Friday, May 27, 2011

Entrust Public Key Infrastructure - 911 Attacks - JPATS* Aircraft Executed Autopilot Maneuvers - Lansdowne Technologies - Al-Qaeda Takes The Rap

May 27, 2011

Dear Prime Minister Harper:

Did Kristine Marcy and Trudeau love child authorize Entrust 911?

Abel Danger believes the late Canadian Privy councilor Pierre Elliot Trudeau equipped Crown Agents’ Sisters Kristine Marcy and Lena Trudeau – an alleged love child – with Entrust public key infrastructure used to authorize 911 attacks where JPATS* aircraft executed autopilot maneuvers, coordinated by Lansdowne Technologies but falsely attributed to al-Qaeda. See #1 and #56:

Abel Danger Mischief Makers - Mistress of the Revels - 'Man-In-The-Middle' Attacks

JPATS = United States Justice Prisoner and Alien Transportation System a.k.a. Con Air

“The Justice Prisoner and Alien Transportation System (JPATS), nicknamed "Con Air", is an agency of the federal government of the United States charged with the transportation of persons in legal custody between prisons, detaining centers, courthouses, and other locations. It is the largest prison transport network in the world. Though primarily used by the Federal Bureau of Prisons or U.S. Immigration and Customs Enforcement, JPATS also assists military and state law enforcement. The agency is managed by the United States Marshals Service out of the JPATS headquarters in Kansas City, Missouri. JPATS was formed in 1995 from the merger of the Marshals Service air fleet with that of the Immigration and Naturalization Service. JPATS transports more than a quarter million prisoners and aliens each year. Air fleet operations are located in Oklahoma City, Oklahoma, with hubs in Anchorage, Alaska; Mesa, Arizona; Alexandria, Louisiana; and the Virgin Islands. Additionally, the Federal Transfer Center at Oklahoma City's Will Rogers World Airport was built especially to facilitate prisoner transport on JPATS. Usually, the airline employs Boeing 727 or McDonnell-Douglas MD-83 aircraft to transport convicts and illegal residents of the United States for extradition. Smaller jets and turboprops are also used to transport individual prisoners who are considered particularly dangerous. According to the Boeing Jetliner Databook, JPATS operates four Boeing 727s. JPATS also operates an additional four McDonnell Douglas MD-80 aircraft. JPATS aircraft use the ICAO designator DOJ with the callsign JUSTICE. During ATC Zero immediately after the September 11, 2001 attacks, when the Federal Aviation Administration grounded all civilian air service, JPATS was the only non-military air service allowed to continue flying in U.S. airspace [Allegedly using Bombardier EW and Entrust PKI ergo U.S. air space was under the control of Lena Trudeau's Canadian Privy Councillors!] Prior to the existence of JPATS, the transport of federal inmates over long distances was complicated. The process required an escort by two U.S. Marshals, accompanying the inmate on a regular passenger airplane. This posed numerous problems, including danger to civilians, a backlog of marshals needed to perform such escorts, and a high taxpayer expense. In the early 1970s, the U.S. Marshals were offered a transfer from the Federal Aviation Administration (FAA) of a Boeing 727 aircraft. Though no purpose was originally designated for this plane, one official had the idea of using it for the mass transportation of federal inmates. JPATS' predecessor was the National Prisoner Transportation System of the U.S. Marshals Service. The airline ultimately improved the efficiency of inmate transportation and made the sight of a shackled commercial airline passenger largely a thing of the past. For a plane full of 200 inmates, only 12 marshals are required. Marshals are trained with aircraft emergency procedures very similar to those flight attendants learn to protect the aircraft's occupants. JPATS today Today's JPATS fleet has expanded to ten full-sized aircraft. These planes fly a large series of routes that serve nearly every major U.S. city. The flight schedule is kept secret from the public, and is known only to those directly involved in its operation. Passengers scheduled to fly are given little advance notice of their flight. There are several benefits of keeping the schedule secret including: the location of airplanes is not known to the public (especially to those who may have an interest in sabotaging a flight or harming any of its passengers). as inmates are taken by surprise, they cannot plan their own escape or arrange with outsiders to aid their escape from custody. Passengers aboard a flight are restrained with handcuffs as well as ankle and waist chains which are double or even triple locked. Those who pose additional danger may be given additional restraints, such as reinforced mittens that completely isolate and almost completely immobilize the hands and face masks to prevent biting and spitting. Flight and seating arrangements are made carefully with the intent to separate inmates who may be of conflict to one another. Members of rival prison gangs may be transported on different days to help reduce the risk of an in-flight incident. Unlike the practice in most jails, male and female inmates fly together on the same planes. Prisoners are not physically restrained to the seats due to Federal Aviation Administration safety regulations. This contrasts with the practice on most other modes of transport.”

