victim of the corrupted chain of command running the corporation of the united states as a slave colony to Mother England. It is believed the Aussies have a term POM but that is a question for Abel Danger Agents “down under” as there are a variety of explanations for the term POM most certainly meaning a Prisoner Of [her] Majesty as Australia was a penal colony for persons who had committed any of 19 Crimes in England.

Part of the reason for all this confusion is that there was for 140+ years there has been much doubt, much discussion and little agreement over the true origin of the expression, with various Oxford dictionaries, for example, continuing to say that there is no firm evidence for the pomegranate theory that would rationalize the term “pom” as meaning a fair skinned recent migrant from cloudy England having sunburn that might turn their ruddy face the color of a pomegranate when given a welcome to Oz sunburn. That origin was described by D H Lawrence in his Kangaroo of 1923, but, alas, we digress.

“DICE, there is nothing I’d rather do than tickle your tonsils however we are both to grab a duffle and be ready to be extracted at 1859. NOTSO and Barry are up on the roof and will get us up there and then via helo extract we will reposition to Crawley where we will meet ‘the package’. I will look out the window and see if they are rigged and ready, such as is my PTRC. What a pity to waste a stiffy. Ah, duty!”

Chips rolled over DICE, who appeared warm and willing, and became erect and ambulated to the window. Peering out into the inky darkness of an overcast night in wintertime Brighton he saw a rope had been draped past the window of his Room 911 and looking three floors below he saw Agent After Burner attaching DICE’s rucksack to the bronze clip on the rope. He checked his watch; 1853. He looked up to see a smiling Barry lowering a San Miguel Beer as a twin engine reciprocating engine powered aircraft flew over low, apparently trying to scud run the fog.

Chips could not be certain as he did not see the aircraft in question but it sounded like the type of airliner that in 1958 had killed a majority of those Busby Babes of Manchester United who though young, were very good at soccer or as those in UK might say, football. Don’t try selling that to a Pittsburgh Steelers fan.

Chips grabbed the San Miguel, twisted off the cap, took a loading dose and looked again at his watch; 1857. He was summonsing DICE as the rucksack from the 6th floor had arrived with a handwritten note from After Burner: “Put on these Manchester United warm up suits, see you on the chopper, AB”.

Chips turned to see DICE wearing only her upper and lower IOCs as if she had a premonition we would be wearing matching outfits. In the rucksack also were two harnesses and the remainder of DICE’s luggage content. DICE and Chips put on their matching Manchester Limited warm-ups, helped each other into the harness and then DICE gave two tugs on the rope as Chips downed the remainder of his 12 ounce San Miguel barley pop. In response to DICE’s two tugs the rope lowered to where one clip was at window height and the other some three feet lower.

Agent Chips helped secure DICE’s torso harness to the upper clip and then gave NOTSO one tug. NOTSO cranked DICE up three feet so that at exactly 1859 Chips could secure his torso harness before giving NOTSO a thumbs up as he held both duffels in his right hand. NOTSO engaged the electric motor to lift his co-agents to the roof top as a PUMA AS332 stood off the south side of the Metropole.

Chips thought of the 1982 monster hit by the Alan Parsons Project and wondered if someday they would play an outdoor concert replete with a Eurocopter making a cameo appearance. He watched from below as DICE was stepping on to the roof and he lamented the fact that she was not wearing a skirt or dress.

Moments later he heard the sound of the electric winch that was elevating him to roof top level as Barry M. Hall was waving green wands at the PUMA directing the chopper to an area of the roof top clear of any antennas such as those that adorn most Marriott and Trump hotel rooftops. It is thought that the highest concentration of antennas per square foot exist on the roof of the Marriott Hotel in Aguadilla, Puerto Rico, which once served as the Base Hospital for Ramey Air Force Base in the years 1939 to 1973.

For those with enquiring minds a Colonel Greider, MD, was the hospital commander from 1963 to 1968 and he had two lovely daughters not to be confused with Mrs. Brown who had a lovely daughter in England according to Peter Noone in his role as Herman of Herman’s Hermits a band second only to the Beatles in terms of pumping out the hits while a certain Abel Danger Agent was a member of the 72nd C4ISR Wing at Ramey Air Force Base during that interim.

Chips disconnected from the harness and rope assembly and as he joined DICE on the rooftop awaiting the arrival of the PUMA, he wondered if he and DICE would be considered guilty of some bull shit charges and deported to Australia if the helo extract and relocation to Crawley was not successful.

Chips pondered his legal future as he observed DICE from the stern aspect and Barry M. Hall stood in front of the PUMA with green wands crossed indicating for the HAC to hold his position while NOTSO helped DICE and then Chips into the passenger-cargo area before tossing two duffels and a rucksack in followed by two cases of San Miguel missing only one bottle. NOTSO climbed aboard, Barry gave the HAC a twirling signal with his right wand and then held up 3 fingers followed by a closed fist indicating that barring any subsequent signal from Barry, the HAC should lift off in 30 seconds.

Barry M. Hall was climbing in when the chopper lifted off early in response to an armed party arriving on the roof top. NOTSO and Chips grabbed Barry’s arms and secured him to the chopper while the HAC lifted up ever so slightly, turned towards the ocean and descended to wave top level to expedite their retreat from the Metropole.

As they settled at perhaps 6 feet MSL, a smattering of small arms rounds followed the chopper with no rounds striking their target or Barry who was keen to be drawn into the chopper knowing that there was 47 bottles of San Miguel inside the chopper and waitstaff service would probably be lacking on the skid of a chopper just 6 feet above the sea on a cold, dark and dank evening.

Once out of small arms range the HAC began a shallow right climbing turn into the overcast and set a course of 345 degrees magnetic, roughly direct to Crawley where the plan was to land either on the roof of the Arora International or the lawn of the Goff Manor House Pub where if done in a lights out manner no one would be able to interfere with the delivery of After Burner, Chips, DICE, NOTSO and Barry M. Hall. None of the 5 AD Agents in the chopper were aware of who the Hammer was but had been assured a Hammer would be with the package when the BRIGHTON 5 would arrive at the destination near Gatwick Airport.

The helo leveled off at 2500 feet MSL and made a direct course to the Crawley AoO, The fact that the helo was in cruise allowed NOTSO and Chips to drape a winch and harness out for Barry M. Hall to crawl into so the electric winch could lift hiS 308 pounds of graceful athleticism to floor level and then swing him into the passenger compartment of the chopper. Once inside the aircraft Barry M. Hall was thankful that After Burner was ready with a San Miguel beer bottle even if it was above the desired temperature of 42 degrees F. Chips never liked seeing a friend drinking alone so he accepted a San Miguel from DICE as After Burner passed one to NOTSO who was communicating with the advance party at Crawley regarding their current ETA of 1928 which was 2 minutes ahead of schedule.

NOTSO got an acknowledgment from MacCheese who signed as the Hammer for Operation LEMON SQUEEZE, an obvious bit of disinfo to confuse those who might oppose the current operation, Operation GADGET BENT, the title of which was in reference to the reality that the military leadership in the US and UK were both being corrupted in favor of civilian elements of both governments intent upon reducing the potency and war fighting capability of both countries forces.

GADGET BENT was also a term in military pilot talk indicating the radar of a participating aircraft was incapable of discriminating, finding or targeting and enemy asset or location. In this month of February, 1991 GADGET BENT also might allude to the fact that certain pedophile Nazi homosexuals had conspired to silence Colonel James Sabow USMC as he had inadvertently positioned himself to expose GHWB’s “oil and Kuwaiti Dinar reset” war which kicked off the very day Colonel Sabow was murdered according to certain experts including Gene Wheaton and Colonel Sabow’s PHANTOM WINGMAN.

NOTSO handed a Thales printout of the brief message to After Burner who, in turn, shared it with DICE, Chips and Barry M. Hall now on his third San Miguel. The four agents who read the message from the Crawley Hammer understood that assuming the 1928 ETA stood valid, they would be having drinks either at Goff Manor House or Morgan’s Lounge at the Arora depending on any other factions that might be hanging around those two watering holes thinking, wrongfully, that they could slow down the Abel Danger Truth Train. Fat chance or as Marines and SAS blokes might abbreviate, FFC.

Chips could feel the power reduced on the Super Puma so he knew that they must be beginning their initial descent into the Crawley AoO. He tapped Barry M. Hall on the left shoulder and held up a single digit, his left index finger, indicating he would like to share one more San Miguel before arrival at Crawley, regardless whether Goff Manor or Arora International. Barry M. complied and handed him a frosty San Miguel with the twist-off top removed.

The significance of that action was not wasted upon Chips who was being regaled with a view to the target area by Agent DICE who had been involved in lengthy briefings with Agent After Burner regarding their fathers Paddy Somers and Samuel Costello, formerly thought to be Samuel Freed before the revelation of certain classified plans of the UK MoD during the run up to the Soames-FADEC era where White’s Club betting on murders and assassinations would become so common that by 2003 Admiral John Poindexter would be taken out by his relationship to “death betting” although to be fair to the bespectacled dork named Poindexter he was simply betting on terrorists acts that were being sponsored by US CIA; a British branch in the US shadow government.

For those wishing to understand the Poindexter assassination perhaps a review of Robert Timberg’s woven tale of Annapolis graduates John TREASON McCain, Robert McFarlane, James Webb, Oliver North and John Poindexter might be in order. History may one day agree that the two most important works regarding the impact of the 5 Annapolis grads on the fabric of America in the 21st Century may be a pair of books written by Annapolis Marines.
Hoss and Stone, up in the flight deck, handed a single line message on a 4 by 6 salmon colored index card to the package of 5 in the back. “Goff Manor, 3 minutes, hover extract, LZ hot, lights out. Arora compromised. FESTUS channel 3”. Chips and the ladies reviewed the briefing before handing it to NOTSO and his younger 308 pound brother, Barry M. Hall, who in the late 80s had spent many a cheery moment at Spirits Bar in South Milwaukee, Wisconsin, also known as BEERTOWN and the subject of a song called ‘What Made Milwaukee Famous’ which was written by Lynn Anderson’s husband Glenn Sutton and recorded by a slew of artists beginning, in 1968, with Jerry Lee Lewis who along with Johnny Cash, Charlie Rich and Elvis prowled Sun Studio in Memphis while black acts were relegated to STAX Records in Soulsville, not far away in ‘another section’ of Memphis.

