Posted: 23 May 2015 09:19 PM PDT
This news story
appeared at Yahoo
Sliver of Clinton emails hint at lingering political trouble
WASHINGTON (AP) — Former Secretary of State Hillary
Rodham Clinton received information on her private email account about
the deadly attack on U.S. diplomatic facilities in Benghazi that was
later classified "secret" at the request of the FBI, underscoring
lingering questions about how responsibly she handled sensitive
information on a home server.
The nearly 900 pages of her correspondence released Friday are only a
sliver of the more than 55,000 pages of emails Clinton has turned over
to the State Department, which had its plan to release them next January
rejected this week by a federal judge.
Instead, the judge ordered the agency to conduct a
"rolling production" of the records. Along with a Republican-led House
committee investigating the Benghazi attacks, the slow drip of emails
will likely keep the issue of how Clinton, the front-runner for the 2016
Democratic presidential nomination, used a personal email account while
serving as the nation's top diplomat alive indefinitely.
Committee Chairman Trey Gowdy, R-S.C., said that the released emails
were incomplete, adding that it "strains credibility" to view them as a
thorough record of Clinton's tenure.
The prospect for political complication in Clinton's choice to use a
personal email account, rather than one issued by the government, was
evident in the messages released Friday. They included several that were
deemed sensitive but unclassified, contained details about her daily
schedule and held information — censored in the documents as released —
about the CIA that the government is barred from publicly disclosing.
Taken together, the correspondence provides examples of material
considered to be sensitive that Clinton received on the account run out
of her home. She has said the private server had "numerous safeguards."
Campaigning in New Hampshire, Clinton said Friday she was aware that the
FBI now wanted some of the email to be classified, "but that doesn't
change the fact all of the information in the emails was handled
appropriately."
Asked if she was concerned it was on a private server, she replied, "No."
State Department spokeswoman Marie Harf said, "It was not classified at
the time. The occurrence of subsequent upgrade does not mean anyone did
anything wrong."
It's not clear if Clinton's home computer system used encryption
software to communicate securely with government email services. That
would have protected her communications from the prying eyes of foreign
spies, hackers, or anyone interested on the Internet.
Last year, Clinton gave the State Department 55,000 pages
of emails that she said pertained to her work as secretary sent from
her personal address. Only messages related to the 2012 attacks on the
U.S. diplomatic post in Benghazi, Libya, that killed four Americans,
including U.S. Ambassador Christopher Stevens, were released by the
department on Friday. The 296 emails had already been turned over to the
House Benghazi committee.
A Nov. 18, 2012, message about arrests in Libya was not classified at
the time, meaning no laws were violated, but was upgraded from
"unclassified" to "secret" on Friday at the request of the FBI to redact
information that could contain information damaging to national
security or foreign relations.
Twenty-three words were redacted from the message, which
detailed reports of arrests in Libya of people who might have
connections to the attack, Harf said.
The redacted portion appears to relate to people who provided
information about the alleged suspects to the Libyans. That part of the
email had been categorized by the State Department as "NOFORN," meaning
that foreign nationals weren't allowed to read it, including close U.S.
allies.
The message, originally from Bill Roebuck, then director of the Office
of Maghreb Affairs, was forwarded to Clinton by her deputy chief of
staff, Jake Sullivan, with the comment: "fyi."
No other redactions were made to the collection of
Benghazi-related emails for classification reasons, officials said. They
added that the Justice Department had not raised classification
concerns about the now-redacted 1 1/2 lines in the Nov. 18 email when
the documents were turned over to the Benghazi committee. The committee
retains an unredacted copy of the email, the officials said.
Clinton also appeared to send and receive protected
information about the CIA, which was withheld on Friday because the
State Department said federal law prevented its disclosure. The
department did not offer a detailed description of what it was
withholding, such as a name or other sensitive information.
A number of the messages were marked with codes indicating that the
information had been censored for reasons related to the U.S.
intelligence community, law enforcement or personal privacy — a process
that happened after they'd already been circulated through Clinton's
home server.
Much of the correspondence concerned the mundane matters of high-level
government service, press clippings, speech drafts, and coordination of
calls with other top officials as well as chit-chat about shopping
between Clinton and top aide Huma Abedin.
