Hawkins Malipod™—Serco’s Expert Con Air Tracking Patents—CIA Isham’s Macauley Stab Site—CAI McVicar’s Bridge of Pride™


David “Sherlock” Hawkins is using his Malipod™ (see ref.) virtual patent-profiling machine to analyze the role of Serco—the world’s largest non-state air traffic controller and alleged provider of carbon credits expressed as the weight of carbon saved in HVT or mass casualty events—in the use of expert-systems to track patented Con Air SWAT team assets through crime sites associated with the stabbing death of the late Molly K. MaCauley an economist specializing in satellites and the U.S. space program, and V-P Research at a Washington-based think tank, Resources for the Future, in the Roland Park neighbourhood of Baltimore on July 8, 2016.

Malipod™ patent profiling indicates that Nicholas (Nick) Soames, former U.K. Minister of Defence,  Joanne Isham, the CIA’s former Deputy Director of National Imagery and Mapping Agency during the 9-11 war games and now Director of Maxar Technologies Ltd., and Tracey McVicar, managing partner of the Vancouver branch of the CAI Private Equity Group, serve as ad-hoc custodians of the various patented AI/expert-system algorithms needed by Serco and DOJ Pride operators of pedophile-tagging and prisoner-transport (Con Air) networks, to neutralize the carbon footprints of targets including whistleblowers at drag-and-drop crime sites apparently selected by former U.S. Vice President Al Gore to reduce the perceived but allegedly spurious risks of catastrophic anthropogenic global warming (CAGW).

Hawkins believes that Ms. Macauley was murdered to prevent her from exposing Serco’s role in the formation of Maxar Technologies Ltd.—an American space technology company headquartered in Westminster, Colorado, through the merger of MacDonald, Dettwiler and Associates, MDA Holdings Company and DigitalGlobe on 5 October 2017—with expertise in the use of communication, earth observation, radar and servicing of satellites to provide carbon credits at HVT or mass casualty events.

Hawkins believes that Soames, Isham and McVicar have helped Serco Con Air SWAT teams set up virtual dead pool betting rooms with Howard Lutnick’s “Real-time interactive wagering on event outcomes Priority date  2003-04-10 … 2016-08-02 US9406196B2 Grant” and Lee Amaiti’s (Original Assignee CFPH LLC) “Methods and systems for combining securities and carbon credits Priority date 2006-12-27 …. 2014-05-20 US8732058B2 Grant” to bet on the weight of carbon saved when victims tracked into crime sites suffer wrongful deaths from the negligent, reckless, wilful or fraudulent use of one or more of the following patents …..

· Apple Inc.’s “Graphical user interface providing consistent behavior for the dragging and dropping of content objects [targets?] Priority date 1995-08-07 …. 2003-03-18 US6535230B1 Grant”;

· Kim Rossmo’s “Expert system method of performing crime site analysis Priority date 1996-10-11 … 1998-07-14 US5781704A Grant … 2002-07-16 US5781704C1 Grant” 

· Jerome Lemelson’s “Prisoner [Con Air] tracking and warning system and corresponding methods 2000-04-25 US6054928A Grant”; 

· Jerome Lemelson’s “Friend or foe detection system and method and expert system military action advisory system and method Priority date 1999-01-13 …. 2001-03-13 US6201495B1 Grant”;

· Howard Lutnick’s “Real-time interactive wagering on event outcomes Priority date  2003-04-10 … 2016-08-02 US9406196B2 Grant”

· Lee Amaiti’s (Original Assignee CFPH LLC) “Methods and systems for combining securities and carbon credits Priority date 2006-12-27 …. 2014-05-20 US8732058B2 Grant”;

· Lee Amaiti’s (Original Assignee CFPH LLC) “Amusement devices including simulated court games or athletic events Priority date 2009-10-26 … 2016-08-30 US9427669B2 Grant 2016”;

· Lee Amaitis’s (Original Assignee CFPH LLC) Aggregate gaming funds Priority date 2013-02-06 …. 2017-11-21 US9824542B2 Grant

· Inmarsat Global Ltd’s “Method and apparatus for timing correction in communications systems Priority date  1999-03-05 .. 2009-05-12 US7532891B2 Grant”;

· BAE Systems PLC “Proximity fuze Priority date 1998-12-23 … 2004-12-28 US6834591B2 Grant”;

· Nanowave Technologies Inc.’s “Waveguide combiner apparatus and method Claims priority to US Provisional Application No.  61/826,699 filed on May 23, 2013”; and,

· QinetiQ North America Inc.’s “Social engineering protection appliance US9123027B2 Priority date  2010-10-19 …… 2015-09-01 US9123027B2 Grant.”