NOTSO grabbed another San Miguel as he checked his FESTUS radio ensuring it was on channel 3. Barry M. Hall had random thoughts of vertical leaps and 40 yard dash times but focused on his duties in providing grazing, flanking, interlocking and fusillade FIELDS of fire should the “hot LZ” become too hot for comfort. He signaled After Burner to prepare her ITEM B in case they need to cause flash blindness among the opposing forces which may, or may not, be awaiting them.

Dispatch at MacDill had filed a flight plan terminating at the rooftop of the Arora International so all aboard the chopper were hoping the UK dolts took the bait and choked on it. Abel Danger was aware of the emerging threats of FADEC and BUAP but felt they had a good six months lead on the opposing forces in the United Kingdom who were intent on denying their own citizens the basic services and protections promised them by all policies going back to the Magna Carta; the effective Magna Carta not the first one, capeche?

Chips, DICE and After Burner saw the amber light illuminate above the opening to the flight deck and understood that they final approach was underway and that they should not interfere with Hoss and Stone in the right and left pilot seats respectively. After Burner was reading a short brief on Henry Kissinger’s 1974 plan to accomplish genocide using the food chain and she laughed at the slothful ineptitude of the round fat man who reminded her a lot of the “Dr Strangelove” character in the 1963 Stanley Kubrick movie that was delayed until 1964 due to the ill-timed assassination of JFK by a network including LBJ, GHWB and Clint Murchison, Sr. of Athens, Texas or a little piss-ant town 7 miles east of Athens where the Caplin Ranch was once the apple of Abel Danger’s eye.

After Burner pointed at the red light that had been illuminated over the passageway to the flight deck. She chambered a round in her 40 caliber Glock as DICE put two rounds of ‘turkey load’ in her coach gun with the tactical illuminator. Chips and NOTSO placed 15 round mags in their Sig Sauer 9mm p-shooters as Barry M. Hall checked the 5 flash blindness grenades hanging from his bandoleer while polishing off his 4th San Miguel during the 27 minute flight from the Brighton Metropole where a confused hostess Maureen probably wondered what had become of the ‘package’ that was supposed to attend the 5pm-6pm airline hospitality hour where some bad actors involved in skullduggeries sponsored by Parton Down and Deepcut may have been deployed in a futile attempt to delay or derail the Abel Danger professionals.

The UK goons were hoping to keep a lid on the Brit input to the murder, on 22 January, 1991, of Colonel James Edward Sabow USMC who had as his PHANTOM WINGMAN an Abel Danger pro who shall remain nameless so Field McConnell, 583 099001 and USMC 0116513, 401 Main Street, Plum City, Wisconsin 54761 is not exposed to the dorks who clean up such details…when they can.

Those who authorized the murder of Colonel James Sabow USMC were not aware that when you fuck one Marine you become the target of all the other Marines. Ah, the significance of 23 May becomes evident, to those with keen vision.

The chopper was settling into a low hover above the back yard of Goff’s Manor House in Crawley when suddenly the entire sky lit up like London on Guy Fawkes day a scene from Apocalypse Now.

After Burner encouraged the ‘Package of 5′ to remain calm as she had read the Briefing Guide and she knew the source of the RING OF FIRE that encircled the Goff Manor House. Wide eyed Barry M. Hall reached for another San Miguel as Agent Chips was given a view to a kill.
Previous chapters:

Gadget Bent – Shake Hands With The Devil by Field McConnell – Chapter Two

Gadget Bent – Shake Hands With The Devil by Field McConnell – Chapter One

Posted 3 days ago by tokyowashi
0 Add a comment
May
19
#2674: Clinton’s Zulu Patents In SECNAV Treason – Serco SES Countermeasures – Sister’s JonBenet 8(a) Ransom Note
by
United States Marine Field McConnell
Plum City Online – (AbelDanger.net)
May 18, 2016

1. Abel Danger (AD) claims that by 1996, patent lawyer Hillary Clinton had assigned a Zulu-timed patent pool of fragmentation, delivery and onion router (Tor) devices to traitors in the senior civil service with a particular concentration in the office of the Secretary of the Navy (SECNAV).

2. AD claims that Clinton authorized the U.S. Senior Executive Service (SES) to use Serco countermeasures including honey pots, to track and neutralise military whistleblowers – apparently including John Ramsey – the father of the late JonBenet Ramsey – to sleeper-cell and procurement frauds in the $4.3 billion Pentagon Renovation (Penren) Program.

3. AD claims that Kristine Marcy – Senior Executive Service founder and Field McConnell’s sister – dictated the JonBenet ransom note to 8(a) actors in the Small Business Theater Club [S.B.T.C!], sent JonBenet’s father on grieving leave from Lockheed Martin’s Access Graphics and ordered evidence of the Clinton-Penren fraud in the U.S. Navy Command Center destroyed.

4. United States Marine Field McConnell invites James Comey – FBI director and former director of Serco banker HSBC – to investigate his sister Marcy and Hillary Clinton’s apparent roles in the JonBenét Ramsey murder in 1996 and the Zulu-timed fragging of Pentagon victims on 9/11, allegedly by SES traitors engaged in ongoing patent, sleeper-cell and procurement frauds. (http://www.abeldanger.net/2010/01/field-mcconnell-bio.htm)
Long range Navy fragging by Tor.
Meet Field’s Sister, Kristine Marcy (Sister Abel, Brother Cain)

Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders!
(Mobile Playback Version)

Note JonBenet’s father had just received a $118,000 bonus as CEO of the Lockheed Martin-subsidiary Access Graphics for work on the Pentagon Renovation Program.

White’s Club death-bet bookmaker services dates back to 1743 and – as Cameron’s friend, Churchill’s grandson and Serco CEO Rupert Soames well knows – only the technology to spot fix the precise time of death has changed.

Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders!
(Mobile Playback Version)

Serco’s National Visa Center

[Serco’s] Defense Ammunition Center

Serco… Would you like to know more?

“Mr. Ramsey,

Listen carefully! We are a group of individuals that represent a small foreign faction. We do respect your bussiness [sic] [Lockheed Martin partnered in the development of AWE nuclear weapons with Serco] but not the country that it serves. At this time we have your daughter in our posession [sic]. She is safe and unharmed and if you want her to see 1997, you must follow our instructions to the letter.

You will withdraw $118,000.00 from your account. $100,000 will be in $100 bills and the remaining $18,000 in $20 bills. Make sure that you bring an adequate size attache to the bank. When you get home you will put the money in a brown paper bag. I will call you between 8 and 10 am tomorrow to instruct you on delivery. The delivery will be exhausting so I advise you to be rested. If we monitor you getting the money early, we might call you early to arrange an earlier delivery of the money and hence a [sic] earlier delivery pick-up of your daughter.

Any deviation of my instructions will result in the immediate execution of your daughter. You will also be denied her remains for proper burial. The two gentlemen watching over your daughter donot particularly like you so I advise you not to provoke them. Speaking to anyone about your situation, such as Police, F.B.I., etc., will result in your daughter being beheaded. If we catch you talking to a stray dog, she dies. If you alert bank authorities, she dies. If the money is in any way marked or tampered with, she dies. You will be scanned for electronic devices and if any are found, she dies. You can try to deceive us but be warned that we are familiar with law enforcement countermeasures and tactics. You stand a 99% chance of killing your daughter if you try to out smart [sic] us. Follow our instructions and you stand a 100% chance of getting her back.

You and your family are under constant scrutiny as well as the authorities. Don’t try to grow a brain John. You are not the only fat cat around so don’t think that killing will be difficult. Don’t underestimate us John. Use that good southern common sense of yours. It is up to you now John!

Victory!

S.B.T.C
Original text”

“Cyber Operations

At Serco cyber operations is not a separate offering, but rather a critical discipline that is integrated into everything we do. In designing any key solution, process, or system we keep cyber security front of mind to make sure that your technology and your mission are protected from cyber threats from the ground up. We recognize that in today’s environment every IT environment faces a range of potential breaches, including those from sophisticated cyber hackers to employees and contractors working within the firewall. Our team of cyber experts stays current on the latest threats, most effective technologies, and best organizational practices. Our experience spans from highly sensitive, ultra-secure environments for the Intelligence community to all branches of the military and numerous federal civilian agencies.

Cyber Architecture – We employ an Enterprise Architecture-based approach to cyber operations that provides a very powerful means to integrate cyber security within the framework of your mission and critical systems, so as to promote effective governance, standardized infrastructure, and consistent execution.

Cyber Awareness – We help our clients develop the ability to effectively monitor, detect, and react to cyber intrusions before they cause significant damage. This includes maintaining global situational awareness and undertaking effective defensive and offensive countermeasures.

Cyber Education – Because the human actor often remains the most vulnerable link in the chain, Serco provides an integrated approach to training, compliance, and monitoring of cyber security policies and procedures.

At Serco, we recognize that effective cyber operations encompasses far more than buying the latest device. It requires an intimate understanding of how people, processes and technology come together to create a seamless end-to-end network environment that keeps critical information secure.”
“Serco Awarded $131 Million C4I Sustainment Contract Supporting the U.S. Navy
April 7, 2016
RESTON, VIRGINIA – April 7, 2016 – Serco Inc., a provider of professional, technology, and management services, announced today that the Company has been awarded a new contract to deliver lifecycle sustainment support for the U.S. Naval Facilities Engineering Command’s (NAVFAC) command, control, communications, computers and intelligence (C4I) systems at locations worldwide. The five year contract and options are valued at $131 million. The contract was initially awarded in December 2015 and a stop work order was issued due to a protest which has been resolved.

Serco will provide critical preventive and corrective maintenance, information assurance, asset management, technical systems updates, service call resolution, and configuration management for C4I systems. Serco has been performing sustainment support for over 13 years under various Space and Naval Warfare Systems Command (SPAWAR) contracts. The Company expects to hire approximately 60 new technicians to support the work at naval bases around the world.

