June 3, 2011
Dear Prime Minister Harper:
Trudeau VeriSign bait and Entrust switch for al-Qaeda's cat bond 911
Abel Danger believes that Crown Agents’ Sister Lena Trudeau used a Verisign bait and Entrust switch strategy to produce “the first live-broadcast mass snuff film in human history” on 911 and trigger ‘al-Qaeda’ catastrophe (cat) bonds for the clients of KPMG.
Check LT # 57
Abel Danger Mischief Makers - Mistress of the Revels - 'Man-In-The-Middle' Attacks
Check Vicky Huhne # 10
Pattern of the Times
Here is the bait:
Here is the switch:
And here is al-Qaeda 911:
“57. Lena E. Trudeau (nee SOS Children's Villages breeding station?) [Revised May 24, 2011; Vice President at National Academy of Public Administration; allegedly led NAPA insider-trading conspiracies with employees of U.S. Coast Guard, Federal Emergency Management Agency, Environmental Protection Agency, Department of State and the National Park Service; allegedly used Entrust PKI to authorize sabotage of the BP/Deepwater Horizon project and trigger credit-default swaps and phony cat-bond claims through D2 Banking; director of Collaboration Project to leverage web 2.0 and overthrow sovereign governments with a BAFL.P matrix of racketeering community organizers c.f. President Obama's Open Government Initiative; sponsor of serial acts of political corruption after Grand Jury rights had been abolished in Canada in 1984 by Pierre Elliott Trudeau and thereby allow crony private equity groups such as CAI the usufruct of taxpayer-funded assets; pioneered use of Entrust PKI and Onion Router patents in Privy Council murder for hire; she brings over 15 years of consulting and management experience to the National Academy; former Vice President of Consulting Services for Ambit Group in federal marketplaces; former insider of Touchstone Consulting (now SRA, Inc.); former Marketing Manager, Nokia Enterprise Solutions; allegedly integrated Nokia PCD with Bombardier electronic warfare systems to support Matrix 5 attacks; former consultant to Canadian Privy Councillors such as Maurice Strong; allegedly implemented Entrust public key infrastructure to support the delegation of Privy Council authority to Bombardier EW pilot Russell Williams to produce snuff film of murder of JonBenet Ramsey in 1996 and initiate the 911 attack on U.S. government; MBA Richard Ivey School of Business at the University of Western Ontario; Bachelor of Social Science in Political Science and Philosophy from University of Ottawa; co-principal with NAPA president Kristine Marcy in alleged racketeering-influenced and corrupt organization of Bombardier/Nokia in Matrix 5 murder for hire]”
“[Evidence of identity fraud using a Verisign bait and Entrust switch strategy allegedly set up in the ‘90s by Lena Trudeau at the Canadian Privy Council and Nokia and Kristine Marcy at DOJ Pride, Con Air and SBA 8(a)] By CBC News, cbc.ca, Updated: June 2, 2011 10:12 PM Hackers stole secret Canadian government data Hackers who attacked two of Canada's federal departments stole classified information before being discovered last January, CBC News has learned. The revelation comes from documents obtained under Access to Information laws, and contradicts what the minister in charge said at the time. Six months ago, hackers launched an unprecedented cyber attack on the federal government. In January, the government's computer system came under attack. Hackers sent malicious emails to staff that appeared to be coming from senior managers. When staff opened the attachments, hackers found a path into the federal network, providing access to classified information. "Indications are that data has been exfiltrated and that privileged accounts have been compromised," said a memo written Jan. 31, 2011. Former Treasury Board president Stockwell Day said he was never told that any classified information was stolen from government computers. "Certainly, on the information that I got, I had full confidence that the systems had moved quickly to shut down, that significant information had not in fact been carried away, and that the ongoing assessment of that by the technicians continues," he told CBC News on Thursday. Day said up until he retired as minister, he was told the information was safe. "All the information that I had been getting, up until the point when I was no longer minister, the folders were protected. The walls had been breached, but it looked like the folders were protected, and now comes the painstaking work of seeing if in fact everything was maintained." [Information used by Correctional Services of Canada to engineer Taliban Great Escape] Day didn't run for re-election May 2 but was considered minister until the new minister, Tony Clement, was sworn in on May 18. Today, the Department of Finance and the Treasury Board are still limiting internet access to their workers. Employees take laptops to Ottawa coffee shops, or work from home. The departments now have separate computer stations on each floor — systems that are not part of the government's computer network. That's where workers can go to access websites they need for research and policy work. If those computers are taken, people do their surfing at a coffee shop. CBC News contacted all the departments involved, including Public Safety, and none had any further comment. Access documents show the communications response to the cyber attack has been carefully monitored and scripted. Former auditor general Sheila Fraser raised alarms in 2002, saying that cybersecurity was not up to snuff and warned about "weaknesses in the system." She urged an overhaul to deal with the vulnerabilities, but found not much had changed when she checked again three years later. In May, 2010, a top secret memo from CSIS, Canada's spy agency, warned that cyber-attacks on government, university and industry computers had been growing "substantially."”