Hawkins’s Malipod™ crime site analysis suggests that Nicholas Soames (former  U.K. Minister of State for the Armed Forces from 1994 to 1997 in the John Major government) and Tracey McVicar (managing partner of the CAI private equity group) equipped Joanne Isham—the woman who was awarded the CIA's Distinguished Intelligence Medal by Clinton pardonee, the disgraced former CIA Director John Deutch on March 18, 1995 for outstanding management of the CIA’s Office of Congressional Affairs and the founder of the National Imagery and Mapping Agency (NIMA) on Oct. 1, 1996with the Joint Automated Booking System (JABS) and expert-system algorithms allegedly developed for Serco and DOJ Pride SWAT teams to target victims selected by Gore and spot fix outcomes of the following events …

· On Christmas Day 1996, when the writer of the JonBenet Ramsey ransom note declared “Any deviation of my instructions will result in the immediate execution of your daughter.… Speaking to anyone about your situation, such as police or F.B.I. will result in your daughter being beheaded. ..  You can try to deceive us, but be warned we are familiar with law enforcement countermeasures and tactics. …. S.B.T.C [Hawkins believes S.B.T.C stands for a Sigma Beta Tau Colony and alleges that Isham’s targets for extortion included then Lockheed Martin directors Lynne Cheney and Norman Mineta who would be told to stand down U.S. defenses on 9/11]”

· Between 1996 and 2002 when Isham appears to have used NIMA visualization and mapping, facilities and Lemelson’s patent expert systems algorithms to track prisoners, parolees and victims for “heart rate, pulse, blood pressure, respiration, temperature, and chemical properties of selected body fluids such as sweat and/or breath” and reward them for the removal or spoliation of evidence of murder-for-hire, hard-core and child-pornography and online-betting crime sites, formerly operated up to August 1999 by Vancouver-based Starnet Communications;

· In August 1999, when ‘SWAT teams and computer specialists from the U.S. Internal Revenue Service and the U.S. Customs Service, invaded Starnet's Carrall Street office and seized equipment and records’ relating to hard core porn (snuff films?) and online gambling sites; 

· On 9/11, when Soames deployed Con Air SWAT teams to a Serco sharehoilders’ meeting on 47th floor of WTC #1 and Tracey McVicar was scheduled to collect a drag-and-drop computer from a CIA/DOD/IRS command center allegedly established by Isham on the 25th floor of WTC7 to track the “first live-broadcast mass snuff film in human history” with NIMA’s “animated renditions of imagery and geospatial data” to support dead-pool betting during the attack in New York;

· In August 2010, when SWAT teams appear to have “tidied up” the flat of the late MI-6 spy Gareth Williams and removed fingerprints from the padlocked bag containing his body; and, 

· On December 15, 2017, when SWAT teams appear to have removed electronic straps from the wrists of the late Barry and Honey Sherman; returned alibied Con Air killers to their prison cells; and, injected fake news of a murder suicide into the Toronto Police communications system.

Hawkins notes that while Ms. Isham can eliminate the apparent mens rea from crime sites by targeting victims, executing missions and rewarding SWAT teams through the use of patented drag-and-drop devices and expert-system algorithms, she leaves the custodians of such devices—Serco has just processed the 4 millionth patent applications as USPTO’s outsourcer for Pre-Grant Publication (PGPubs) Classification Services!—and its investment bankers N M Rothschild & Sons Ltd., and its shareholders including the Teachers (TIAA) pension fund, vulnerable to class-action  lawsuits for wrongful death. 

Hawkins’s Malipod™ investigations suggest that Isham, former CIA director of the National Imagery and Mapping Agency, Member of USIS Advisory Board, former VP at BAE Systems in Washington D.C. Metro Area, Director of Maxar Technologies Ltd. (formerly MacDonald, Dettwiler and Associates Ltd) a prime contractor for Nanowave Technologies, and Director of BEI Precision Systems & Space Co. Inc. (inventor of the Clinton-patented QRS11 gyrochip apparently used in Boeing drag and drop on 9/11) used a patented drag and drop interface and expert-system algorithms on the federal bridge certification authority (FBCA) network to attack NYC’s WTC complex with two hijacked planes and demolish three buildings (WTC 1, 2 and 7) with the same energetic materials …

https://stgec-ausc.uplynk.com/80C078/ausc/slices/ea5/22f3150cc15946e68b21f11967cfb8d1/ea56ec6945d9492fb269ef7b4cdcb821/poster_821c957380304cae96a6546f21c976cb.jpg

http://www.thesleuthjournal.com/wp-content/uploads/2013/08/al-gore.jpg

Serco Share(swamp)holders! https://www.youtube.com/watch?v=ncj9tg1WD1I

http://www.lookingglassnews.org/articles/dec/team83.jpeg

The President's Interagency Council on Women
January 22, 1999—Joanne Isham, Central Intelligence Agency, is a member but not in photo https://1997-2001.state.gov/picw/images/Icwphoto.jpg

https://www.nga.mil/About/History/NGAinHistory/PublishingImages/October/FB_nima.jpg

https://d1k5w7mbrh6vq5.cloudfront.net/images/cache/e3/76/79/e37679ea290e04508583040e4f45ade3.png

https://i1.wp.com/www.abeldanger.org/web/wp-content/uploads/2016/05/jonbenet-ramsey-murder-crime-scene-c2csi.jpg?resize=640%2C280&ssl=1

https://i.ytimg.com/vi/6q9husVUw24/hqdefault.jpg

https://media.gettyimages.com/photos/princess-diana-laughs-with-nicholas-soames-at-the-wedding-of-her-picture-id52114580