“We are excited that the Navy turned to Serco to support this growing program that keeps the Navy’s C4I systems operational and our warfighters safe,” said Dan Allen, Chairman and CEO of Serco Inc. “I am proud of the team here at Serco for winning this new contract. We utilized our decade-long experience and innovation to design a winning solution for the Navy.” About Serco Inc.: Serco Inc. is a leading provider of professional, technology, and management services. We advise, design, integrate, and deliver solutions that transform how clients achieve their missions. Our customer-first approach, robust portfolio of services, and global experience enable us to respond with solutions that achieve outcomes with value. Headquartered in Reston, Virginia, Serco Inc. has approximately 9,000 employees and an annual revenue of $1 billion. Serco Inc. is a wholly-owned subsidiary of Serco Group plc, a $5.9 billion international business that helps transform government and public services around the world. More information about Serco Inc. can be found at http://www.serco-na.com.”

“The Office of the Secretary of the Navy, also known within DoD as the Navy Secretariat or simply just as the Secretariat in a DoN setting, is the immediate headquarters staff that supports the Secretary in discharging his duties. The principal officials of the Secretariat include the Under Secretary of the Navy (the Secretary’s principal civilian deputy), the Assistant Secretaries of the Navy (ASN), the General Counsel of the Department of the Navy, the Judge Advocate General of the Navy (JAG), the Naval Inspector General (NIG), the Chief of Legislative Affairs, and the Chief of Naval Research. The Office of the Secretary of the Navy has sole responsibility within the Department of the Navy for acquisition, auditing, financial and information management, legislative affairs, public affairs, research, and development.[6]”

“9/11 — An Inside Job”
by Paul Andrew Mitchell, B.A., M.S., Private Attorney General, 18 U.S.C. 1964 (3/18/2010) …
One USAF pilot I know told me that Captain Gerald F. DeConto was on the telephone to Gordon England, Secretary of the Navy, requesting authorization to engage the incoming, because the Pentagon’s automatic fire control system had been fooled by a “friendly” transponder beacon.

http://www.arlingtoncemetery.net/gfdeconto.htm

As the highest ranking officer in the Naval Command Center, DeConto and his staff must have been tracking that incoming on their in-house radar systems, and realized that the incoming jet had a friendly transponder, because the fire control system had NOT activated itself.

While England kept Captain DeConto on the telephone, evidently stalling him, DeConto and his staff were killed by the missile warhead and subsequent impact of the A-3.

The Boeing 757 seen by many eyewitnesses was timed to fly over the Pentagon at precisely the moment of the A-3’s impact. It landed at National, into the waiting arms of 94 ground crew who had infiltrated Dulles and National airports.

They were later deported for falsifying Social Security applications and violating immigration laws”
“Onion routing was developed in the mid-1990s at the U.S. Naval Research Laboratory by employees Paul Syverson, Michael G. Reed, and David Goldschlag[2][3] to protect U.S. intelligence communications online.[4] It was further developed by the Defense Advanced Research Projects Agency (DARPA) and patented by the Navy in 1998.[3][5][6]

Computer scientists Roger Dingledine and Nick Mathewson joined Syverson in 2002 to develop what would become the largest and best known implementation of onion routing, Tor, then called The Onion Routing project or TOR project. After the Naval Research Laboratory released the code for Tor under a free license,[4][7][8] Dingledine, Mathewson and five others founded The Tor Project as a non-profit organization in 2006, with the financial support of the Electronic Frontier Foundation and several other organizations.[9][10]”

“November 30, 2015 RESTON, VA – November 30, 2015 – Serco Inc., a provider of professional, technology, and management services, announced today the Company has been awarded a patent classification services contract with the United States Patent and Trademark Office (USPTO). Serco will provide initial patent classification and reclassification services to support USPTO’s core mission of examining, granting, and disseminating patents and trademarks. The recompete contract has a one-year base period with four one-year option periods, and is valued at $95 million over the five-year period, if all options and award terms are exercised.”

“Preparing the 8(a) application package

You do not need to pay anyone to prepare your 8(a) application. SBA designed the application forms so the applicant can complete the application. However, a consultant can assist in completing the application. Please be advised that no one can guarantee that an application for 8(a) program participation will be approved. The application process is intended to assure that each applicant receives a fair, unbiased review, free from favoritism and influence. Any irregularities in the application review process should be immediately referred to the SBA Inspector General.

Definition of Socially and Economically Disadvantaged Individuals

Socially disadvantaged individuals are those who have been subjected to racial or ethnic prejudice or cultural bias because of their identities as members of groups without regard to their individual qualities. The social disadvantage must stem from circumstances beyond their control. In the absence of evidence to the contrary, the following individuals are presumed to be socially disadvantaged:

Black Americans; Hispanic Americans (persons with origins from Latin America, South America, Portugal and Spain); Native Americans (American Indians, Eskimos, Aleuts, and Native Hawaiians); Asian Pacific Americans (persons with origins from Japan, China, the Philippines, Vietnam, Korea, Samoa, Guam, U.S. Trust Territory of the Pacific Islands [Republic of Palau], Commonwealth of the Northern Mariana Islands, Laos, Cambodia [Kampuchea], Taiwan, Burma, Thailand, Malaysia, Indonesia, Singapore, Brunei, Republic of the Marshall Islands, Federated States of Micronesia, Macao, Hong Kong, Fiji, Tonga, Kiribati, Tuvalu, or Nauru); Subcontinent Asian Americans (persons with origins from India, Pakistan, Bangladesh, Sri Lanka, Bhutan, the Maldives Islands or Nepal); And members of other groups designated from time to time by the SBA.

In addition, an individual who is not a member of one of the above-named groups may apply for 8(a) certification. However, the applicant must establish social disadvantage on the basis of clear and convincing evidence.

Economically disadvantaged individuals are socially disadvantaged individuals whose ability to compete in the free enterprise system has been impaired due to diminished capital and credit opportunities, as compared to others in the same or similar line of business and competitive market area who are not socially disadvantaged. For purposes of program entry, an individual whose personal net worth (excluding the equity in their personal residence and business) exceeds $250,000 will not be considered economically disadvantaged.
Woman-Owned Businesses [Obama’s structural feminists]

A woman-owned business may be recognized as a “socially disadvantaged firm” if the owner is a member of one of the groups for which social disadvantage is presumed. If the woman is not a member of one of the groups for which social disadvantage is presumed, she must establish her individual disadvantage on the basis of clear and convincing evidence that she has suffered discriminatory treatment because of her gender and that this treatment has impeded her entry into or advancement in the business world. SBA will consider any pertinent evidence but will give particular attention to evidence of discriminatory practices suffered in the areas of education, employment and the business world.”

“A Tor of the Dark Web (slifty.com) Yes, I know I shouldn’t say it out loud, but here I am saying it (take me, Police) – out of curiosity, I went to Hard Candy section of The Hidden Wiki. (Yes, it is exactly what you would think it is.) GOD.

There are seriously forums full of pedofiles sharing pictures and – maybe worse? – their stories and wisdoms. Maybe out of utter fascination, I spend about few hours on there and I felt like I want to murder all humanity. On one of these forums, there was this alleged “doctor”, who advised people, from what age you can have sex with your children without their doctor to notice. Tips how to kidnap young children. The worst thing was that I just knew that – if they don’t do something stupid – they are basically untracable and uncatchable, while I would simply want to catch them all and kill them one by one. (I am sorry for being so expressive.)

There were also some picture forums but really I couldn’t stand that, I just wanted to vomit while I was shaking. I… am not sure why I am writing this. I am all for Tor. But we have to admit – when everything is allowed and anonymous, EVERYTHING is allowed and anonymous. And the dark parts of humanity flow on top. Drug markets, weapon markets, assassin markets (although I don’t know how sersiously to take those), terrorist websites, child porn websites.

But – as hard it is for me to say it – to see that the seriously f…d up child molesters are freely allowed to say really anything there and noone has a chance to catch them just shows that Tor is really anonymous and safe.

edit: I do not know if The Hidden Wiki is still operating, if the dark places I visited are still operating, it is about one year and I did not feel any urge to revisit it again.”

“John Howard Dalton (born December 13, 1941) is a U.S. administrator and banker. Dalton was Secretary of the Navy from July 22, 1993 to November 16, 1998.

Education and Navy service[edit]

Dalton attended Louisiana State University for a year before transferring to the U.S. Naval Academy. He graduated with distinction from Annapolis in 1964 and was a finalist in the Rhodes Scholarship competition. After graduating from Annapolis, Dalton served in the Navy from 1964 to 1969. During the that time he received naval nuclear power training and served aboard the submarines USS Blueback (SS-581) as the Supply and Commissary Officer and USS John C. Calhoun (SSBN-630) as the Main Propulsion Assistant, Communications Officer and Weapons Officer. He attained the rank of lieutenant while on active duty and was promoted to Lieutenant Commander while in the U.S. Naval Reserve.

Business career[edit]

After leaving the Navy, Dalton ran the San Antonio, Texas office of the Little Rock, Arkansas-based Stephens Inc. investment banking firm. Prior to his employment at Stephens Inc., he was Managing Director of Best Associates and Mason Best Company, merchant banking firms headquartered in Houston and Dallas respectively. In 1971, Dalton received a Master of Business Administration degree from the Wharton School of the University of Pennsylvania.

From 1984 to 1988, Dalton served as Chairman and Chief Executive Officer of Freedom Capital Corporation in San Antonio, and President of the Sequin Savings Association. Prior to this position, he was President of the Real Estate Division of the Gill Companies of San Antonio. President Carter nominated Dalton to the Federal Home Loan Bank Board in December 1979, where he served as a member and chairman until July 1981. Dalton was President of the Government National Mortgage Association of the U.S. Department of Housing and Urban Development before being appointed to the Bank Board. He began his public service career after serving with the investment banking firm of Goldman, Sachs & Company in Dallas, Texas.

Since January 2005, Dalton has been President of the Housing Policy Council at The Financial Services Roundtable.[1]

“The term fragging is used to describe the deliberate killing or attempted killing by a soldier of a fellow soldier, usually a superior officer or non-commissioned officer. The word was coined by military personnel of the United States during the Vietnam War, when such killings were most often attempted with a fragmentation grenade,[2] sometimes making it appear as though the killing was accidental or during combat with the enemy. The term fragging is now often used to encompass any means used to deliberately and directly cause the death of military colleagues. The high number of fragging incidents in the latter years of the Vietnam War were symptomatic of the unpopularity of the war with the American public and the breakdown of discipline in the U.S. Armed Forces. Documented and suspected fragging incidents totaled nearly nine hundred from 1969 to 1972. Fragging has not been as frequent since the Vietnam War ended.”

