To whom it may concern
July 19, 2011
Rebekah cutouts with Marcy’s Sun through JonBenét to 911
Abel Danger believes that Crown Agents’ Sisters Rebekah Wade and Kristine Marcy set up Matrix 5 cutouts in the Metropolitan Police and the U.S. Marshals Service with Sun Microsystems’ Mozilla PKI* to backhaul images of the 1996 Christmas Day murder of JonBenét Ramsey and the ‘first live-broadcast mass snuff film in human history’ on 911.
*PKI = public key infrastructure
Prequel
Procured Smythson Bugs - Samantha Cameron And PKI* - Cressida Dick - Equipped Matrix 5 Propaganda Teams - ‘Boston Brakes’ Murder of Princess Diana
Check #1 and #65
Abel Danger Mischief Makers - Mistress of the Revels - 'Man-In-The-Middle' Attacks
“[Evidence that by the time of JonBenet Ramsey’s murder in 1996 and the 911 attacks, Rebekah Woods had equipped Matrix 5 cutouts in the Metropolitan Police and their Interpol and Marshals counterparts with the public key infrastructure needed to support murder for hire through compromised government intelligence networks] Rebekah Brooks - who has now quit as News International [allegedly hacked on 911 by Sun & Sun pedophiles through PKI Services Canary Wharf] chief executive and been arrested over phone hacking and corruption - conquered the macho world of tabloid journalism with astonishing speed. What was behind her rise to power? Rebekah Brooks - as she became following a second marriage - courted power but avoided publicity. The phone-hacking scandal at Rupert Murdoch's News International put her on the back foot, and in the public eye. The commentator Henry Porter, who has written extensively about the power of the Murdoch press, claims little is known of Brooks personally. "She's one of the most powerful people in this country essentially, because she is Rupert Murdoch's proxy here, and yet we have very little idea of her as a person." The sense of mystery he describes certainly applies to Rebekah Brooks' youth. We know she was at school in Cheshire but very little else about her teenage years has been published .. Rebekah Brooks' startlingly brief and opaque Who's Who entry mentions time at the Sorbonne, the prestigious Parisian university, but not whether she took a degree. Colleagues at her first serious job in journalism remember her appearing as suddenly and mysteriously as a genie from a lamp. Graham Ball was the features editor on Eddie Shah's famously short-lived Post newspaper when the 20-year-old Rebekah approached him in its Warrington offices. "She came up to me and said 'I am going to come and work with you on the features desk as the features secretary or administrator'. I said 'I'm afraid that's not going to be possible because next week I'm going to London,' and I thought nothing more of it. The following Monday, I got to our new office in London, and there she was," he said. "She did everything with great finesse, she was very clever." When the Post folded, the then Rebekah Wade moved to the News of the World. The former Mirror editor Roy Greenslade met her just a couple of years after she had joined the News International team. "She encourages you to feel that you're on her team, you're on her side. She'd say 'What should I do about this? How would I handle that?' And of course once you've given that kind of advice, you are much less likely to be critical." Could the implications of phone hacking be as severe for Brooks as for Coulson? When Rebekah Wade took the editor's chair at the News of the World in 2000, she was the youngest editor of a British national newspaper. Not long after her appointment eight-year-old Sarah Payne was murdered by Roy Whiting. Amid the public outcry that followed, Rebekah Wade launched a name-and-shame campaign [using SUN Mozilla PKI] against convicted child sex offenders. The campaign was blamed for encouraging people to take the law into their own hands, and one chief constable called it "grossly irresponsible" .. Well-connected Rebekah Wade moved to edit the Sun in 2003. According to commentator Henry Porter: "She's obviously charming and an extremely adept politician and good at getting on with people, but when it comes to being in the public eye and having to think on your feet, I don't think she's that good." Rebekah Brooks is said to enjoy riding in the Oxfordshire countryside with David Cameron, and she invited the prime minister to her Christmas party. All very much in the best Murdoch tradition, according to Henry Porter. "The Murdoch empire, always thought to be a Conservative organisation, actually is remarkably adaptable to politicians' views and actually doesn't have a strong ideological presence." But the phone-hacking scandal has become a real threat to the interests of the Murdoch empire and its influence. It cost Andy Coulson his job at No 10 - it could cost News International millions of pounds in compensation. And finally, on 15 July, after a relentless build up of pressure, Rebekah Brooks quit as News International chief executive. Her arrest, over phone hacking and corruption allegations, came two days later”