https://image.slidesharecdn.com/91b7aa2e-49a2-4156-ad00-62df953366c7-161119043226/95/diversity50miniprofiles2016-1-638.jpg?cb=1479530588

https://docplayer.net/docs-images/42/12918774/images/page_17.jpg

Hawkins has identified Nicholas Soames, a grandson of Winston Churchill and former Minister of State for the Armed Forces from 1994 to 1997 in the government of John Major, as the primary custodian of patents covering Con Air AI/expert systems and Entrust PKI devices who, allegedly, ordered Serco and the UK MOD to adopt the version of Entrust PKI developed by a CAI investee, the B.C.-based MacDonald, Dettwiler and Associates Ltd., for the secondary custodian Tracey McVicar, founder of the Vancouver branch of the NYC-headquartered CAI Private Equity Group, whose special investors were alleged clients for Starnet’s online LGBT, child pornography and pig-farm murder-for-hire services from 1996 to 2002.

Hawkins is recommending that families who lost loved ones in HVT or mass-casualty events associated with the negligent, reckless, wilful or fraudulent use of patents in the de-facto custody of agents of Soames, McVicar, Serco or the CAI Private Equity Group, including their shareholders, investment bankers or clients, should follow civil procedures with claims for damages for wrongful deaths similar to those used by the Brown and Goldman families where were awarded compensatory and punitive damages totalling $33.5 million after O.J. Simpson was acquitted in a verdict announced on October 3, 1995 of the murder of his ex-wife, Nicole Brown Simpson, and her friend, Ron Goldman, but where Simpson as sole defendant in the civil case was found responsible for both deaths.

Hawkins has also stated that if he is given all or any of the $10 million reward offered by the family for his help in solving the Sherman murders, he will share the reward equally with Jason Goodman, founder of Crowd Source the Truth, as the only investigative journalist with the technical ability to work with Hawkins on the real-time ‘discovery’ of evidence needed to identify the principals of network who use patented devices or systems to spot fix times of death or body counts at HVT or mass-casualty events.

Introduction to Reverse Engineered Crime Scene Investigation with David Hawkins https://www.youtube.com/watch?v=wZHkQUQjP_k

David Hawkins

©2018 David C. Hawkins

References

Why does David Hawkins use his Malipod as a virtual patent-profiling machine to reverse engineer expert-system crime site analysis at coordinated, synchronized and spoliated high value targets and mass-casualty events? [‘Mali-’ because it is derived] from dismal (adj.) c. 1400, "unlucky, inauspicious," in dismal day, earlier as a noun, in the dismal (c. 1300) "in days of misfortune or disaster, under inauspicious circumstances, at an unlucky time," from Anglo-French dismal (mid-13c.), apparently from Old French (li) dis mals "(the) bad days," from Medieval Latin dies mali "evil or unlucky days" (also called dies Ægyptiaci), from Latin dies "days" (from PIE root *dyeu-"to shine") + mali, plural of malus "bad" (from PIE root *mel- "false, bad, wrong") and ‘-pod’ because Con Air SWAT teams tend to bond together as experts to exploit different vulnerabilities—Sex, Fear, Greed, Power—in their victims.”

Molly K. MaCauley (1957 - 2016) was an economist specializing in satellites and the United States' space program, and vice president for research at Resources for the Future, a Washington-based think tank. She was murdered by stabbing in 2016.[1][2] [This is the totality of the Wikipedia entry and—in Hawkins’s opinion—indicative of Isham’s CIA colleagues use of QinetiQ North America Inc.’s “Social engineering protection appliance US9123027B2 Priority date  2010-10-19 …… 2015-09-01 US9123027B2 Grant to filter out the truth]”

Baltimore detective turns to FBI, public for help finding Molly Macauley's murderer

MALLORY SOFASTAII

Oct 30, 2017

Over a year later, police are still searching for the person responsible for killing Molly Macauley.

Macauley, 59, was stabbed to death in an affluent Baltimore neighborhood. 

She was attacked while walking her dogs. 

The crime happened in Roland Park, a neighborhood virtually immune to Baltimore’s violence. The neighborhood hadn't seen a murder since 1998, then on a hot night in July of 2016, the community lost its sense of security in a heartbeat when a killer took Macauley’s life. 

“I knew Molly for about 25 years,” said Margaret Walls, one of Macauley’s co-workers. “We both worked here, at Resources for the Future, for a long time. She was here when I came fresh out of graduate school so we were colleagues for many years.”

The space economist, Hopkins graduate and respected professional climbed the ranks at the think tank becoming vice-president for research and a senior fellow.

“She was passionate about her work, very professional, very involved in her work. It meant everything to her,” said Walls.

Macauley was a pioneer in the field and had contacts at NASA. On several occasions, she even testified in front of Congress.

“How you deal with trash in space, basically. What kind of incentive mechanism, some pricing you might use,” said Walls. “Just one of the last things she did was work really hard on a big NASA grant that we actually won, the organization won, and sadly she's not here to lead it.”