"What a wonderful, strong and moving statement by your boss," Christian
Brose, a top adviser to Sen. John McCain, writes in an email to
Sullivan, forwarded to Clinton just after Stevens' death. "Please tell
her how much Sen. McCain appreciated it. Me too."
There are repeated warnings of the unrest in Libya, though Clinton has
said she was never personally involved in questions of security in
Benghazi before the attack. One message describes a one-day trip by
Stevens in March 2011 to "get a sense of the situation on the ground"
and prepare for a 30-day stay in the future. A request for Defense
Department support was made, the email adds, but no approval had yet
been received. Stevens was killed in Benghazi on Sept. 11, 2012.
As early as April 2011, Clinton was forwarded a message sent to her
staff that the situation in the country had worsened to the point "where
Stevens is considering departure from Benghazi," The email was marked
"Importance: High."
___
Associated Press writers Matthew Daly, Stephen Braun and
Eileen Sullivan in Washington and Ken Thomas in Hampton, New Hampshire,
contributed to this report.

Posted: 23 May 2015 01:39 PM PDT
Plum City - (AbelDanger.net):
United States Marine Field McConnell is ready to brief the Joint Chiefs
of Staff (JCS) for a proper response to the 8(a) onion router (
Tor) attack on the CIA annex in Benghazi on 9/11/12 when Hillary Clinton allegedly used a stand-down server before
Serco digital fires killed former U.S. Navy SEALs Tyrone Woods and Glen Doherty.
Serco in Action - International Fire Training Centre
SBA offers 60 minute loan approval for 8(a)
participants in 9/11 and
JADE HELM war games!
McConnell is switching to a more military decision-briefing style to help the Joint Chiefs respond to
8(a) enemies in the Obama cabinet who use
Tor and
Serco digital fires to execute preliminary-force deployment plans in less than one hour.
McConnell notes that in 1998, his sister Kristine Marcy,
the former chief operating officer of the Small Business Administration
(SBA), launched a 60-minute loan guarantee system for
JADE -- Joint
Assistant for Development and Execution -- to synchronize stand-down
commands and war-fighting operations across the SBA's 8(a)
Tor networks.
"Digital Fires Instructor Serco - Camp Pendleton, CA
Posted 377 days ago Uses information derived from all military
disciplines (e.g., aviation, ground combat, command and control, combat
service support, intelligence, and opposing forces) to determine changes
in enemy capabilities, vulnerabilities, and probable courses of
action."
"We need to have an answer of when the secretary of defense had assets that he could have begun spinning up.
Why there was not one order given to turn on one Department of Defense
asset? I have my suspicions, which is Secretary Clinton told Leon
[Panetta] to stand down, and we all heard about the stand-down order for
two military personnel. That order is undeniable. They were told not to
get on — get off the airplane and kind of stand by — and they're going
to characterize it wasn't stand down. But when we're done with Benghazi,
the real question is, was there a stand-down order to Leon Panetta or
did he just not do his job? Was there a stand-down order from the
president who said he told them to use their resources and they didn't
use them? Those questions have to be answered." — Rep. Darrell Issa
(R-Calif.), remarks during a GOP fundraising dinner, Concord, N.H., Feb.
17, 2014"
"5:15 a.m. (11:15 p.m. ET): The U.S.
Regional Security Office in Tripoli gets a phone call from an
Arabic-speaking source who says a Westerner has been found in Benghazi
and is perhaps at a hospital. It's believed to be Ambassador Stevens. Transfer to airport is arranged
[By 8(a) Tor team to remove evidence of snuff film backhauled to members of Obama cabinet]
.
At around the same time, the additional
security team finds transportation from the airport under the escort of
the Libyan Shield, another local militia, but decides to head to the
annex after learning that Stevens was almost certainly dead. Just after
their arrival, the annex takes mortar fire, sustaining three direct
hits. The precision of the attacks indicates a level of sophistication
and coordination
[Serco digital fires]
Former U.S. Navy SEALs Tyrone Woods and
Glen Doherty are killed in the mortar assault, which lasts just 11
minutes before dissipating; a DS agent and annex security member are
severely wounded."