“John Bennett Ramsey (born December 7, 1943) is an American business man, author, and father of homicide victim JonBenét Ramsey. He was the first to discover JonBenét’s body in the wine cellar of the Ramseys’ 15-room home in Boulder, Colorado, on December 26, 1996, just hours after her murder on Christmas Day. Ramsey was born in Lincoln, Nebraska, to Mary Jane (née Bennett) and James Dudley “Jay” Ramsey.[1] He graduated from Michigan State University. In 1966 Ramsey joined the Navy, serving as a Civil Engineer Corps officer in the Philippines, for three years, and in an Atlanta reserve unit for an additional eight years.[2] He holds a pilot’s license and owns two planes.[3]”
“In 1989, [Ramsey] formed the Advanced Product Group, one of three companies that merged to become Access Graphics. He became president and chief executive officer of Access Graphics, a computer services company and a subsidiary of Lockheed Martin.[6] In 1996, Access Graphics grossed over $1 billion, and he was named “Entrepreneur of the Year” by the Boulder Chamber of Commerce. Immediately following the murder of his daughter he was “temporarily replaced so the company did not have to bother him about business matters as he grieved”, according to Lockheed Martin spokesman Evan McCollum.[7]

Ramsey soon left his job to move his family to Michigan, where he joined another computer company. Access Graphics was later sold to General Electric in 1997.

His net worth was reported at $6.4 million as of May 1, 1996.”

“Controlled fragmentation of multi-walled warheads
US 3566794 A
Publication number: US3566794 A
Publication type: Grant
Publication date:2 Mar 1971
Filing date: 26 Nov 1958
Priority date: 26 Nov 1958
Inventors: Carlisle Richard T, Pearson John, Sewell Robert G S
Original Assignee: US Navy
Export Citation: BiBTeX, EndNote, RefMan
Patent Citations (3), Non-Patent Citations (1), Referenced by (18), Classifications (5)

CONTROLLED FRAGMENTATION 01F MULTI-WALLED WARI’IEADS
The invention herein described may be manufactured and used by or for the Government of the United States of America for governmental purposes without the payment of any royalties thereon or therefor. This invention relates to explosive warheads; more specifically it relates to fragmentation warheads for antipersonnel use. This application is similar to application Ser. No. 582,896, filed 4 May 1956, but goes beyond the scope of said application in applying the teachings thereof to multiwalled warhead casings.

Prior attempts at fragmentation control in impulsively loaded bodies such as warheads have generally involved the cutting of grooves on the surfaces, both inner and outer, of such bodies or the placing of plastic liners of predetermined shape between the inner surfaces of such bodies and the explosives contained therein. Such practices produced local regions of high stress which initiated points of fracture, but complete fragmentation control did not result therefrom.

As pointed out in the aforementioned application fragmentation is a function of wall thickness as well as the groove pattern. Applicants have discovered that further control of fragmentation may be attained by utilizing a plurality of walls in the warhead casing, by cutting grooves on the inner surface of each such wall, and by the orientation of the groove patterns so cut on the walls.

Accordingly, it is an object of this invention to provide a method for closer control of the fragmentation of impulsively loaded bodies than the methods of the prior art.

Another object is to produce a greater number of lethal fragments from a given mass of metal through the elimination of very large fragments and very fine ones. Applicants believe that fragments ranging from one-half to 4 grams are the most lethal against personnel and light military equipment.”

“Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”

“Serco do a bunch more that didn’t even make our story: As well as thanking God for his success, CEO Chris Hyman is a Pentecostal Christian who has released a gospel album in America and fasts every Tuesday. Amazingly, he was also in the World Trade Centre on 9/11, on the 47th floor addressing shareholders [including Bilderberg bankers such as HSBC and the Rockefeller-controlled JP Morgan Chase] Serco run navy patrol boats for the ADF, as well as search and salvage operations through their partnership with P&O which form Defence Maritime Services. Serco run two Australian jails already, Acacia in WA and Borallon in Queensland. They’re one of the biggest companies In the UK for running electronic tagging of offenders under house arrest or parole.”

“Origins of the Bilderberg meetings .. The immediate chain of events leading to the setting up of the first conference was as follows. Prince Bernhard set off for the USA in 1952 to visit his old friend Walter Bedell Smith, director of the newly-formed CIA. Smith put the organisation of the American end into the hands of Charles D. Jackson (special assistant for psychological warfare to the US President), who appointed John S. Coleman (president of the Burroughs Corporation. and a member of the Committee for a National Trade Policy), who in turn briefly became US chair of Bilderberg.

Charles Jackson was president of the Committee for a Free Europe (forerunner of the Congress for Cultural Freedom (CCF) whose extensive operations financing and organising anti-Communist social democratic political intellectuals has only recently been fully documented (see Coleman 1989); and ran the CIA-financed Radio Free Europe in Germany. Earlier he had been publisher of Fortune magazine and managing director of Time/Life, and during the war was deputy head of psychological warfare for Eisenhower. At the time of Bernhard’s visit he was working with a committee of businessmen on both sides of the Atlantic which approved the European Payments Union.

It was thus a European initiative, and its aim was, in official bland language, to ‘strengthen links’ between Western Europe and the USA. A selected list of people to be invited to the first conference was drawn up by Retinger, with Prince Bernhard and Rijkens, from the European countries of NATO plus Sweden. The resulting group consisted of the Belgian and Italian prime ministers, Paul van Zeeland and Alcide de Gasperi (CDU), from France both the right wing prime minister Antoine Pinay and the Socialist leader Guy Mollet; diplomats like Pietro Quaroni of Italy and Panavotis Pipinelis of Greece; top German corporate lawyer Rudolf Miller and the industrialist Otto Wolff von Amerongen and the Danish foreign minister Ole Bjorn Kraft (publisher of Denmark’s top daily newspaper); and from England came Denis Healey and Hugh Gaitskell from the Labour Party, Robert Boothby from the Conservative Party, Sir Oliver Franks from the British state, and Sir Colin Gubbins, who had headed the Special Operations Executive (SOL) during the war [and introduced the 8(a) Zulu bomb to the Billderberg]”

“Serco farewell to NPL after 19 years of innovation
8 January 2015
Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco’s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade….

NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading in the City through NPLTime”

“Support Services for Starwood Hotels Group Starwood Hotels Group, owner of some of the [Innholders] world’s most prestigious hotels, has appointed Serco as preferred bidder for a £7m contract to provide a range of support services to the Sheraton Grand in Edinburgh, the Westin in Dublin and the 5 star Turnberry resort on Scotland’s west coast. The contract, which has a 5 year term, is an extension to services already provided to other [Innholders] hotels in the Starwood Group and includes buildings maintenance and security, engineering support and [WiFi] help desk services.”

“Loan Improvement
Jan 31, 2001
SBA modernizes to help feed its growing programs [Field McConnell’s sister Kristine Marcy introduced the 8(a) electronic accelerated loan guarantee program at SBA to ensure funding for the Serco protégés’ participating in the 9/11 carbon cap] BY PATRICIA DAUKANTAS | GCN STAFF Under a five-year plan for overhauling its information technology systems, the Small Business Administration recently acquired new software for financial and other administrative tasks.

By the time SBA celebrates its 50th anniversary in 2003, agency officials want all their programs up and running around the clock, chief financial officer Joseph Loddo said.

In the first phase of the modernization, the agency has upgraded systems for managing its extensive portfolio of guaranteed loans, chief operating officer Kristine Marcy said.

SBA processed its first electronic loan last November through its Sacramento, Calif., office and plans to add more private lenders during fiscal 2001.

The agency’s staffing level has dropped 22 percent over the past eight years, which is another reason to improve IT, Marcy said. Over the past decade, SBA’s portfolio of loans to small and disadvantaged businesses has more than doubled to $50 billion.

‘We’re a small agency with a huge portfolio,’ Marcy said. SBA supplies more than half of the U.S. venture capital available each year.

Seventy percent to 80 percent of the loans are booked through a preferred lender program [structured by Serco], which involves nearly 7,000 banks, Marcy said. SBA guarantees the loans, just as the government backs student and housing loans.

‘The financial and IT businesses were changing so rapidly, we had to make some changes to stay current with the private sector,’ Marcy said. Banks had been asking SBA to make faster decisions on loan guarantees. The agency decided to aim for a turnaround time of one hour.”

“BASE ONE CERTIFICATIONS Base One [a Serco protégé company] is NO longer an 8(a), or HubZone certified company. Base One is a Small Business and a Women Owned Small Disadvantaged Business. Base One previously held certifications by the SBA. Please disregard any references to Base One being currently certified as an 8(a) or HubZone firm by the SBA.

Base One Technologies

Expertly researches, designs, and develops information security policies that protect your data and manage your firm’s information technology risk at levels acceptable to your business.

Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report.

Develops and implements multi-layer Information Security Solutions, practices and procedures. We deploy Intrusion Detection Systems (IDS) and IP Security with VPN solutions using Cisco routers, Frame Relay, firewalls, address and port translation, obscurity standards and authentication technologies (AAA, 3DES, TACACS, etcŠ), to enhance and meet the level of Data Security required for global organizations.

Conducts IT Security and Risk Assessment in Federal government as well as security testing, implementing security for multiple platforms and operating systems around the world.

Ability to conduct business process analysis to provide technical security countermeasures, risk management and data communications security planning for large organizations.

Provides computer security integration for web server and traditional client-server based applications. We secure environments up to as many layers as required by our clients’ policies, industry practices, and regulating bodies – including the desktop and user experience as required. Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions.”
Yours sincerely,
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222

David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation
Posted 3 days ago by tokyowashi
0 Add a comment
May
19
EgyptAir Flight MS804 From Paris to Cairo Missing With 66 On Board
Source: Reuters

May 19, 2016

CAIRO | By Lin Noueihed and Eric Knecht
An EgyptAir flight carrying 66 passengers and crew on a flight from Paris to Cairo disappeared from radar over the Mediterranean Sea, Egypt’s national airline said.