Macauley lived in Baltimore and worked in D.C., a commute many try to avoid but she did it for years.

“Thing I always said was, we all thought she was crazy but she really loved Baltimore. She just loved Baltimore,” Walls said.

Someone killed Macauley in the city she loved.

To Baltimore City Police homicide detective Sean Dallessandro, there’s something different about the case and what happened to Macauley.

“It was unlike any other case that I've ever had." - Baltimore Police Detective Sean Dallessandro

“It was unlike any other case that I've ever had,” he said.

Macauley and her boyfriend had just returned home from an Orioles game. At 10:42 p.m., Macauley left her home to walk her two dogs and at 10:57 p.m., police received reports of an injured person, according to their report. 

Officers found Macauley bleeding on the sidewalk, still grasping the leashes in her hand.

“There was a neighbor that heard Molly scream and rushed outside,” said Detective Dallessandro. “The second person that was right behind that witness looked over, saw Molly laying there still holding onto the dogs to the left and called over and said, 'Hey, over here.’”

The killer stabbed Macauley several times. Detectives traced a blood trail from where she was found to a second pool of blood a few yards from where they believe the stabbing occurred. Macauley was just one block from her home on West University Parkway.

“I walked into the crime scene and what was immediately evident was the amount of blood,” said Dallessandro.

Police didn't find surveillance video, didn't find witnesses, didn't find a weapon, and it didn't appear that anything was stolen from her.

“No, I can tell you that. Nothing was taken from her,” Dallessandro said.

“No, I can tell you that. Nothing was taken from her,” Dallessandro said.

A few days later, the detective ordered a police canvass. Cadets locked arms, combed woods covered in poison ivy and searched for clues. Nothing turned up.

Detective Dallessandro then went to federal investigators.

“I actually went to Quantico and talked to the behavioral analysis unit in Quantico with the FBI and they agreed with me on some things and came up with their own ideas also,” said Dallessandro. “I've explored a lot of possibilities, I'm still looking for that one. It's not what we know it's what we can prove and I got to go where the facts take me.”

Macauley's friends and family also hoping for a break soon and answers as to why someone would kill such a brilliant mind and caring person.

“Just provide some sense of closure, some answers,” said Walls.

“Just provide some sense of closure, some answers,” said Walls.

Detective Dallessandro also not giving up on the search for her killer.

“I'm not done. Til I leave the police department. this is going to be my case,” said Dallessandro.

Metro Crime Stoppers put up a $10,000 reward last year for information on Macauley’s death. Police haven't received any leads, but are hopeful someone out there knows something.

Tributes to Molly Macauley

Meanwhile, family, friends, neighbors and politicians are paying homage to Macauley.

On October 19, several cherry trees were planted in her memory. Forty people donated more than $6,000 to BARCS in her name, and former Senator Barbara Mikulski read a tribute into the Congressional Record recognizing her professional contributions and highlighting her love for the City of Baltimore.

If you have any information on Macauley's murder, contact Metro Crime Stoppers at 1-866-7-LOCK-UP. All tips can remain anonymous.”

Serco farewell to NPL after 19 years of innovation 8 January 2015 Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco’s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry. Some of the key achievements during that time have been: … It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade…. NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading in the City through NPLTime.”

Joanne O'Rourke Isham is espionage and security expert from the United States. She is a former member of the Central Intelligence Agency(CIA) and currently involved in geospatial intelligence. Isham graduated from the University of Notre Dame in the mid 1970s.[1] She started working in the Central Intelligence Agency (CIA) at the age of 20 doing background checks.[1] Isham was Director of Congressional Affairs at the CIA during Aldrich Ames spy case,[2] Associate Deputy Director for the CIA's Directorate for Science and Technology,[3] Deputy Director of National Geospatial-Intelligence Agency from November 2003 to April 2006. She was Deputy Director of National Imagery and Mapping Agency from September 2001 to October 2003.[4] Isham retired from the CIA in 2006 as a member of the Senior Intelligence Service, and a career officer at the Central Intelligence Agency, which she had joined in 1977.[5] In August 2017, she joined defense technology firm Polaris Alpha's advisory board.[6][7] Accolades[edit] Isham was awarded CIA's Distinguished Intelligence Medal by Director John Deutch on March 18, 1995; in recognition for her outstanding leadership and management of the Office of Congressional Affairs.[2] She was awarded the National Intelligence Medal of Achievement. She also received the Director’s Award in recognition of extraordinary service.[4]

On Oct. 1, 1996 the National Imagery and Mapping Agency, or NIMA, was formed to bring together our nation’s most capable imagery and geospatial assets into a single agency. Influenced by lessons learned from Operations Desert Shield and Desert Storm, NIMA brought together the Defense Mapping Agency, Central Imagery Office, Defense Dissemination Program Office and National Photographic Interpretation Center, and also incorporated parts of the Central Intelligence Agency, Defense Airborne  Reconnaissance Office, Defense Intelligence Agency and National Reconnaissance Office.
 