“[Evidence that Canadian Privy Council consultant Lena Turner used Entrust to set up phony root authorities for Office of the Lord President of the Council – incumbent on 911, Robin Cook – thereby enabling insiders to build an al-Qaeda virtual private network integrated with Verisign’s .tv Tuvalu and Kristine Marcy’s SBA Matrix 5 communities] News Releases A “Giant Leap Forward” For U.K. On-line Government Apr 29, 2003 Office of the e-Envoy selects Entrust to secure online government collaboration in the U.K. 29 Apr 2003 LONDON - Today marks a significant milestone in the U.K. Government's drive to provide secure government services. The Office of the e-Envoy announced it has selected Entrust Inc. [NASDAQ: ENTU], a world leader in securing digital identities and information, to provide the U.K. Government's National Root certificate authority, enabling the public sector to connect securely. An operational National Root certificate authority is a key building block in the creation of a secure infrastructure to enable U.K. Government to securely exchange information. The Communications-Electronics Security Group (CESG), the information assurance arm of Government Communications Headquarters (GCHQ) and the national technical authority for securing electronic information, will host and operate the National Root. Commenting on the announcement, Andrew Pinder, the U.K. Government's e-Envoy, said: "This announcement represents a giant leap forward in our plans to deliver on-line public services." John Doody, head of Infosec Customer Services at CESG, also hailed this breakthrough: "Reliable security is key to the success of e-government, and the creation of the National Root means that we now have the means to win the trust and confidence of every user. We chose Entrust because they are able to provide a scalable technology solution for our requirements now and in the future. Entrust also has a good understanding of the way e-government initiatives work, having worked with the leading governments worldwide." "As governments move higher value transactions and information online, Entrust's industry-leading security solutions create the accountability and privacy that is required for success," said Bill Conner, chairman, president and chief executive officer at Entrust. "We are very proud to play a part in this major project which we believe will truly transform the way the U.K. Government operates at a local and national level." The National HM Government Root The National HM Government Root is the ultimate point of trust in security systems that authenticate and encrypt transmissions within government. As the final arbiter on matters of mutual trust, the National Root has to be constructed and operated in a highly assured manner to ensure that trust is not undermined. About GCHQ GCHQ - one of the UK's major intelligence and security agencies - is at the leading edge of technology, making innovative advances in computing and engineering on behalf of national security in the fields of both signals intelligence and information assurance. The intelligence which GCHQ provides is at the heart of the struggle against global terrorism and weapons proliferation, and also contributes to the prevention of serious crime. CESG is the information assurance arm of GCHQ and, as the national technical authority, advises government departments and agencies, the armed forces and industry on the security of their communications and information systems. CESG works closely with customers to ensure that sensitive information is properly protected for the national good. GCHQ Press Officer: Bob McNally Tel: 01242 221491 ext 3847: 01242 5 Email: pressoffice@gchq.gsi.gov.uk”
“Verisign, Inc. (NASDAQ: VRSN) is an American company based in Dulles, Virginia that operates a diverse array of network infrastructure, including two of the Internet's thirteen root nameservers, the nameservers for the .com, .net, and .name generic top-level domains and the .cc and .tv country-code top-level domains. Verisign also offers a range of security services, including managed DNS, Distributed Denial of Service (DDOS) mitigation and cyber-threat reporting .. Verisign was founded in 1995 as a spin-off of the RSA Security certification services business. The new company received licenses to key cryptographic patents held by RSA and a time limited non-compete agreement [brokered by Hillary Clinton in preparation for The new company served as a certificate authority (CA) and its initial mission was "providing trust for the Internet and Electronic Commerce through our Digital Authentication services and products." Prior to selling its certificate business to Symantec