Egyptian Prime Minister Sherif Ismail said the search was underway to find the missing Airbus A320 and it was too early to rule out any explanation for the incident, including terrorism.

Officials with the airline and the Egyptian civil aviation department told Reuters they believed the jet had crashed into the sea.

However, it remained unclear whether the disappearance was due to technical failure or any other reason such as sabotage by ultra-hardline Islamists, who have targeted airports, airliners and tourist sites in Europe, Egypt, Tunisia and other Middle Eastern countries over the past few years.

Egypt Air said the plane sent an emergency signal – possibly from an emergency beacon attached to the plane – at 04:26 a.m., two hours after it disappeared from radar screens.

In water crashes, an underwater locator beacon attached to the aircraft’s flight recorders starts to emit a signal or ping. This helps the search and rescue teams to locate the boxes, and the location of the crash.

The aircraft was carrying 56 passengers, including one child and two infants, and 10 crew, EgyptAir said. They included 30 Egyptian and 15 French nationals, along with nationals from 10 other countries.

“The theory that the plane crashed and fell is now confirmed after the preliminary search and after it did not arrive at any of the nearby airports,” said a senior aviation source, who declined to be identified.

“All causes for the disaster are open, whether it is a major technical fault or a terrorist action or any other circumstance. This will be ascertained when we inspect the plane’s wreckage and transcribe its black boxes.”

Asked if he could rule out that terrorists were behind the incident, Prime Minister Ismail said: “We cannot exclude anything at this time or confirm anything. All the search operations must be concluded so we can know the cause.”

“Search operations are ongoing at this time for the airplane in the area where it is believed to have lost contact,” he told reporters at Cairo airport.

Egyptian President Abdel Fattah al-Sisi will chair a national security council meeting on Thursday morning, a statement from his office said. It did not say if the meeting would discuss the plane.

________
BREAKING: EgyptAir flight MS-804 from Paris to Cairo disappears from radar!

Abel Danger take…update coming…

All Under Control

Posted 4 days ago by tokyowashi
5 View comments
May
18
China: The New Commercial-Military Empire on the Block – China’s Economy Based on the American Model of the 1800s – History’s Most Extensive Global Commercial Empire – An Entire Global Lattice of Infrastructure – The Romans Did It, So Did the British and So Did the Americans – Now It’s China’s Turn – The World Is Being Made Friendly for Chinese Global Commerce – Will These Competing Commercial-Military Civilizations Ultimately Clash? – Chinese Is the Most Common Language
Source: Quartz

China is building the most extensive global commercial-military empire in history

To the empire. (Reuters/Stringer)

In the 18th and 19th centuries, the sun famously never set on the British empire. A commanding navy enforced its will, yet all would have been lost if it were not for ports, roads, and railroads. The infrastructure that the British built everywhere they went embedded and enabled their power like bones and veins in a body.

Great nations have done this since Rome paved 55,000 miles (89,000 km) of roads and aqueducts in Europe. In the 19th and 20th centuries, Russia and the United States established their own imprint, skewering and taming nearby territories with projects like the Trans-Siberian and the Trans-Continental railways.

Now it’s the turn of the Chinese. Much has been made of Beijing’s “resource grab” in Africa and elsewhere, its construction of militarized artificial islands in the South China Sea and, most recently, its new strategy to project naval power broadly in the open seas.

Yet these profiles of an allegedly grasping and treacherous China tend to consider its ambitions in disconnected pieces. What these pieces add up to is a whole latticework of infrastructure materializing around the world. Combined with the ambitious activities of Chinese companies, they are quickly growing into history’s most extensive global commercial empire.

A whole latticework of infrastructure… is growing into history’s most extensive global commercial empire. China views almost no place as uncontested. Chinese-financed and -built dams, roads, railroads, natural gas pipelines, ports, and airports are either in place or will be from Samoa to Rio de Janeiro, St. Petersburg to Jakarta, Mombasa to Vanuatu, and from the Arctic to Antarctica. Many are built in service of current and prospective mines, oilfields, and other businesses back to China, and at times to markets abroad.

But while this grand picture suggests a deliberate plan devised in Beijing, it also reflects an unbridled commercial frenzy. Chinese companies are venturing out and doing deals lacking any particular order. Mostly, they’re interested in finding growth abroad that is proving difficult to manage at home. This, too, is typical for a fast-growing power.

“This is very much in line with what we would expect from other great powers whose military posture follows its economic and diplomatic footprint,” Lyle Morris, a China specialist with Rand, told Quartz.

Below are snapshots of components that are either already in place or on the way.

The story starts with a reimagined Silk Road …

Map 1. The Silk Road economic belt and its maritime counterpart. (Reuters)

In September 2013, newly anointed Chinese leader Xi Jinping visited Kazakhstan’s capital, Astana. He was in town to seal the Chinese purchase of a $5 billion stake in Kashagan, one of the world’s largest oilfields. On that trip, he unveiled a plan ultimately dubbed “One Belt, One Road”—a land-and-sea version of the fabled East-West Silk Road trading route.

The idea is audacious in scope.

Map 2. The Kunming-Singapore rail link. (Classical Geographer/Wikimedia Commons)

On land, Beijing has in mind a high-speed rail network (map 2). It will start in Kunming, the capital of Yunnan province, and connect with Laos and on into Cambodia, Malaysia, Myanmar, Singapore, Thailand and Vietnam. Another overland network of roads, rail and energy pipelines will begin in Xi’an in central China and head west as far as Belgium (see dotted brown line above). As we’ve written previously, Beijing has already initiated an 8,011-mile cargo rail route between the Chinese city of Yiwu and Madrid, Spain. Finally, another 1,125-mile-long bullet train will start in Kashgar and punch south through Pakistan to the Arabian Sea port of Gwadur. The thinking behind this rail-driven plan isn’t new–as we have written previously, Beijing has been piecing it together for awhile.

At sea, a companion 21st-century Maritime Silk Road (see dotted blue line in map 1) would connect the South China Sea, and the Indian and South Pacific oceans. China would begin to protect its own sea lanes as well. On May 26 it disclosed a strategy for expanding its navy into a fleet that not only hugs its own shores, but can wander the open ocean.

China does not need to build all of these thousands of miles of railroads and other facilities. Much of the infrastructure already exists; where it does, the trick is to link it all together.

Everywhere, new public works will be required. And to make its vision materialize, Beijing must be careful to be seen as generously sharing the big engineering and construction projects. Up to now, such contracts have been treated as rare, big profit opportunities for state-owned Chinese industrial units. These include the China Railway Group, whose already-inflated share prices have often gone up each time another piece of the overseas empire has fallen into place. If local infrastructure companies are excluded from the largesse, there will be push-back on almost every continent.

In any case, not all this will necessarily happen. In a recent note to clients, China observer Jonathan Fenby of the research firm Trusted Sources suggested that it may all be too ambitious. China has had a history of announcing and then shelving projects, such as a $3.7 billion railway canceled by Mexico in February amid allegations of local nepotism. Meanwhile, Japan has begun to challenge Chinese plans. It has launched rival bids for billion-dollar high-speed rail and other projects in Indonesia, Thailand and elsewhere, with relatively low-interest loans and sometimes better technology (paywall).

But Beijing seems to recognize its own limits. Rather, the world may help to build at least some of the infrastructure through another Chinese creation—the Asian Infrastructure Investment Bank, with its 57 founding members, modeled loosely on the World Bank. Projects backed by the bank are meant to be good for the country where they are built. But given China’s outsize influence in the institution, they are certain to include some that fit into its grand scheme of global infrastructure.

…extends into South America…

Map 3: China’s South American railway project, which cuts through the Amazon rainforest. (Global Forest Watch)

Xi has pledged $250 billion in investment in South America over the next 10 years. The centerpiece is a $10 billion, 3,300-mile, high-speed railroad (dotted red line above) that would start in Acu, near Rio de Janeiro, crossing the Amazon rainforest and the Andes Mountains, and terminate on the Peruvian coast. (NPR’s Tom Ashbrook conducted an excellent hour-long program on the railroad.)

On top of that, there’s an advanced proposal by Chinese billionaire Wang Jing to build a 170-mile-long, $50 billion canal through Nicaragua.

…and also across Africa

Map 4: The East Africa railways master plan. (Kenya Railways Corporation)

In January, China agreed with the African Union to help build railroads (map 4), roads, and airports to link all 54 African countries. These plans are already under way, including a $13 billion, 875-mile-long coastal railroad in Nigeria; a $3.8 billion, 500-mile-long railroad connecting the Kenyan cities of Nairobi and Mombasa; a $4 billion, 460-mile railway linking the Ethiopian cities of Addis Ababa and Djibouti; and a $5.6 billion, 850-mile network of rail lines in Chad.

Then there are China’s maritime ambitions. These envision modern ports in the Tanzanian capital, Dar es Salaam; the Mozambican capital, Maputo; Libreville, Gabon; the Ghanaian city of Tema; and the Senegalese capital, Dakar.

All these land and marine projects align with existing Chinese natural-resource investments on the continent. For example, the China National Petroleum Corporation (CNPC) has large oil projects in Chad and Mozambique, and Chinese manufacturers are fast setting up Ethiopian factories that rely on cheap local labor.

The new Chinese empire is enveloping its neighbors …

Map 5: The China-Laos Railway. (Radio Free Asia)

In addition to its planned high-speed rail network into Malaysia and Singapore (map 2) and Laos (map 5) into southeast Asia (see map 5 for Laotian portion), China plans a canal across the Isthmus of Kra in Thailand, a deep-water container port and industrial park in Kuantan, Malaysia, and a $511-million expansion of Male airport in the Maldives.

… and nations further afield in the Pacific

Map 6: Chinese investments in the South Seas, by dollar amount. (Lowly Institute)

China wants to dominate not only the South and East China seas, but far into the Pacific (map 6). According to the Lowy Institute, transportation comprises by far the largest portion of $2.5 billion in Chinese assistance and commercial credit to South Sea nations. Among the projects are:

Fiji: A $158 million hydroelectric plant and several sports complexes, including the 4,000-seat Vodafone stadium in Suva.

Samoa: A $100 million hospital in Apia, a $40 million terminal and upgraded runway at Faleolo Airport, and a $140 million wharf at Vaiusu.