In the years following its formation, NIMA continued the work of its predecessors, influencing world events by creating animated renditions of imagery and geospatial data that allowed users to visualize inaccessible terrain and resolving international boundary disputes. NIMA also provided maps and visualizations that gave the Dayton Peace accord diplomats from the Balkans graphic views of the boundary locations they were debating. After the attacks of Sept. 11, 2001 NIMA took on additional responsibilities – including contributing to homeland security, helping safeguard events in this country and overseas, and assisting the armed forces’ work in Iraq and Afghanistan.
 

On Nov. 24, 2003, President George W. Bush signed the 2004 Defense Authorization Bill, a provision of which changed NIMA’s name to the National Geospatial-Intelligence Agency, reflecting both the new product NGA was developing – geospatial intelligence – as well as the growing unity of its parts.
 

Despite the name change, Oct.1, 1996 remains the date that is celebrated as the anniversary of NGA.”

A carbon footprint is defined as: The total amount of greenhouse gases produced to directly and indirectly support human activities, usually expressed in equivalent tons of carbon dioxide (CO2). In other words: When you drive a car, the engine burns fuel which creates a certain amount of CO2, depending on its fuel consumption and the driving distance. (CO2 is the chemical symbol for carbon dioxide). When you heat your house with oil, gas or coal, then you also generate CO2. Even if you heat your house with electricity, the generation of the electrical power may also have emitted a certain amount of CO2. When you buy food and goods, the production of the food and goods also emitted some quantities of CO2. …. Carbon dioxide is a so called greenhouse gas causing global warming . Other greenhouse gases which might be emitted as a result of your activities are e.g. methane and ozone. These greenhouse gases are normally also taken into account for the carbon footprint. They are converted into the amount of CO2 that would cause the same effects on global warming (this is called equivalent CO2 amount). … The carbon footprint is a very powerful tool to understand the impact of personal behaviour on global warming. Most people are shocked when they see the amount of CO2 their activities create! If you personally want to contribute to stop global warming, the calculation and constant monitoring of your personal carbon footprint is essential. .. There are graphs available on this site for the CO2 emissions per capita by country (average carbon footprint by country). In the medium- and long term, the carbon footprint must be reduced to less than 2'000 kg CO2 per year and per person. This is the maximum allowance for a sustainable living

Serco Combined Resilience Exercising – is critical in ensuring organisations are prepared for and able to manage risks that may affect lives, reputations and profits. Through our Combined Resilience exercising capability we offer a wide range of solutions to assist with the development of emergency plans and procedures and also to ultimately test preparedness and resilience within and between key organisations and agencies. Simulation and Media Support The method of delivering an exercise is flexible and will be designed with the client to meet their requirements with options ranging from simple paper-based delivery through to full [MITM] use of their real communications systems and advance computer simulation. In addition, media play can also be added in the form of news injects and the provision of experienced journalists and television crews to help test procedures and also assist in training key staff.”

MDA Wins Key U.S. Aviation Contract  Source: MacDonald, Dettwiler and Associates Ltd. Posted Thursday, May 3, 2001 Richmond, B.C. – MacDonald, Dettwiler and Associates Ltd. (TSE: MDA) announced today the company has been awarded a contract by the United States Air Force to develop a system to be used by specialists at Air Force bases to design Instrument Approach Procedures (IAPs). IAPs are published instructions to pilots specifying a series of aircraft maneuvers that must be executed for the aircraft to transition safely from an en route airway to a runway final approach when flying by instruments. MDA’s system ingests digital terrain and elevation data, air navigation data (such as the locations of navigation aids, runways, buildings and towers) to build and display a virtual model of the physical environment surrounding an airport. It then develops the complex surfaces that define a safe approach corridor for any of the dozens of IAP variants, and determines whether any of the defined surfaces are penetrated by terrain or man-made obstacles. It flags these incursions to the operator, who can quickly modify the approach procedure through a drag-and-drop user interface. This initial award, valued at $2.9 million (CDN), consists of a fixed price element to develop, integrate, and test the system. The next phase will include installation, government testing, and operator training. The contract includes an option for the U.S. Federal Aviation Administration (FAA) to adapt the system for their needs. The U.S. Air Force also has options to field the successful system at up to 108 air bases around the world, and to award T&M support contracts for up to 8 years. MDA plans to team up with Air Navigation Data (AND) of Ottawa to offer a custom solution, based on AND’s “Final Approach” product. MDA President and CEO Daniel Friedmann said: “This is a significant project for MDA that has the potential to improve the safety of air transportation for many other air forces and civil aviation authorities world wide.”

Apple Inc.’s Graphical user interface providing consistent behavior for the dragging and dropping of content objects Priority date 1995-08-07 …. 2003-03-18 US6535230B1 Grant Abstract A drag-and-drop operation in a graphical user interface is controlled dependence upon whether the destination for the operation is a content object or a service object. If the destination of a drag-and-drop operation is a content object, the resulting action is to move the dragged object from its original location to the destination. If the destination is a service object, the resulting action is to perform the associated service on the dragged object without affecting the perceived location of the data contained in the dragged object. If the user desires that an operation other than a move be made when dragging an object to a content object, a specified key on a keyboard is pressed, to indicate that the drag-and-drop operation should make a copy, rather than merely move the object. If the source of the dragged object does not permit the user to move the object, the user can be presented with an option to copy the object when the drag-and-drop operation is carried out. Alternatively, rather than requesting the user to indicate a choice each time such a situation occurs, the computer system can be set up to automatically make a copy if the source does not permit the object to be moved.”