“The concepts and use of Public Key Infrastructure were discovered by British scientists in GCHQ in 1969 with Ellis. After the re-discovery and commercial use of PKI by Rivest, Shamir, Diffie and others, the British government considered releasing the records of GCHQ's successes in this field. However, the untimely publication of Spycatcher meant that the government once again issued a gag order and full details of GCHQ achievement were never revealed. The public disclosure of both secure key exchange and asymmetric key algorithms in 1976 by Diffie, Hellman, Rivest, Shamir, and Adleman [RSA cryptographic system] changed secure communications entirely. With the further development of high speed digital electronic communications (the Internet and its predecessors), a need became evident for ways in which users could securely communicate with each other, and as a further consequence of that, for ways in which users could be sure with whom they were actually interacting.” .. “1 Introduction There are three families of public-key cryptography in common use today. The most widely used systems are those based on integer factorization. In particular, the RSA cryptographic system is perhaps the most popular public-key algorithm. It is used in most web browsers (for SSL), email packages (for S/MIME) as well as within the Entrust family of products [procured for the use of Canadian Privy councilors by Lena Trudeau]. Systems based on the discrete logarithm problem are also very popular as they can provide support for both digital signatures (with DSA) and key agreement (with the Diffie-Hellman algorithm). Traditionally Entrust has supported both of these families of cryptographic algorithms.”

“RSA was founded by (and named after) the inventors of public key cryptography: Ron Rivest, Adi Shamir and Leonard Adleman. The RSA algorithm is the most widely used method of implementing public key cryptography and has been deployed in more than one billion applications worldwide. Their innovation, the RSA algorithm, solved a daunting challenge in network security: how to enable secure yet transparent exchange of encrypted communications between users and enterprises that are strangers to each other. RSA SecurID 700 Authenticator A quarter-century later, the RSA algorithm is a foundation of network and Internet security and a key enabler of e-commerce. It is the most widely used method of implementing public key cryptography and has been deployed in more than one billion applications worldwide. Another key RSA innovation, time-synchronous authentication, which was invented in 1986, has also demonstrated remarkable longevity. As the technology that underlies many of the company’s strong authentication solutions, including RSA SecurID® tokens, time-synchronous authentication allows enterprises to verify a user’s identity with a high degree of certainty.”

Exclusive: Hackers breached U.S. contractors (SecureID compromise)
Reuters ^ | 5/27/11 Posted on Friday, May 27, 2011 3:09:17 PM by markomalley
Unknown hackers have broken into the security networks of Lockheed Martin Corp (LMT.N) and several other U.S. military contractors, a source with direct knowledge of the attacks told Reuters. They breached security systems designed to keep out intruders by creating duplicates to "SecurID" electronic keys from EMC Corp's (EMC.N) RSA security division, said the person who was not authorized to publicly discuss the matter.

“Lansdowne [Staff prepared war game script for 911 decoy and drone maneuvers with Thales QRS11 flight boxes and JPATS aircraft using authorization from Canadian Privy council through Lena Trudeau] is pleased to have worked with a wide variety of client organizations including Federal, provincial and municipal government departments, crown corporations, private sector companies, and non-profit community groups. A sample of our previous clients is listed below.

Program & Business Management
Health Canada
Canadian Coordinating Office for Health Technology Royal Canadian Mounted Police
Canada Border Services Agency
Department of National Defence
Canadian Coast Guard
Canadian Coats Guard
Project Management
Canadian Coast Guard
Canadian Passport Office
Department of National Defence
Canadian Space Agency
Proposal Management
Canderel Corporation
Cascade Aerospace
CMC Electronics
Seaway Marine Transport
Thales [Manufacturer of QRS11 autopilot flight boxes illegally exported by Boeing]
Rafael Armaments Industries
BAE Systems
Lockheed Martin Canada
Top Aces
Security & Emergency Management
City of Ottawa
Transport Canada
Government of BC
Royal Canadian Mounted Police
Canadian Nuclear Safety Commission
Parks Canada
Procurement Management
Royal Canadian Mounted Police
Department of Foreign Affairs and International Trade
Communications Security Establishment [Entrust users on 911]
Canadian Space Agency”

Your comments are welcome, mais votre silence à cet égard est assourdissant.

http://www.abeldanger.net/
http://groups.yahoo.com/group/hawkscafe/

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Looking into our circumstances...