"Internal emails show Clinton got detailed intel on 'planned' Benghazi hit
Published May 22, 2015 WASHINGTON – Internal State
Department emails in the aftermath of the Benghazi terror attack show
then-Secretary of State Hillary Clinton received detailed information
indicating the strike was planned by well-trained fighters, yet her
office continued to push the narrative days later that it began
"spontaneously."
The messages were among 296 emails released Friday by
the State Department, in the first batch of emails to be made public
from Clinton's tenure as secretary of state. Totaling 896 pages, the
emails show a series of Libya dispatches Clinton received from a
confidant
[8(a) agent Huma Abedin]
, as well as the barrage of messages among her and her aides after Sept. 11, 2012.
Those messages depict the rapidly changing
understanding of what happened at the U.S. compound that night, and the
administration's internal struggle to settle on a public narrative.
As previously reported, confidant Sidney Blumenthal
fired off two memos in the two days after the attack. But the full email
release shows he gave a highly detailed picture of what "sources" said
had happened that night. Initially, on Sept. 12, he sent Clinton an
email linking the attacks to anger over an anti-Islam Internet video
which had triggered protests across the region.
CLICK TO READ THE EMAILS.
But the next day, he sent Clinton an email with very
different information, saying officials believed the attackers were with
the Islamist militia Ansar al-Sharia. He wrote that officials thought
the attackers "prepared" for the strike and "took advantage of the
cover" from demonstrations over the video. Further, he cited sources
saying roughly 21 fighters left from a
[8(a)]
base in East Benghazi and "infiltrated the crowd" and
began opening fire on the U.S. consulate. Libyan officers, he wrote,
said the attacks were "planned" for roughly one month."
"JADE's
purpose is "to assist in the development of force packages… that need
to be deployed to some location in support of… warfighting." With JADE
software, military planners can build a preliminary force deployment
plan in less than one hour. If there are changes to the plan, such as
change in geography or territory, the program quickly generates another
plan. In other words, it has the flexibility to complete the original
plan with new parameters."
"HOW TOR ENABLED SILK ROAD Central to the operation of Silk Road was a complex underground computer routing system known as Tor. Ulbricht
allegedly used the system to hide the location of the computer servers
that hosted the Silk Road website. But Tor is no secret, especially to
the U.S. government. The U.S. Naval Research Lab developed onion
routing, the concept behind Tor, as a
way to protect naval communication so an enemy could not trace computer
messages and detect a ship's position. Every computer on the Internet
has an Internet Protocol, or IP, address that can be used to find its
physical location. Tor ensures
privacy by randomly routing computer messages through several places on
the Internet, wrapped in layers of encryption, so no single point can
link the source to the destination. .. Tor also
hosts black markets, such as Sheep Marketplace and Black Market
Reloaded, that deal in guns, drugs, stolen credit card numbers and child
pornography. The United States seeks the extradition of Eric Marques,
who was arrested in Ireland for allegedly hosting a website on the Tor network that allowed people to share child pornography. Silk Road created a private network through Tor
by using software to build encrypted connections through relays on the
network. The system is created so no single relay, or server, knew the
complete path. A computer algorithm on Tor
generates a complex Web address that ends in .onion and can be accessed
only by downloading Tor software. … DEA agents learned of Silk Road
within months after it went online. In June 2011, Sen. Charles Schumer,
D-N.Y., called on federal agents to investigate it. Court papers
indicate federal agents began making hundreds of undercover purchases
from the site in November 2011."