    

Lee Amaiti’s (Original Assignee CFPH LLC) Methods and systems for combining securities and carbon credits Priority date 2006-12-27 …. 2014-05-20 US8732058B2 Grant Abstract Systems and methods are provided for reducing or neutralizing a carbon footprint of a security using carbon credit. At least one security that is excluded from an investment fund may be determined. A carbon footprint of the at least one security may be calculated. A first amount of carbon credit necessary to neutralize the carbon footprint of the at least one security may be determined. A second amount of carbon credit may be purchased based on the act of calculating the first amount of carbon credit necessary to neutralize the carbon footprint. A financial instrument determined to have an at least partially neutralized carbon footprint may be generated by causing the at least one security and the second amount of carbon credit to be stored in a trust.”

Lee Amaiti’s (Original Assignee CFPH LLC) Amusement devices including simulated court games or athletic events Priority date 2009-10-26 … 2016-08-30 US9427669B2 Grant 2016 Abstract Some embodiments include a fantasy sports game. In some embodiments, an expected performance value may be determined. In some embodiments, a same player may appear multiple times in a team. Various other embodiments are described.”

Lee Amaitis’ (Original Assignee CFPH LLC) Aggregate gaming funds Priority date 2013-02-06 …. 2017-11-21 US9824542B2 Grant Abstract Some embodiments include a fantasy sports games or other type of gaming options. A gaming entity may establish a fund of money that is to be exposed to a gaming market in an attempt to win money from risking the fund of money. A gaming operator may use the pool or fund to create liquidity in a gaming market. Various gamers may enter into games with the gaming entity by matching with various portions of the pool or fund.”

“FOR IMMEDIATE RELEASE AG

TUESDAY, OCTOBER 22, 1996 (202) 616-2777

TDD (202) 514-1888

ATTORNEY GENERAL PRESENTS HAMMER AWARDS 

AT DOJ "LAB DAY"

WASHINGTON, DC -- Attorney General Janet Reno presented

Hammer Awards to three employee working groups from Justice

Department components as part of the Department's "Justice

Performance Review Lab Day," an event showcasing the achievements

of the Department's 16 reinvention labs.

The Hammer Award is Vice President Gore's special

recognition to teams of employees which made significant

contributions in support of the President's National Performance

Review (NPR) principles of improving customer service, cutting

red tape, empowering employees, and getting back to basics. 

"By accepting the challenge to re-invent government, these

employees are making government more efficient and improving the

way we perform our public responsibilities," Reno said during the

Lab Day event in the Justice Department's Great Hall. Deputy

Attorney General Jamie Gorelick, who also attended, noted that

the employees "have taken the concept of creating a government

that works better and costs less and have made it a reality." 

The three Justice Department teams receiving the award are:

* The SENTRI Reinvention Lab, for developing a secure,

high-tech, automated border inspection system at Otay Mesa,

California; 

* The Joint Automated Booking System (JABS) Lab, a multi-

component effort which has significantly improved the

prisoner booking process; 

* The Justice Prisoner Alien Transportation System (JPATS),

which combines the resources of several DOJ components to

schedule and transport prisoners more quickly, safely, and

economically.

Additional information on the awardees is attached.

96-523 ### “

Investigator tried to warn of serial killer, Pickton inquiry told

By PETTI FONGStaff Reporter

Wed., Oct. 12, 2011

VANCOUVER—A senior Vancouver police investigator who pioneered geographic criminal profiling tried to warn residents in the Downtown Eastside that a serial killer was on the loose and preying on vulnerable women, a commission looking into missing women heard Wednesday.

Kim Rossmo, who completed his doctorate in criminology while on the force and headed the Vancouver police department’s geographic profiling section, wrote a public warning in May 1998, said his lawyer Mark Skwarok.

Dr. Kim Rossmo, a respected criminal profiler, drafted a letter of warning in 1998, the B.C. inquiry was told by his lawyer Wednesday.

The inquiry was ordered by the provincial government after Robert Pickton was convicted in 2007 of six counts of second degree murder. Another 20 counts of murder were stayed when Pickton was sentenced to life in prison.

The commission is looking at a time frame between January 1997 and February 2002 when Pickton was finally arrested. During that period, the commission has heard, the Vancouver police department and Port Coquitlam RCMP, where Pickton had a pig farm, were aware of his connections to the Downtown Eastside.

But despite early suspicions that the disappearance of dozens of women may be linked to a killer, the Vancouver police ignored mounting evidence, according to Rossmo’s lawyer.

“There is clear and unambiguous evidence that had senior police officers listened to him (Rossmo), Pickton would have been caught sooner,” said Skwarok.

Rossmo, who has since left the force and now teaches criminology at a university in Texas, wrote a draft press release in 1998 that warned residents in the Downtown Eastside that a serial killer was preying on people in the neighbourhood.