in 2010, Verisign had more than 3,000,000 certificates in operation for everything from military to financial services and retail applications, making it the largest CA behind the encryption and authentication on the Internet, which most people recognize as the small padlock icon in their Web browser when shopping online. In 2000, Verisign acquired Network Solutions, which operated the .com, .net and .org gTLDs under agreements with the Internet Corporation for Assigned Names and Numbers (ICANN) and the United States Department of Commerce. Those core registry functions formed the basis for Verisign’s naming division, which is now the company’s largest and most significant business unit. Verisign divested the Network Solutions retail (domain name registrar) business in 2003, retaining the domain name registry (wholesale) function as its core Internet addressing business .. Verisign has a very important place in the Internet's DNS infrastructure. Verisign is the authoritative registry operator for two of the most important top-level domains, .com and .net. It is also the contracted registry operator for the .name and .gov top-level domains as well as the country code top-level domains .cc (Cocos Islands) and .tv (Tuvalu [allegedly used by Kristine Marcy at SBA for snuff film 911]). In addition, Verisign is the primary technical subcontractor for the .edu, and .jobs top-level domains for their respective registry operators which are non-profit organizations; in this role Verisign maintains the zone files for these particular domains and host the domains from their domain servers. Registry operators are the "wholesalers" of Internet domain names, while domain name registrars act as the “retailers,” working directly with consumers to register a domain name address. Verisign also operates two of the Internet’s 13 “root servers” which are identified by the letters A-M (Verisign operates the “A” and “J” root servers). The root servers form the top of the hierarchical Domain Name System that supports all Internet communication. Verisign also generates the globally recognized root zone file and is also responsible for processing changes to that file once they are ordered by ICANN and approved by the US Department of Commerce. Changes to the root zone were originally distributed via the A root server, but now they are distributed to all 13 servers via a separate distribution system which Verisign maintains. Verisign is the only one of the 12 root server operators to operate more than one of the 13 root nameservers. The J root serve is anycasted” as a means to increase redundancy and availability and mitigate the threat of a single point of failure. Verisign's Naming and Directory division is headquartered in Sterling, VA in the Loudoun Tech Center. They lease an entire building in that complex which in addition to their offices also houses two mirror data centers which contain their registry services as well as instances of their ATLAS system and root servers. These two data centers also mirror to a third data center located in a separate building in the Broad Run technology park near Dulles Airport. These two facilities are highly secure and are considered critical infrastructure by the Department of Homeland Security which affords them special government protection.”
http://news.ca.msn.com/top-stories/hackers-stole-secret-canadian-government-data
http://www.gaeia.co.uk/TT001.HTM
“RSA Data Security blasts government encryption policy by Ellen Messmer, Network World Fusion (16/01/1998) Office of Management and Budget official Bruce McConnell [Extorted by Kristine Marcy] told conference attendees the government has tested 13 applications using a variety of key-recovery methods from Entrust Technologies, Inc., TIS, IBM's Secret Agent and VeriSign, Inc.” “VeriSign is a major commercial CA with worldwide operations and customer base. Audit: WebTrust CA and WebTrust EV, performed by KPMG: Audit Reports and Management's Assertions .. VeriSign Class 1 Public Primary Certification Authority .. root CA (also known as PCA1-G1-SHA1) has Signature Algorithm SHA-1 .. will supersede PCA1-G1 root .. already included in NSS, which has Signature Algorithm MD2. Modulus (key length) Valid From 1996-01-28 Valid To 2028-08-02 CE:6A:64:A3:09:E4:2F:BB:D9:85:1C:45:3E:64:09:EA:E8:7D:60:F1 Bugs Authorisation (490895), Inclusion (515462) http://www.mozilla.org/projects/security/certs/included/#VeriSign”
Let us know if you or your government’s counter-intelligence experts (CSIS?) don’t know what we are talking about.
http://www.abeldanger.net/
http://groups.yahoo.com/group/hawkscafe/
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.