"The
8(a) Business Development Program assists in the development of small
businesses owned and operated by individuals who are socially and
economically disadvantaged, such as women and minorities. The
following ethnic groups are classified as eligible: Black Americans;
Hispanic Americans; Native Americans (American Indians, Eskimos, Aleuts,
or Native Hawaiians); Asian Pacific Americans (persons with origins
from Burma, Thailand, Malaysia, Indonesia, Singapore, Brunei, Japan,
China (including Hong Kong), Taiwan, Laos, Cambodia (Kampuchea),
Vietnam, Korea, The Philippines, U.S. Trust Territory of the Pacific
Islands (Republic of Palau), Republic of the Marshall Islands, Federated
States of Micronesia, the Commonwealth of the Northern Mariana Islands,
Guam, Samoa, Macao, Fiji, Tonga, Kiribati, Tuvalu, or Nauru);
Subcontinent Asian Americans (persons with origins from India, Pakistan,
Bangladesh, Sri Lanka, Bhutan, the Maldives Islands or Nepal). In 2011,
the SBA, along with the FBI and the IRS, uncovered a massive scheme to
defraud this program. Civilian employees of the U.S. Army Corps of
Engineers, working in concert with an employee of Alaska Native Corporation Eyak Technology LLC allegedly submitted fraudulent bills to the program, totaling over 20 million dollars, and kept the money for their own use.[26] It also alleged that the group planned to steer a further 780 million dollars towards their favored contractor.[27]"
"The following positions have the status of Cabinet-rank:
White House Chief of Staff
Denis McDonough
Environmental Protection Agency
Administrator Gina McCarthy
epa.gov
Office of Management & Budget
Director Shaun L.S. Donovan
whitehouse.gov/omb
United States Trade Representative
Ambassador Michael Froman
ustr.gov
United States Mission to the United Nations
Ambassador Samantha Power
usun.state.gov
Council of Economic Advisers
Chairman Jason Furman
whitehouse.gov/administration/eop/cea
Small Business Administration Administrator
[of 8(a) Tor stand down and Serco digital fires network]
Maria Contreras-Sweet sba.gov"
McConnell can brief the Joint Chiefs on the likely locations of 8(a)
Tor servers used to synchronize stand-down digital-fire attacks on the U.S. East African Embassies (August 7, 1998); the USS
Cole (12 October 2000); the Pentagon's U.S. Navy Command Center (cf. 9/11 but
Serco clock on September 12, 2001 at 17:37:19!) and the CIA Annex in Benghazi (9/11/12).
Prequel 1: #2357: Marine Links MoD Al Qaeda Stand-Down Server To Serco 8(a) Digital Fires With Assange Hack Of Joint Chiefs' Tor
Serco... Would you like to know more?
SWISSLEAKS - "HSBC developed dangerous clients:
arms merchants, drug dealers, terrorism financers"
Copy of SERCO GROUP PLC: List of Subsidiaries AND Shareholders! (Mobile Playback Version) [HSBC is Serco's
drug-hub Silk Road banker and a major shareholder with the 8(a) 9/11
instant lenders including, Her Majesty's Government and JPMorgan]
"Digital Fires Instructor Serco - Camp Pendleton, CA Posted
377 days ago Uses information derived from all military disciplines
(e.g., aviation, ground combat, command and control, combat service
support, intelligence, and opposing forces) to determine changes in
enemy capabilities, vulnerabilities, and probable courses of action.
•Works directly with customers and team members to determine project scope and specifications.
•Provides research and analysis to support military organizations.
•May support development and analysis of products, including training modules, evaluation tools, etc.
•Presents analysis or products to customers.
•May support policy and procedure development for agency, interagency, or community-wide support.
•May interact with outside customers and functional peer groups.
• Participates in the development, testing, maintenance
and delivery of training and educational programs and related materials
in support of complex products and/or procedures.
• Knowledge on the operational employment and TTPs of
the following C2 systems and software applications in the COC operating
environment is required:, AFATDS, FBCB2-BFT, JADOCS, and supporting C2
systems/software applications found available for use the
regimental/battalion Combat Operations Center (COC).
• Conducts training sessions and assists in evaluating the effectiveness of training activities.
• May assist with updating course documentation on a continuous basis to ensure timeliness and relevance.
• May work with engineering, technical support and
manufacturing to ensure that course material reflects current product
features. Desired Skills and Experience
•Requires a bachelor's degree in a related field;
graduate degree preferred, plus 3 years' experience as a Military
Analyst and/or formal military training. Appropriate clearance level
required.
•Work is usually performed at a government site, some of which may be remote.
•Working conditions may vary.
•Travel may be required.
• Have attended DoD formal instructor courses, such as
the Marine Corps' Formal School's Instructor's Course, or service
equivalent
• Four years of documented experience instructing and employing their respective C2 system in support of MAGTF operations
• Background as an 0844 or 0848 MOS (USMC MOS, or
equivalent USA MOS appropriate), with formal training and experience
utilizing AFATDS (Advanced Field Artillery Target Data System), EMT
(Effects Management Tool), PSS-SOF (Precision Strike Suite – Special Ops
Forces)
• Active Secret Clearance or the ability to obtain a Secret clearance is required.