Pickton’s victims were sex trade workers and drug addicts who had come to the impoverished neighbourhood to live and work.

Drawing on evidence from analysis done on the number of women who went missing and those who were later found murdered Rossmo concluded that the most likely explanation for the majority of cases was a single murderer preying on skid row prostitutes.

“The probability that the extraordinary increase in the number of missing women could be attributed to chance was less than one per cent,” Skwarok told the commission.

But despite Rossmo’s belief that a serial killer found his victims in the Downtown Eastside, his bosses in the Vancouver police department refused to publish his report.

Nearly a dozen organizations representing sex trade workers, residents in the Downtown Eastside and aboriginal groups have pulled their participation from the commission because their request for funding from the provincial government was rejected.

Ann Livingston, of the group Vancouver Area Network of Drug Users, said the women who went missing were often lured to their deaths with illegal drugs and while they were living, they were criminalized and marginalized because of their drug addictions and poverty.

Many of them had children and some of those children live in the Downtown Eastside.

“We want to be assured the orphaned children are looked after so they don’t kill themselves or drug or drink themselves to death,” said Livingston. “We want an apology from the police for disregarding us.”

Lawyer Sean Hearn, who is representing the Vancouver police department and police board, made an apology to the families of the missing women, saying the force should have caught Pickton sooner.

But he reminded the commissioner that investigators did not know all the facts.

“There was a frighteningly large number of suspects capable of committing these crimes who live among us,” said Hearn. “Today we see a clear path between the Downtown Eastside and the pig farm.”

But in the late 1990s, police didn’t have all the information and the benefit of hindsight bias must always be kept in mind, he said.”

Darcy Kim Rossmo’s Expert system method of performing crime site analysis Priority date 1996-10-11 …. 1998-07-14 US5781704A Grant … 2002-07-16 US5781704C1 Grant Abstract An expert system method is provided that performs crime site analysis in a criminal activity area to determine a likely center of criminal activity. The method uses distances from related crime sites to determine a probability surface for the entire criminal activity area. A target area having highest values of probability becomes the center of criminal activity. The expert system can be used to access other crime databases such as witness reports to further define the criminals; residence or workplace.”

Digital Fires Instructor Serco – [Marine Corps Base] Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”

Jerome H. Lemelson’s Prisoner tracking and warning system and corresponding methods Priority date  1998-06-04 2000-04-25 US6054928A Grant Abstract A system and method for tracking, monitoring and learning prisoner or parolee behavior involves obtaining prisoner or parolee data and monitoring data for at least one individual prisoner or parolee, storing the prisoner or parolee data and monitored data into a database, learning prisoner or parolee behavior from the prisoner or parolee data and the monitored data in the database, and updating the prisoner or parolee data and the monitored data in the database. Expert system (i.e. including but not limited to fuzzy logic, reinforcement learning, neural networks, artificial intelligence, etc.) algorithms are executed for determining and analyzing deviated behavior by the prisoner or parolee. A parole level is assigned to the prisoner or parolee and it is determined whether the prisoner or parolee is to be moved up or down a parole level depending on whether the prisoner or parolee behavior does not constitute or does constitute prisoner or parolee violations. Furthermore, the system tracks, monitors, and learns the behavior of the prisoner or parolee by controlling and regulating the permitted/prohibited locations or sectors, the permitted/prohibited location or sector dwell times, the permitted/prohibited travel routes, the permitted/prohibited travel times that the prisoner or parolee spends at or between various locations.

FIG. 3 illustrates a prisoner/parolee tracking and monitoring system and method in accordance with the herein disclosed inventions. The system and method of FIG. 3 permits simultaneous tracking and monitoring of multiple prisoners or parolees 38. The individual prisoners/parolees 38 each have securely attached to their body a prisoner sensor/processor unit 52. The unit 52 may be attached to the arm, the leg, the waist or in any convenient manner to each prisoner/parolee 38. Such attachment is, however, secured and may only be removed by an authorized person. The prisoner or parolee sensor/processor unit 52 permits tracking the location of individual prisoners/parolees 38 as well as monitoring audio sounds, communicating with the prisoner/parolee 38 or other personnel in the vicinity of the prisoner/parolee 38, and monitoring physical conditions of the prisoner/parolee 38 including, for example, his/her heart rate, pulse, blood pressure, respiration, temperature, and chemical properties of selected body fluids such as sweat and/or breath. The unit 52 is a compact electronic system specifically designed for comprehensive monitoring, tracking, and learning of prisoners/parolees 38.”