Tonga: A $12 million government building to be called St. George Palace, and two small Chinese turboprop aircraft for domestic routes aboard Real Tonga airlines. The aircraft deal has been controversial because neither of the planes are certified for use in the West.

Vanuatu: Two more turboprops, this time for Air Vanuatu, and $60 million to build a Port Vila campus of the University of the South Pacific and a Parliament House (both loans have been forgiven).

Pakistan is pivotal to China’s Silk Road …

Map 7: The Pakistan-China rail link. (Xinhua)

Why has China lavished $42 billion in infrastructure projects on Pakistan? The two have always been allies. But China has a particular goal: It wants to contain Uighur separatists who have been fomenting violence in the western province of Xinjiang. Some of these separatists have sanctuaries in Pakistan and Afghanistan, and Beijing has pushed hard for both countries to hand over Uighurs living there.
But sending goods through Pakistan (map 7) also helps China avoid the Malacca Strait (map 8). Much of Beijing’s oil and other natural resources passes through this narrow, 500-mile-long stretch of sea between Malaysia and Indonesia. China worries that, if its relations with Washington become truly hostile, the US could theoretically blockade the strait and starve the country of its lifeblood resources. That is in large part why Beijing is financing a deep Arabian Sea port at Gwadur, and the 1,125-mile-long super-highway, high-speed railway and oil-pipeline route to the Chinese city of Kashgar.

… as is Central Asia …

Workers complete welding the last pipe links at the construction site on the steppe near the country’s commercial hub of Almaty July 10, 2009.

A last weld. (Reuters/Pavel Mikheyev)

Central Asia has been an almost exclusively Russian playground for almost two centuries. It still is when it comes to pure muscle. But in matters of cash, China is fast moving in.

The relationship revolves around oil and natural gas. Turkmenistan supplies more than half of China’s imported gas. It gets there through three, 1,150-mile-long pipelines; a fourth pipeline is soon to begin construction. China is the only foreign nation that Turkmenistan allows to drill for gas onshore, in particular from Galkynysh, the second-largest gasfield in the world. China’s $5 billion share of the Kashagan oilfield in Kazakhstan is one of its largest oil stakes anywhere. Xi also has signed $15 billion in gas and uranium deals in Uzbekistan.

… and Russia

Map 9: The ties that bind Russia to China. (Reuters)

Two years ago, Russia announced a pivot towards China. The centerpiece of the shift is two natural-gas pipelines (the larger of the two is the dotted red line in map 9) through which a fifth of China’s gas imports would flow. The deal had some snags, but they reportedly have been worked out, and construction is to begin soon. In addition, China is to build a $242 billion, 4,300-mile high-speed railway from Beijing to Moscow, a two-day trip compared with the current six-day Trans-Mongolian Express.

China is speeding up how fast goods get to Europe …

Map 10: The Maritime Silk Road(China Daily)

The Maritime Silk Road (the solid blue line in map 10) will enter Europe through a $260 million Chinese-funded upgrade of the Greek port of Piraeus. From there, rail service will continue into the Balkans. Ships from China will also make port in Lisbon, Portugal, and Duisburg, Germany. To take the network into the heart of Europe, Beijing has agreed to finance a 250-mile bullet train, costing up to $3 billion, from Belgrade to Budapest. Separately, China’s new 8,011-mile cargo railroad from Yiwu to Madrid is taking away business from far more time-consuming truck shipping.

… and has piled into US real estate

(Real Capital Analytics)

For now, the Chinese web of infrastructure does not extend to the US. Instead, what has been built elsewhere is serving as a jumping-off point to the gigantic US market. High-speed trains are only now starting to be planned in the US, and Chinese firms are front-runners to win contracts, including a $1 billion contest for the San Francisco-to-Los Angeles route, expected to be worth $68 billion. China’s CNR Corp. is already providing 284 passenger cars worth $566 million to the Boston subway system.

Another big splash: the United States is China’s favored destination for real estate investment (see chart above). This has included commercial jewels such as New York’s Waldorf Astoria ($1.95 billion to Angbang Insurance) and the Chase Manhattan Plaza ($725 million to Fosun). But the bigger sums have been spent in all-cash deals by wealthy Chinese for residential properties (pdf, page 12).

Last but not least, China has polar ambitions

A general view shows Chinese ice breaker ship “Xuelong”, also called “Snow Dragon”, docking at Tianjin November 3, 2011.

The Chinese icebreaker “Snow Dragon.”(Reuters/China Daily)

Though the closest Chinese territory gets to the Arctic Circle is a thousand miles away, China nonetheless calls itself a “near-Arctic state.” Chinese oil company Cnooc has a majority share in Iceland’s Dreki oil and natural gas field, and Beijing established the Arctic Yellow River Station, a permanent research facility on Norway’s Spitsbergen Island. In Antarctica, China has four research stations, structures that allow nations to stake a claim to the continent. Plans for a fifth station at a place called Inexpressible Island are under way. It is positioning itself to move for the continent’s resources when a 1959 treaty guaranteeing its wilderness status expires in 2048.

Some of the infrastructure China is creating around the world will align with Western economic interests. But to the extent that it does, that will be inadvertent. Some of the most modern transportation infrastructure going up not only in China, but around the developing world, is deliberately linked to China. It is meant to make the global economy a friendly place for Chinese commerce.

That does not make China’s ambitions necessarily menacing or pernicious. But it does make them China-centric. It’s worth remembering that this way of doing economic development is not a Chinese invention. As Michael Pillsbury, author of “The Hundred Year Marathon,” tells Quartz, China’s ambitions are rooted in “a fierce sense of competitiveness which they claim they learned from the America of the 1800s.”
________
What’s The Most Common Language In The World?
Further reading:

China Quietly Prepares Golden Alternative to Dollar System

Chinese bank to buy $90bn gold vault in London

Going for Gold: Russia, China Ditch Billions of Dollars for Prized Bullion
Posted 4 days ago by tokyowashi
6 View comments
May
18
#2673: How Clinton Frags The Navy – JonBenet’s Santa Skull Cap – Serco 8(a) Companies In Zulu Pentagon Coup
by
United States Marine Field McConnell
Plum City Online – (AbelDanger.net)
May 17, 2016

1. Abel Danger (AD) claims that patent lawyer Hillary Clinton and the U.S. Secretary of the Navy outsourced a patent pool of fragmentation, delivery and onion router (Tor) devices for use by the murderers of JonBenet Ramsey on Christmas Day 1996, the bombers of the USS Cole in Aden Harbor on October 12, 2000 and the fraggers of the U.S. Navy Command Center on 9/11.

2. AD claims John Dalton, former Secretary of the Navy (’93-’98) and former Stephens Inc banker, used Tor to transmit images of a Norad Santa skull capping of JonBenét Ramsey on Christmas Day 1996 and blackmail or extort her father John Ramsey into a terrified silence re alien sleeper cells and qui tam procurement frauds in the $4.3 billion Pentagon Renovation Program.

3. AD claims that former Secretary of the Navy (’01 – ’03) Gordon England used Tor devices with Zulu timing signals to coordinate an attempted coup d’état by Serco’s 8(a) companies in the 9/11 fragging attacks on the Pentagon’s U.S. Navy Command Center.

4. United States Marine Field McConnell invites James Comey – FBI director and former director of Serco banker HSBC – to investigate Clinton’s apparent role in the murder of JonBenét Ramsey in 1996, the suicide of Colin McMillan in 2003 and the fragging of U.S. Navy Command on 9/11 (http://www.abeldanger.net/2010/01/field-mcconnell-bio.htm)

Note JonBenet’s father received a $118,000 Christmas bonus as CEO of the Lockheed Martin-subsidiary Access Graphics for work on the Pentagon Renovation Program. LM directors in 1996 included Lynne Cheney and Norman Mineta – apparently pre-positioned in Zulu time in the PEOC for a Serco 8(a) coup d’etat on 9/11.
Long range Navy fragging by Tor.

Note detonation of what appears to be a dial-a-yield fragmentation bomb at the Pentagon’s US Navy Command Center on 9/11 – NOTE THE CLINTON PATENT SIGNATURE: ZULU SYNCHRONIZATION, NO BIG DEBRIS AND NO AUTOPSIES.

White’s Club death-bet bookmaker services dates back to 1743 and – as Cameron’s friend, Churchill’s grandson and Serco CEO Rupert Soames well knows – only the technology to spot fix the precise time of death has changed.

Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders!
(Mobile Playback Version)

Serco’s National Visa Center

[Serco’s] Defense Ammunition Center

Serco… Would you like to know more?

“9/11 — An Inside Job”
by Paul Andrew Mitchell, B.A., M.S., Private Attorney General, 18 U.S.C. 1964 (3/18/2010) …
One USAF pilot I know told me that Captain Gerald F. DeConto was on the telephone to Gordon England, Secretary of the Navy, requesting authorization to engage the incoming, because the Pentagon’s automatic fire control system had been fooled by a “friendly” transponder beacon.

http://www.arlingtoncemetery.net/gfdeconto.htm

As the highest ranking officer in the Naval Command Center, DeConto and his staff must have been tracking that incoming on their in-house radar systems, and realized that the incoming jet had a friendly transponder, because the fire control system had NOT activated itself.

While England kept Captain DeConto on the telephone, evidently stalling him, DeConto and his staff were killed by the missile warhead and subsequent impact of the A-3.

The Boeing 757 seen by many eyewitnesses was timed to fly over the Pentagon at precisely the moment of the A-3’s impact. It landed at National, into the waiting arms of 94 ground crew who had infiltrated Dulles and National airports.