• Formal AFATDS Training required, Strike-Link, PSS-SOF, JADOCS experience desirable"
"Onion routing network for securely moving data through communication networks US 6266704 B1 ABSTRACT The
onion routing network is used to protect Internet initiators and
responders against both eavesdropping and traffic analysis from other
users of the Internet. In the onion routing of the invention, instead of
making connections directly to a responding machine, users make
connections through onion routers. The onion routing network allows the
connection between the initiator and responder to remain anonymous.
Anonymous connections hide who is connected to whom and for what purpose
from outside eavesdroppers."
"VATC Provides exercise support to FLINTLOCK 14 VATC Inc. Press
Providing Global Strategies for Secure Operations in a Rapidly Changing
World VATC PROVIDES EXERCISE SUPPORT TO FLINTLOCK 14 April 2, 2014
Tampa, Florida – Visual Awareness Technologies & Consulting (VATC)
was recently selected to provide exercise support during FLINTLOCK 14,
an annual regional exercise among African, Western, and U.S.
Counterterrorism forces. Directed by the Chairman of the Joint Chiefs of Staff,
and sponsored by Joint-Special Operations Task Force-Trans Sahara
(JSOTF-TS), the Special Operations Forces (SOF) exercise develops
security capabilities and strengthens bonds among exercise participants.
This year's event, planned by Special Operations Command Africa
(SOCAFRICA), had more than 500 participants from Burkina Faso, Canada,
Chad, France, Italy, Mauritania, the Netherlands, Niger, Nigeria,
Norway, Senegal, Spain, the United Kingdom, and the United States. … VATC's
support included world-class Counter-Terrorism (CT), Foreign Internal
Defense (FID), and Counter-Insurgency (COIN) subject matter expertise
from SOF leaders and operators, scenario development based on
operational realities and existent and emergent threats, and scripting
of customer tailored orders and injects
to include Campaign Plans, Operational Orders, Fragmentary Orders,
Order of Battle or Pattern Analysis Databases, Intelligence Fusion
products, and Targeting Data. The company also provided 24/7
Joint Exercise Control Group (JECG) support to exercise participants
through all phases of planning and execution of strategic, operational,
and tactical missions."
"INTERNATIONAL FIRE TRAINING CENTRE CREW COMMANDER INCIDENT COMMAND INITIAL ACTIONS OF THE CREW COMMANDER Throughout
this note he means he/she and his means his/hers. INTRODUCTION Although
the Incident Commander will have overall control of the accident or
incident ground, it can happen, on occasion, that a Crew Commander, the
vehicle and its crew can be the first to arrive. Under these
circumstances, it will then fall to the Crew Commander to initiate the
first actions necessary to mitigate the incident.
This training note is designed to stimulate thought and discussion on
the subject of the actions that may need to be considered at an
incident, initially under the control of a Crew Commander. .. IFTC/CM/05/119/08/CREW
COMMANDER INCIDENT COMMAND INITIAL/TRAINING NOTE/ACTIONS OF THE CREW
COMMANDER/Page 7 of 7/ISSUE 2/FEBRUARY 2015 G:\fire training
global\AVIATION\CC Incident Command\Initial\Tng Notes\Actions of the CC Serco Internal"
"About Us Welcome to the International Fire Training Centre (IFTC). We are part of the globally respected services company, Serco.
International Fire Training Centre is the
leading aviation fire training centre in the world. Since 1981 it has
been located at Durham Tees Valley Airport in the North East of England
in what was once a historic Royal Air Force base. During the Second
World War it was home to a detachment from the Royal Canadian Air Force
flying Lancaster bombers.
The centre is
situated in the countryside between Middlesbrough and Darlington both of
which are only a few miles away and the city of Newcastle lies 30
minutes away by train.
IFTC trained firefighters are the best in
the world. As a graduate of our internationally renowned training
centre you will become an elite firefighter of the highest calibre armed
with the skills, knowledge and instincts necessary to deal with extreme
emergencies at any location in any country.
The training we provide is thorough and rigorous and we
set stringent and demanding standards. We have been training new and
experienced firefighters from across the globe for decades and our
facilities are second to none. Extensive Dedicated Facilities
We have:
A 20 acre dedicated training site with world class
simulators and the largest confined space rigs in the UK. fully equipped
classrooms with laboratory equipment to teach firefighting theory.