Jerome H. Lemelson’s Friend or foe detection system and method and expert system military action advisory system and method Priority date  1999-01-13 …. 2001-03-13 US6201495B1 Grant Abstract A friend or foe detection system and method is disclosed. Friend or foe warning unit 20 has a geographic locating system, a communication system for communicating with each of the warning units, and a military force detection system for detecting military forces in a combat area and has a signal routing and control circuitry 50 for controlling operations. A number of components, devices, or sub-systems, such as a transmitter/receiver radio 28, an antenna 26, a microphone 30, a speaker 32, a battery 34, a display 36, a microprocessor 38, a memory 40, a camera 56, a radarilidar input 54, on/off switch 52, a GPS location system 45 that includes a GPS processor 46, a GPS receiver 42, a GPS antenna 44, are coupled to the circuitry 50. Display 36 provides a display to the user of the unit 20 and shows the location of friendly forces as well as unfriendly or unidentified forces in the area. Display 36 displays text messages for the user of the warning unit 20. The microprocessor 38 together with memory 40 provide microprocessor control of the operations of the warning unit 20. The geographic locating system includes GPS processor 46, GPS receiver 42, and GPS antenna 44, and it is used to determine the exact location of the warning unit 20. The unit 20 is able to broadcast and receive military force information, such as location and status (i.e. friendly, unfriendly, unidentified statuses). An expert system military action advisory system and method for advising military troops or personnel of firing decisions is also disclosed. A firing index is determined based on the membership variables, and the firing index is used to help make the firing decisions. The membership variables and the firing index are defined for an expert system or fuzzy logic system, and the expert system or fuzzy logic system helps determine making the firing decisions. The system and method operate by transmitting target and friendly force GPS coordinate information to determine danger. Alternatively, only target coordinates are transmitted with fire danger indices calculated on a distributed basis by individual warning units and transmitted to the source of fire without friendly force location coordinates to assist in making final firing decisions.”

Prisoner Escorting and Court Services Serco delivers safe and secure prisoner escort services on behalf of justice departments. We quickly and efficiently move people between prisons or police stations and court appearances, and care for them within the court environment.

We have unparalleled experience in the management of this complex prisoner care, planning, and logistics service, and understand the varied requirements of the stakeholder community.

Serco puts welfare and security at the heart of its escorting services, at the same time delivering the best value possible. With an extensive fleet of specialist cellular and multi-purpose vehicles, our services are carried out with compassion and care by highly trained and security cleared staff.

We innovate in partnership with customers and have trialled initiatives such as Mobile Video Court Services. This has not only helped us to reduce travel times, reduce the impact of the journey on the prisoner, increase court productivity, and reduce costs, it also continues to demonstrate that justice can be done digitally, securely, and still ‘in person’.”

BAE Systems PLC Proximity fuze Priority date 1998-12-23 … 2004-12-28 US6834591B2 Grant … Abstract A proximity fuze for use in a tube launched projectile carrying a payload, comprising an oscillator for generating a radio frequency signal which has a varying frequency, a single antenna for transmitting the radio frequency signal and for receiving an echo of the radio frequency signal, a first signal processor for generating a range signal corresponding to the time delay between the transmission of the radio frequency signal and the receipt of the echo signal, second signal processor for comparing the range signal with a reference signal and depending on the result of the comparison generating an activation signal for activating the payload, wherein a directional coupler is used for coupling the radio frequency signal from the oscillator to the antenna and to the signal processor and for coupling the echo signal from the antenna to the signal processor, and wherein the second signal processor comprises a threshold detector, a peak detector and a comparator, the threshold detector being for allowing the comparator to utilise the output from the peak detector only once the range signal has reached a predetermined magnitude.”

Inmarsat Global Ltd’s Method and apparatus for timing correction in communications systems Priority date  1999-03-05 .. 2009-05-12 US7532891B2 Grant Abstract In a wireless communications system, transceivers transmit short bursts to a base station, which determines timing corrections from the time of receipt of the burst and transmits the timing corrections to the respective transceivers. In one aspect, the base station indicates to the transceivers a plurality of time slots, each transceiver selects one of the time slots at random, formats a burst including an indicator of the selected time slot and transmits the burst in that slot. In another aspect, the base station transmits to each transceiver a timing uncertainty value, which determines how the timing correction will be modified by the transceiver as the interval since last receiving a timing correction increases. Data bursts are transmitted in a format comprising a first unique word, a content field and a second unique word, in that order. The bursts are transmitted in a TDMA channel format which can accommodate both short and long bursts in a block format of constant periodicity.”

Howard Lutnick’s Real-time interactive wagering on event outcomes Priority date  2003-04-10 … 2016-08-02 US9406196B2 Grant Abstract Systems and methods for real-time interactive wagering on event outcomes are presented. Clients are first qualified and given wagering limits before being allowed to interactively wager on event outcomes. Event outcomes may be based on, for example, financial markets and indices, sporting and entertainment events, casino games, casino performances, and natural phenomena such as weather and earthquakes. Events on which wagers can be placed include both those with known and unknown outcome probabilities, and wagers can be a fixed-odds type or a spread-bet type. Wager transactions, including acceptances and confirmations, are executed in real time. Clients can customize displays of events on which they are authorized to wager. Real-time client credit management, automatic dealer hedging, automatic price-spread adjustments, and automatic client and dealer defined wagering limits are also provided.”

Nortel Government Solutions, in collaboration with the Department of Justice (DOJ), built the Joint Automated Booking System (JABS)—a centralized system for automating the collection of fingerprint, photographic and biographic data, submitting this data to the FBI, and sharing it with participating law enforcement agencies nationwide.”