They were later deported for falsifying Social Security applications and violating immigration laws”

“Onion routing was developed in the mid-1990s at the U.S. Naval Research Laboratory by employees Paul Syverson, Michael G. Reed, and David Goldschlag[2][3] to protect U.S. intelligence communications online.[4] It was further developed by the Defense Advanced Research Projects Agency (DARPA) and patented by the Navy in 1998.[3][5][6]

Computer scientists Roger Dingledine and Nick Mathewson joined Syverson in 2002 to develop what would become the largest and best known implementation of onion routing, Tor, then called The Onion Routing project or TOR project. After the Naval Research Laboratory released the code for Tor under a free license,[4][7][8] Dingledine, Mathewson and five others founded The Tor Project as a non-profit organization in 2006, with the financial support of the Electronic Frontier Foundation and several other organizations.[9][10]”

“November 30, 2015 RESTON, VA – November 30, 2015 – Serco Inc., a provider of professional, technology, and management services, announced today the Company has been awarded a patent classification services contract with the United States Patent and Trademark Office (USPTO). Serco will provide initial patent classification and reclassification services to support USPTO’s core mission of examining, granting, and disseminating patents and trademarks. The recompete contract has a one-year base period with four one-year option periods, and is valued at $95 million over the five-year period, if all options and award terms are exercised.”

“A Tor of the Dark Web (slifty.com) Yes, I know I shouldn’t say it out loud, but here I am saying it (take me, Police) – out of curiosity, I went to Hard Candy section of The Hidden Wiki. (Yes, it is exactly what you would think it is.) GOD.

There are seriously forums full of pedofiles sharing pictures and – maybe worse? – their stories and wisdoms. Maybe out of utter fascination, I spend about few hours on there and I felt like I want to murder all humanity. On one of these forums, there was this alleged “doctor”, who advised people, from what age you can have sex with your children without their doctor to notice. Tips how to kidnap young children. The worst thing was that I just knew that – if they don’t do something stupid – they are basically untracable and uncatchable, while I would simply want to catch them all and kill them one by one. (I am sorry for being so expressive.)

There were also some picture forums but really I couldn’t stand that, I just wanted to vomit while I was shaking. I… am not sure why I am writing this. I am all for Tor. But we have to admit – when everything is allowed and anonymous, EVERYTHING is allowed and anonymous. And the dark parts of humanity flow on top. Drug markets, weapon markets, assassin markets (although I don’t know how sersiously to take those), terrorist websites, child porn websites.

But – as hard it is for me to say it – to see that the seriously f…d up child molesters are freely allowed to say really anything there and noone has a chance to catch them just shows that Tor is really anonymous and safe.

edit: I do not know if The Hidden Wiki is still operating, if the dark places I visited are still operating, it is about one year and I did not feel any urge to revisit it again.”

“John Howard Dalton (born December 13, 1941) is a U.S. administrator and banker. Dalton was Secretary of the Navy from July 22, 1993 to November 16, 1998.

Education and Navy service[edit]

Dalton attended Louisiana State University for a year before transferring to the U.S. Naval Academy. He graduated with distinction from Annapolis in 1964 and was a finalist in the Rhodes Scholarship competition. After graduating from Annapolis, Dalton served in the Navy from 1964 to 1969. During the that time he received naval nuclear power training and served aboard the submarines USS Blueback (SS-581) as the Supply and Commissary Officer and USS John C. Calhoun (SSBN-630) as the Main Propulsion Assistant, Communications Officer and Weapons Officer. He attained the rank of lieutenant while on active duty and was promoted to Lieutenant Commander while in the U.S. Naval Reserve.

Business career[edit]

After leaving the Navy, Dalton ran the San Antonio, Texas office of the Little Rock, Arkansas-based Stephens Inc. investment banking firm. Prior to his employment at Stephens Inc., he was Managing Director of Best Associates and Mason Best Company, merchant banking firms headquartered in Houston and Dallas respectively. In 1971, Dalton received a Master of Business Administration degree from the Wharton School of the University of Pennsylvania.

From 1984 to 1988, Dalton served as Chairman and Chief Executive Officer of Freedom Capital Corporation in San Antonio, and President of the Sequin Savings Association. Prior to this position, he was President of the Real Estate Division of the Gill Companies of San Antonio. President Carter nominated Dalton to the Federal Home Loan Bank Board in December 1979, where he served as a member and chairman until July 1981. Dalton was President of the Government National Mortgage Association of the U.S. Department of Housing and Urban Development before being appointed to the Bank Board. He began his public service career after serving with the investment banking firm of Goldman, Sachs & Company in Dallas, Texas.

Since January 2005, Dalton has been President of the Housing Policy Council at The Financial Services Roundtable.[1]

“The term fragging is used to describe the deliberate killing or attempted killing by a soldier of a fellow soldier, usually a superior officer or non-commissioned officer. The word was coined by military personnel of the United States during the Vietnam War, when such killings were most often attempted with a fragmentation grenade,[2] sometimes making it appear as though the killing was accidental or during combat with the enemy. The term fragging is now often used to encompass any means used to deliberately and directly cause the death of military colleagues. The high number of fragging incidents in the latter years of the Vietnam War were symptomatic of the unpopularity of the war with the American public and the breakdown of discipline in the U.S. Armed Forces. Documented and suspected fragging incidents totaled nearly nine hundred from 1969 to 1972. Fragging has not been as frequent since the Vietnam War ended.”

“John Bennett Ramsey (born December 7, 1943) is an American business man, author, and father of homicide victim JonBenét Ramsey. He was the first to discover JonBenét’s body in the wine cellar of the Ramseys’ 15-room home in Boulder, Colorado, on December 26, 1996, just hours after her murder on Christmas Day. Ramsey was born in Lincoln, Nebraska, to Mary Jane (née Bennett) and James Dudley “Jay” Ramsey.[1] He graduated from Michigan State University. In 1966 Ramsey joined the Navy, serving as a Civil Engineer Corps officer in the Philippines, for three years, and in an Atlanta reserve unit for an additional eight years.[2] He holds a pilot’s license and owns two planes.[3]”
“In 1989, [Ramsey] formed the Advanced Product Group, one of three companies that merged to become Access Graphics. He became president and chief executive officer of Access Graphics, a computer services company and a subsidiary of Lockheed Martin.[6] In 1996, Access Graphics grossed over $1 billion, and he was named “Entrepreneur of the Year” by the Boulder Chamber of Commerce. Immediately following the murder of his daughter he was “temporarily replaced so the company did not have to bother him about business matters as he grieved”, according to Lockheed Martin spokesman Evan McCollum.[7]

Ramsey soon left his job to move his family to Michigan, where he joined another computer company. Access Graphics was later sold to General Electric in 1997.

His net worth was reported at $6.4 million as of May 1, 1996.”

“Gerald Seltzer Project Manager at Lockheed Martin Information Technology
Glenn Dale, Maryland Information Technology and Services
Previous Lockheed Martin Information Technology, US Army
Pentagon Renovation September 1995 – August 2014
It was the largest renovation ever undertaken in the United States. Approximately 25,000 people worked within the Pentagon’s thick walls. In addition, when the renovation was completed, PENREN/C would have been funded $1 billion to strengthen the survivability of the IT infrastructure throughout the Pentagon, including half that amount to create the Command Communication Survivability Program (CCSP). The CCSP’s goal was to ensure the networks, voice, mainframe and messaging systems were more survivable if another event like 9-11 were to happen. Once the design phase was completed, Electronic Data Systems, Lockheed Martin and General Dynamics contractors began building and implementing the plans created by the CCSP. It would take 10 years to complete this project.”

“SUNDAY, JANUARY 31, 2010
QRS-11—Quartz Rate Sensor
The QRS-11 GyroChip sensor is used on commercial aircraft to rotate the antenna to receive signals from satellites for the in-flight entertainment system, radar tracking and flight controls. If the aircraft is equipped with an uninterruptable autopilot, signals can be received from a satellite to remotely fly the aircraft.

The sensor provides stabilization, flight control, and guidance. It also is used in missiles, Unmanned Aerial Vehicles (UAV ) and other military as well as space and industrial applications. Because of the sensitive nature of its military applications, the export of the technology is regulated.

We allege that the QRS-11 can be used as part of a package of technology to guide aircraft equipped with uninterruptable autopilots turning them into weapons.

We believe that the patent for the device was originally obtained by the Rose Law Firm of Little Rock, AR, specifically by patent lawyer Hillary Clinton, for BEI Technologies, Inc. headquartered at that time in Arkansas.

BEI has diversified many times since then and the QRS-11 is now Manufactured by CST Systron Donner Inertial.”

“Controlled fragmentation of multi-walled warheads
US 3566794 A
Publication number: US3566794 A
Publication type: Grant
Publication date:2 Mar 1971
Filing date: 26 Nov 1958
Priority date: 26 Nov 1958
Inventors: Carlisle Richard T, Pearson John, Sewell Robert G S
Original Assignee: US Navy
Export Citation: BiBTeX, EndNote, RefMan
Patent Citations (3), Non-Patent Citations (1), Referenced by (18), Classifications (5)

CONTROLLED FRAGMENTATION 01F MULTI-WALLED WARI’IEADS
The invention herein described may be manufactured and used by or for the Government of the United States of America for governmental purposes without the payment of any royalties thereon or therefor. This invention relates to explosive warheads; more specifically it relates to fragmentation warheads for antipersonnel use. This application is similar to application Ser. No. 582,896, filed 4 May 1956, but goes beyond the scope of said application in applying the teachings thereof to multiwalled warhead casings.

Prior attempts at fragmentation control in impulsively loaded bodies such as warheads have generally involved the cutting of grooves on the surfaces, both inner and outer, of such bodies or the placing of plastic liners of predetermined shape between the inner surfaces of such bodies and the explosives contained therein. Such practices produced local regions of high stress which initiated points of fracture, but complete fragmentation control did not result therefrom.

As pointed out in the aforementioned application fragmentation is a function of wall thickness as well as the groove pattern. Applicants have discovered that further control of fragmentation may be attained by utilizing a plurality of walls in the warhead casing, by cutting grooves on the inner surface of each such wall, and by the orientation of the groove patterns so cut on the walls.

Accordingly, it is an object of this invention to provide a method for closer control of the fragmentation of impulsively loaded bodies than the methods of the prior art.

Another object is to produce a greater number of lethal fragments from a given mass of metal through the elimination of very large fragments and very fine ones. Applicants believe that fragments ranging from one-half to 4 grams are the most lethal against personnel and light military equipment.”

“Digital Fires Instructor Serco – Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”

“The Lewes bomb was a blast-incendiary field expedient explosive device, manufactured by mixing diesel oil and Nobel 808 plastic explosive. It was created by Lieutenant Jock Lewes, one of the original members of L Detachment SAS in 1941. The SAS needed a combined incendiary and explosive device light enough to be carried by a small group of commandos yet powerful enough to destroy and set fire to aircraft on an enemy airfield. Weighing approximately 1 pound (0.45 kg), the Lewes Bomb could be carried in quantity by an individual.