A virtual reality suite to test decision making under pressure in real time
[Digital Fires and The Onion Router]
.
Our training is designed for those working in the
aviation, marine, industrial and offshore sectors. We offer hands on,
totally authentic 'real life' emergency scenarios including hot fire and
black smoke situations. Dealing with chemical spills, confined space
situations and casualty recovery are also included.
We train both dedicated firefighters and those whose
duties include dealing with fires and other emergency situations. Our
trainers are firefighting professionals with extensive hands on
experience across all sectors including military, civil and industrial.
Certified and Accredited
All our courses are certified and accredited to meet
international requirements including CAA, OPITO, JOIFF and STCW offering
you absolute peace of mind. Alternatively we can arrange
internationally recognised bespoke courses to meet your particular
needs. A number of our courses are also certificated and accredited
within the UK with standards including BTEC, City & Guilds and
PTLLS."
"Base One Technologies .. Clients Banking, Finance and Insurance
Oversee the integration of two separate
networks, as well as business office operations Key participant in
network architecture design for a network handling real time stock/bond
trading world-wide.
Provide interactive access to equity markets in the Americas, Europe, Asia, Middle East & Africa
Engineer/implement architecture for client inter-entity links
Develop overall technical
solutions including network components, physical and logical topologies,
routing policies and disaster recovery schemes
Design ISDN solution for client network and
provide contingency planning and disaster recovery design strategies
Participate in the operational turn down of the client network to
migrate traffic to the Chase Network in a controlled manner Management
of all IPX issues on Data Highway (the entire USA local and Domestic)
with a staff of two.
Performed network designs
and provided guidance to different groups on requirements to implement
networks on DH Designed and installed an application specific DS3 ATM
network off SONET Ring.
Redesigned Merrill Lynch's External network, to provide redundancy (dynamically) between buildings.
Engineered and implemented the first true VLAN project for Merrill Lynch using Cisco's 5500s and 5000 hardware
Authored the IGRP to EIGRP plan for Data Highway which consist of over 1000 routers.
Designed and Implemented a new Market Data
Backbone for Merrill Lynch including the engineering of the distribution
of the information. Evaluated Cisco's Voice Over IP, Voice Over Frame
Relay and Voice Over ATM Technologies Redesigned CITICORP North America
OSPF/BGP router network using ATM as the primary transport media, with
ISDN for backup.
Redesign various OSPF/BGP areas where sites within an area were closing and areas were merging.
Fine tune ABR routes within BGP Autonomous Systems to provide optimum routing.
Consolidate Tier 3 Feeder Routers in an effort to provide optimum routing and efficient bandwidth usage.
Redesigned the INTRA Area 0 transport medium using ATM and fine
tune the routing configuration to provide logical resilience in case of
Frame Relay link failures from the ABRs to the feeder sites.
Provide DEC LAT-to-IP and IP-to-LAT translations, Replace access method to SNA from RSRB to DLSw+ and IP
Feasibility study/cost analysis/ resource management/capacity
planning for IP over ATM/Frame Relay migration Architect new network
design topology and increase bandwidth via DS3's
Designed, deployed network architecture and disaster recovery solutions
[on the onion router]
that withstood 9/11/01 disaster without a single transaction failure despite carrier failure
Client Cards FDDI Migration Project - Architect, manage and
implement the client backbone Network Migration from FDDI & token
Ring to switched Fast Ethernet
Perform business analysis, feasibility study, budgetary estimate,
project management, relocate and consolidate network data sites to new
client facilities in support of network expansion. Plan implementation
and roll-out Solutions
Site Survey, data collection, facilities management planning,
data center environmental facilities planning and cable infrastructure
to relocate and consolidate network data
Network management, 3rd level support in NOC
Client Mid-Range Data Center Relocation -
consolidate, merge divergent networks, systems, data centers,
decommission WAN bridged architecture
Design, implement,provision, procure new network solutions and
fault tolerant architecture, architect contingency plan, site relocation
cost analysis, Network Impact analysis, WAN bandwidth cost analysis,
strategic business analysis, global project planning,enterprise router
architecture
Consolidate and merge various technologies and equipment -
routers, switches, Gigabit Ethernet, token ring, layer2 & 3
switching, IGRP, OSPF, BGP, (HRSP), DECnet Phase III & IV routing,
DECnet, LAT bridging, SNA, DLSW+, SRB, SDLC Tunneling, Frame Relay,
X.25, ISDN, ATM, VLAN, Point to Point Transport, SNMP, VAX, HP UNIX,
EMS, VTAM"
"[Base One Technologies,
Ltd. is a DOMESTIC BUSINESS CORPORATION, located in New York, NY and
was formed on Feb 15, 1994.This file was obtained from the
[Clinton]
Secretary of State and has a file number of 1795583] ..
Conducts IT Security and Risk Assessment in Federal government as well
as security testing, implementing security for multiple platforms and
operating systems
[onion router]
around the world ... Develops, implements and supports Information Security Counter measures such as honey-pots and evidence logging and incident documentation processes and solutions."
"Corporate Diversity
We are a Government Certified Women-Owned Business We practice
Diversity Recruitment and Staffing for IT positions Base One was founded
in 1994 by a women engineer who had made a career in technology
research for many years. Base One has been very successful in
focusing on diversity recruiting and staffing for IT projects. It has
been our experience that the greater the diversity mix, the more
creative the solution. As in any field the more diverse the viewpoint
the more thorough your analysis. Our engineers can think out of the box.
Because of our affiliations we have access to pools of resources among
more diverse groups & individuals. We work with a large pool of
minority professionals who specialize in IT skills. We are able to have
access to these resources through our status as a D/MWBD firm and our
affiliations. These affiliations assist us in working with resources
among more diverse groups & individuals. We are also partnered with firms that are 8A certified as Minority firms, Disabled Veteran firms
[such as Metris the coordinator of Jade Helm, see below]
, Native American firms, Vietnam veteran firms, women owned firms."
"Serco's Office of Partner Relations (OPR) helps facilitate our aggressive small business utilization and growth strategies. Through the OPR, Serco
[and its drug hub banker HSBC]
mentors four local small businesses under formal Mentor Protégé Agreements: Three sponsored by DHS (Base One Technologies, TSymmetry, Inc., and HeiTech Services, Inc.,) and the fourth sponsored by GSA (DKW Communications, Inc.). Serco and HeiTech Services were awarded the 2007 DHS Mentor Protégé Team Award for exceeding our mentoring goals."
"City A.M. Outsourcing firm Serco has finally received some good news .. After being asked last year to conduct an investigation into whether Serco staff had been misleadingly recording
[tagged]
prisoners as ready for court
when they were not, the Crown Prosecution Service has accepted the view
of the City of London Police and put Serco in the clear."
"Serco farewell to NPL after 19 years of innovation 8 January 2015 .. During that period under Serco's
management and leadership, NPL has delivered an extraordinary variety
and breadth of accomplishments for the UK's economy and industry .. .. NPL's caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency
[hedge fund]
trading in the City through NPLTime."
Yours sincerely,
Field McConnell, United States Naval Academy, 1971;
Forensic Economist; 30 year airline and 22 year military pilot; 23,000
hours of safety; Tel: 715 307 8222
David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of
oil-well blow-out teams; now sponsors Grand Juries in CSI Crime and
Safety Investigation 
Posted: 23 May 2015 04:34 AM PDT
This information appeared
at Scoop Feed
May 18, 2015
James Tracy
Headlines,
Videopolice state and civil rights,
surveillance
Level9News
The DOD's GLOBAL INFORMATION GRID is going to be the primary framework for network-centric warfare.
JADE = Joint Assistant for Development and Execution: BBN Technologies, Raytheon in conjunction with DARPA
"JADE" is an AI quantum computing technology that produces holographic
battlefield simulations, and has the ability to use vast amounts of data
being collected on the human domain to generate human terrain systems
in geographic population centric locations to identify and eliminate
targets, insurgents, rebels, or whatever labels that can be flagged as
targets in a Global Information Grid for Network Centric Warfare
environments.
The "JADE" In Jade Helm 15 Is An A.I.
SOFTWARE Program
The JADE II battlefield system is cognitive and intuitive. It can examine prior executed battle plans and devise "new and better" strategies to increase the "kill chain".