The only available bomb at the time was too cumbersome to be carried by a paratrooper. Lewes experimented with various types of incendiary and explosive materials, using trial and error. The final design used a pound of plastic explosive, mixed with a quarter pound of thermite and a small amount of diesel oil. Inside the mass was inserted a 2 ounce dry gun cotton booster, plus a detonator attached to a thirty-second fuse. Alternatively, Lewes bombs could be triggered by pencil detonators or booby-trap firing devices such as pressure release switches.”

“Serco do a bunch more that didn’t even make our story: As well as thanking God for his success, CEO Chris Hyman is a Pentecostal Christian who has released a gospel album in America and fasts every Tuesday. Amazingly, he was also in the World Trade Centre on 9/11, on the 47th floor addressing shareholders [including Bilderberg bankers such as HSBC and the Rockefeller-controlled JP Morgan Chase] Serco run navy patrol boats for the ADF, as well as search and salvage operations through their partnership with P&O which form Defence Maritime Services. Serco run two Australian jails already, Acacia in WA and Borallon in Queensland. They’re one of the biggest companies In the UK for running electronic tagging of offenders under house arrest or parole.”

“Origins of the Bilderberg meetings .. The immediate chain of events leading to the setting up of the first conference was as follows. Prince Bernhard set off for the USA in 1952 to visit his old friend Walter Bedell Smith, director of the newly-formed CIA. Smith put the organisation of the American end into the hands of Charles D. Jackson (special assistant for psychological warfare to the US President), who appointed John S. Coleman (president of the Burroughs Corporation. and a member of the Committee for a National Trade Policy), who in turn briefly became US chair of Bilderberg.

Charles Jackson was president of the Committee for a Free Europe (forerunner of the Congress for Cultural Freedom (CCF) whose extensive operations financing and organising anti-Communist social democratic political intellectuals has only recently been fully documented (see Coleman 1989); and ran the CIA-financed Radio Free Europe in Germany. Earlier he had been publisher of Fortune magazine and managing director of Time/Life, and during the war was deputy head of psychological warfare for Eisenhower. At the time of Bernhard’s visit he was working with a committee of businessmen on both sides of the Atlantic which approved the European Payments Union.

It was thus a European initiative, and its aim was, in official bland language, to ‘strengthen links’ between Western Europe and the USA. A selected list of people to be invited to the first conference was drawn up by Retinger, with Prince Bernhard and Rijkens, from the European countries of NATO plus Sweden. The resulting group consisted of the Belgian and Italian prime ministers, Paul van Zeeland and Alcide de Gasperi (CDU), from France both the right wing prime minister Antoine Pinay and the Socialist leader Guy Mollet; diplomats like Pietro Quaroni of Italy and Panavotis Pipinelis of Greece; top German corporate lawyer Rudolf Miller and the industrialist Otto Wolff von Amerongen and the Danish foreign minister Ole Bjorn Kraft (publisher of Denmark’s top daily newspaper); and from England came Denis Healey and Hugh Gaitskell from the Labour Party, Robert Boothby from the Conservative Party, Sir Oliver Franks from the British state, and Sir Colin Gubbins, who had headed the Special Operations Executive (SOL) during the war [and introduced the 8(a) Zulu bomb to the Billderberg]”

“Serco farewell to NPL after 19 years of innovation
8 January 2015
Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco’s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry. Some of the key achievements during that time have been:… It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade….

NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading in the City through NPLTime”

“Support Services for Starwood Hotels Group Starwood Hotels Group, owner of some of the [Innholders] world’s most prestigious hotels, has appointed Serco as preferred bidder for a £7m contract to provide a range of support services to the Sheraton Grand in Edinburgh, the Westin in Dublin and the 5 star Turnberry resort on Scotland’s west coast. The contract, which has a 5 year term, is an extension to services already provided to other [Innholders] hotels in the Starwood Group and includes buildings maintenance and security, engineering support and [WiFi] help desk services.”

“Loan Improvement
Jan 31, 2001
SBA modernizes to help feed its growing programs [Field McConnell’s sister Kristine Marcy introduced the 8(a) electronic accelerated loan guarantee program at SBA to ensure funding for the Serco protégés’ participating in the 9/11 carbon cap] BY PATRICIA DAUKANTAS | GCN STAFF Under a five-year plan for overhauling its information technology systems, the Small Business Administration recently acquired new software for financial and other administrative tasks.

By the time SBA celebrates its 50th anniversary in 2003, agency officials want all their programs up and running around the clock, chief financial officer Joseph Loddo said.

In the first phase of the modernization, the agency has upgraded systems for managing its extensive portfolio of guaranteed loans, chief operating officer Kristine Marcy said.

SBA processed its first electronic loan last November through its Sacramento, Calif., office and plans to add more private lenders during fiscal 2001.

The agency’s staffing level has dropped 22 percent over the past eight years, which is another reason to improve IT, Marcy said. Over the past decade, SBA’s portfolio of loans to small and disadvantaged businesses has more than doubled to $50 billion.

‘We’re a small agency with a huge portfolio,’ Marcy said. SBA supplies more than half of the U.S. venture capital available each year.

Seventy percent to 80 percent of the loans are booked through a preferred lender program [structured by Serco], which involves nearly 7,000 banks, Marcy said. SBA guarantees the loans, just as the government backs student and housing loans.

‘The financial and IT businesses were changing so rapidly, we had to make some changes to stay current with the private sector,’ Marcy said. Banks had been asking SBA to make faster decisions on loan guarantees. The agency decided to aim for a turnaround time of one hour.”

“BASE ONE CERTIFICATIONS Base One [a Serco protégé company] is NO longer an 8(a), or HubZone certified company. Base One is a Small Business and a Women Owned Small Disadvantaged Business. Base One previously held certifications by the SBA. Please disregard any references to Base One being currently certified as an 8(a) or HubZone firm by the SBA.

Base One Technologies

Expertly researches, designs, and develops information security policies that protect your data and manage your firm’s information technology risk at levels acceptable to your business.

Performs architectural assessments and conducts both internal and external penetration testing. The results of these efforts culminate in an extensive risk analysis and vulnerabilities report.

Develops and implements multi-layer Information Security Solutions, practices and procedures. We deploy Intrusion Detection Systems (IDS) and IP Security with VPN solutions using Cisco routers, Frame Relay, firewalls, address and port translation, obscurity standards and authentication technologies (AAA, 3DES, TACACS, etcŠ), to enhance and meet the level of Data Security required for global organizations.

Conducts IT Security and Risk Assessment in Federal government as well as security testing, implementing security for multiple platforms and operating systems around the world.

Ability to conduct business process analysis to provide technical security countermeasures, risk management and data communications security planning for large organizations.

Provides computer security integration for web server and traditional client-server based applications. We secure environments up to as many layers as required by our clients’ policies, industry practices, and regulating bodies – including the desktop and user experience as required. Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions.”
“Preparing the 8(a) application package

You do not need to pay anyone to prepare your 8(a) application. SBA designed the application forms so the applicant can complete the application. However, a consultant can assist in completing the application. Please be advised that no one can guarantee that an application for 8(a) program participation will be approved. The application process is intended to assure that each applicant receives a fair, unbiased review, free from favoritism and influence. Any irregularities in the application review process should be immediately referred to the SBA Inspector General.

Definition of Socially and Economically Disadvantaged Individuals

Socially disadvantaged individuals are those who have been subjected to racial or ethnic prejudice or cultural bias because of their identities as members of groups without regard to their individual qualities. The social disadvantage must stem from circumstances beyond their control. In the absence of evidence to the contrary, the following individuals are presumed to be socially disadvantaged:

Black Americans; Hispanic Americans (persons with origins from Latin America, South America, Portugal and Spain); Native Americans (American Indians, Eskimos, Aleuts, and Native Hawaiians); Asian Pacific Americans (persons with origins from Japan, China, the Philippines, Vietnam, Korea, Samoa, Guam, U.S. Trust Territory of the Pacific Islands [Republic of Palau], Commonwealth of the Northern Mariana Islands, Laos, Cambodia [Kampuchea], Taiwan, Burma, Thailand, Malaysia, Indonesia, Singapore, Brunei, Republic of the Marshall Islands, Federated States of Micronesia, Macao, Hong Kong, Fiji, Tonga, Kiribati, Tuvalu, or Nauru); Subcontinent Asian Americans (persons with origins from India, Pakistan, Bangladesh, Sri Lanka, Bhutan, the Maldives Islands or Nepal); And members of other groups designated from time to time by the SBA.

In addition, an individual who is not a member of one of the above-named groups may apply for 8(a) certification. However, the applicant must establish social disadvantage on the basis of clear and convincing evidence.

Economically disadvantaged individuals are socially disadvantaged individuals whose ability to compete in the free enterprise system has been impaired due to diminished capital and credit opportunities, as compared to others in the same or similar line of business and competitive market area who are not socially disadvantaged. For purposes of program entry, an individual whose personal net worth (excluding the equity in their personal residence and business) exceeds $250,000 will not be considered economically disadvantaged.
Woman-Owned Businesses [Obama’s structural feminists]

A woman-owned business may be recognized as a “socially disadvantaged firm” if the owner is a member of one of the groups for which social disadvantage is presumed. If the woman is not a member of one of the groups for which social disadvantage is presumed, she must establish her individual disadvantage on the basis of clear and convincing evidence that she has suffered discriminatory treatment because of her gender and that this treatment has impeded her entry into or advancement in the business world. SBA will consider any pertinent evidence but will give particular attention to evidence of discriminatory practices suffered in the areas of education, employment and the business world.”
Yours sincerely,
Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222

David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation
Posted 5 days ago by tokyowashi
0 Add a comment

Loading

About Looking Back Woman-Suzanne Dupree

Tetuwan Lakota scholar, educator, historian, Sun Dance participant, Cannunpa carrier, cultural & spiritual preservationist, journalist-writer and fraud investigator.
This entry was posted in SPIRITUAL AWAKENING. Bookmark the permalink.

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s