The II generation of JADE has the capability for two-way communication
with drones through OCCOM technology, which is one of the next
generation integrations to this system.
In short, JADE HELM will not be battles directed by Generals and Military Commanders, but by a computer. It is a cognitive software program based on a Network Centric Warfare System at the HELM.
Please get this information out, share, re-post.
It would seem the Jade Helm 15 exercise is actually a system roll-out, and more diabolical than we originally imagined.
http://scoopfeed.net/2015/05/18/the-jade-in-jade-helm-15-is-an-ai-software-program/
What is Jade Helm 15?
Joint Assistant for Development and Execution
Bedouin Arab Israeli Defense Force soldiers take part in a tracking drill in southern Israel
In one of the largest military training
exercises ever carried out on American soil, Jade Helm 15, military
personnel and supporting equipment will operate in nine states, with
Utah, Texas, and parts of California designated as simulated "hostile
territory." Jade Helm 15 will last eight weeks from July 15
through September 15, 2015. The officially-stated goal is to prepare
Special Operations Forces for "threats abroad." The training operation
will take place on private land, with permission from the landowners,
and on public land, with the permission of state and local authorities.
Governor Greg Abbot has ordered the
Texas State Guard to monitor the exercises in Texas, after a
frenzy of speculation on the internet that Jade Helm 15 is a precursor to martial law. What is it really all about?
JADE
We learn from an Air Force Research Laboratory Final Technical Report, dated August 2001, that JADE stands for
Joint Assistant for Development and Execution.
JADE's purpose is "to assist in the development of force packages… that
need to be deployed to some location in support of… warfighting." With
JADE software, military planners can build a preliminary force
deployment plan in less than one hour. If there are changes to the plan,
such as change in geography or territory, the program quickly generates
another plan. In other words, it has the flexibility to complete the
original plan with new parameters.
HELM
The "15" in Jade Helm 15 is obviously the year 2015. "HELM," however, is more difficult to decipher. Internet bloggers have speculated that HELM is an acronym for
Homeland Eradication of Local Militants, but
this could not be verified.
The most obvious meaning of "Helm" is that the goal of a military
operation is to be in control of a strategically significant situation,
as in "at the helm" of a ship.
"Master the Human Domain"
The logo for Jade Helm contains this phrase: "
Master the Human Domain."
Historically, military campaigns focused on conquering territory and
geographical terrain. In other words, they would fight to "take the
hill." To deal with the new elements of terrorists and insurgents, the
U.S. Military must now have a new strategy which includes dealing with
the variables of the humans who populate the terrain of a future war,
the "human domain." In this training for covert operations, soldiers
"wearing civilian attire and driving civilian vehicles" will attempt to
move around within communities without attracting attention. Local cells
of civilians will be alerted to pay attention to how well the soldiers
blend in with the local environment.
It will likely be unnerving to townspeople to see Green
Berets, Navy Seals, Air Force and Marine Special Operations personnel,
military aircraft, low-altitude airdrops of soldiers, and weapons firing
blank rounds in their communities. The plan also calls for civilian
"role players," (like the "crisis actors" in previous emergency drills)
to conduct "suspicious activities," so that the Special Operations
Forces can train in a more true-to-life environment.
Conditioned for Troops on the Streets
Jade Helm is a massive
field training exercise
to help Special Operations Forces improve their survival, evasion,
resistance, and escape capabilities. Military planners will observe how
civilians respond to a military presence in their communities, and this
information will likely be added to Armed Forces databases for future
force deployment planning. Michael Snyder has noted that many people are
concerned about elaborate training exercises, such as Jade Helm,
because so much of civil unrest training by police and National Guard
forces "
seems to eerily correspond with actual events."
It is logical to expect that, as they find themselves in the midst of
such realistic and elaborately detailed training exercises, local
residents will become anxious and distressed. Wouldn't you?
Nevertheless, eventually, many more Americans may have to become
accustomed to seeing troops on the streets.
By Rick Brinegar
Tags:
Military,
World Government,
world war 3
http://www.endtime.com/prophecy-news/jade-helm-15/
________
Relax everyone, they will fail:
Further reading:
How Technology Almost Lost the War: In Iraq, the Critical Networks Are Social — Not Electronic
|
|
|