“National Post Concerns about News Corp’s dark practices look likely to spread to the U.S. ... Araminta Wordsworth Jul 19, 2011 – 3:00 PM ET | Last Updated: Jul 19, 2011 4:55 PM ET .. The scandal is spreading, and American authorities are probing two separate lines of inquiry — one into whether Murdoch journalists hacked the phones of September 11, 2001, victims, and one into whether the company broke U.S. law by bribing foreign officials. The Federal Bureau of Investigation [PKI procurement controlled by Kristine Marcy through Napawash] is looking into the 9/11 claim, first floated by the Daily Mirror newspaper, a competitor to Murdoch’s Sun in Britain. The Justice Department, meanwhile, is coming under pressure from American lawmakers to probe whether the company violated the Foreign Corrupt Practices Act by paying British police officers for information. Australia — where Murdoch was born and still owns newspapers — is also considering an investigation. Even if the company is not found to have broken laws, the scandal is shaking all of News Corp, holdings of which spans the globe”
“65. Rebekah Brooks (née Rebekah Mary Wade; born 27 May 1968) [Revised July 19, 2011. Matrix 5 aide to allegedly extorted men-in-the-middle, Rupert Murdoch and his two sons; Matrix 5 former wife of Ross Kemp, the ex-EastEnders actor who once described her as a ‘homophobic cow’; Matrix 5 former boss of NOTW staff who appeared elated when she sacked them and shut down the paper; allegedly recruited into the Matrix 5 extortion racket in the mid’ 80s in Paris by agents of the late Jeanne Sauve, then-Governor General of Canada and patron of SOS Children’s Villages – an alleged, supranational network of pedophile entrapment and oath-taking centers funded by D2 Banking and HSBC out of Canada Square, Canary Wharf; allegedly set up ‘off-campus’ pedophile entrapment centers for alumni, faculty and students at the Sorbonne in Paris; allegedly procured Sun-Mozilla PKI – public key infrastructure – ‘hides’ for clients of Canary Wharf-based PKI Services, including NATO, United Nations and News International cutouts in the U.S. Marshals Service, Interpol and the Metropolitan Police to operate dual-use cells as virtual private networks for sabotage, assassination and deception; allegedly procured PKI where News International can assign journalists or criminals authorized by Crown Agents’ Sisters to track and expose pedophiles, or to entrap and extort them; Wade grew up in Daresbury; she decided she wanted to be a journalist from the age of fourteen; she attended Appleton Hall County Grammar School in Warrington; she worked for French magazine L'architecture d'aujourd'hui in Paris; she returned to Britain to work for Eddy Shah's Messenger Group; she allegedly infiltrated PKI hides into the management of the Sunday newspaper News of the World where she was hired in 1989 as a secretary before being promoted to feature writer and eventually the paper's deputy editor; she allegedly procured PKI ‘hides’ to authorize the NOTW’s routine practice of intercepting mobile phone messages of celebrities, politicians and other public figures; allegedly procured PKI ‘hides’ to entrap James Hewitt, a paramour of Princess Diana, by reserving a hotel suite for an ‘interview’ and "kitting it out with secret tape devices in various flowerpots and cupboards"; allegedly procured PKI ‘hides’ for the News of the World when she returned in 2000 as editor; allegedly procured PKI ‘hides’ to launch a NOTW campaign of "naming and shaming" convicted child sex offenders; allegedly procured PKI ‘hides’ to monitor the murder of Sarah Payne; allegedly procured PKI ‘hides’ to incite mob attacks on suspected pedophiles; allegedly procured PKI ‘hides’ to release information on the basis that it is "only right that the public have controlled access" to information on sex offenders; allegedly procured PKI ‘hides’ in January 2003 after she returned to The Sun, replacing her former boss David Yelland, to become its first female editor; allegedly procured PKI ‘hides’ to generate the "Bonkers Bruno Locked Up" story concerning the mental health problems of former heavyweight boxing champion Frank Bruno; allegedly procured PKI ‘hides’ to monitor Women in Journalism where she once served as chairman; allegedly procured PKI ‘hides’ to monitor "Guardian Student Media Awards" where she served as a judge in November 2003; allegedly procured PKI ‘hides’ to monitor tenth annual Police Bravery Awards sponsored by The Sun where she served as a judge in July 2005; allegedly procured PKI ‘hides’ to infiltrate News International management systems after she left The Sun in September 2009 to become chief executive of the newspaper's parent company; allegedly procured PKI ‘hides’ to authorize NOTW reporter, Clive Goodman, and Glenn Mulcaire, a hired investigator, to intercept the phone messages of members of the royal family; allegedly procured PKI ‘hides’ to authorize payments by her journalists to "... police for information in the past"; allegedly procured PKI ‘hides’ to hack the voicemail of missing schoolgirl Milly Dowler (later found to be murdered) and access or delete messages left by her parents; allegedly procured PKI ‘hides’ to monitor and control leading politicians; allegedly procured PKI ‘hides’ to monitor sex habits (?) of her ‘friends’ Tony and Cherie Blair; allegedly procured PKI ‘hides’ to monitor sex habits (?) of then Prime Minister Gordon Brown, and current Prime Minister David Cameron both of whom attended her 2009 wedding; allegedly procured PKI ‘hides’ to monitor sex habits (?) of Samantha and David Cameron who live near her home in Oxfordshire where they often go horse riding together and have had dinner at each others' homes; she was engaged to actor Ross Kemp (best known as Grant Mitchell in EastEnders) in 1996, and married him in June 2002 in Las Vegas; she did not take Kemp's surname and she was arrested on 3 November 2005, following an alleged assault on her husband; she was later released without charge and the police took no further action; she is referred to in Private Eye as "the slapper" (a pejorative word for a woman of loose morals in Britain, and a pun on the act of slapping); the couple had spent the previous evening in the company of the former Cabinet Minister David Blunkett, who had resigned for the second time on that day; she allegedly procured PKI ‘hides’ to monitor citizens through ID cards originally sponsored by Blunkett, who pioneered the UK government's proposal; she allegedly procured PKI ‘hides’ with Blunkett through Entrust, the Nortel/Ottawa security company which allegedly provided certificate authorities for the 911 attacks and the sabotage of the Deepwater Horizon; allegedly procured PKI ‘hides’ to bug Blunkett who named his budgerigar "Bimbo" to remind him of the secret unlock code for the information on his I.D card; allegedly procured PKI ‘hides’ to monitor and extort the Prince of Wales into support for the global warming scam and the contract killing of deniers on behalf of the NATO Parliamentary Assembly and the Alliance of Small Island States; she repeatedly chose not to attend to give evidence to a cross-party media committee investigating News of the World's phone-hacking; her refusal to attend resulted in four members of the committee "considering asking the serjeant at arms to issue a warrant forcing Brooks to attend"; allegedly procured PKI ‘hides’ to monitor sex life of James Whittingdale, her Facebook friend al least until the week ending 10/7/2011, and control him as the chairman of the Culture, Media and Sport Committee, during the trial (?) of the Murdoch males; allegedly procured PKI ‘hides’ to extort Whittingdale into warning members of the committee not to compel her to testify due to the risk that their personal lives would be investigated in revenge; allegedly procured PKI ‘hides’ to monitor Whittingdale when he worked on international privatisation at NM Rothschild in 1987 and, in January 1988, when he became Political Secretary to Margaret Thatcher through to the time of his election to Parliament in 1992; allegedly procured PKI ‘hides’ to extort support from Dr Thérèse Coffey, a member of the Culture, Media and Sport Committee in the upcoming show trial of the Murdoch males, who has already complained of a "witch hunt" against Wade on the basis that simply to say she was editor at the time is not enough evidence; allegedly procured PKI ‘hides’ to feed bogus information to Coffey that Wade’s own phone is thought to have been tapped and the problems were not "unique to one news group"; allegedly procured PKI ‘hides’ to extort support from Louise Daphne Mensch, a member of the Culture, Media and Sport Committee, in the upcoming show trial of the Murdoch males; allegedly procured PKI ‘hides’ to extort Mensch into the secret June 2011 marriage with Peter Mensch, 19 years her senior who was co-manager of Def Leppard rock group; she allegedly procured Matrix 5 PKI ‘hides’ to extort Peter Mensch and contemporary media leaders into transforming the radical lesbian (les lesbiennes radicales) cult and‘culture’ associated with Pyromania, France and Quebec of the ‘80s into the 'first live broadcast mass snuff film in human history' on 911]”
“[Evidence that by the time of JonBenet Ramsey’s murder in 1996 and the 911 attacks, the former Senior Counsel to U.S. Marshals, Kristine Marcy, had equipped Matrix 5 cutouts with dual-use Sun-Mozilla public key infrastructure to support murder for hire financed by the liquidation of assets seized from or donated by criminal enterprises] US Marshals switch to Red Hat Sun SCO rides off into sunset By Nick Farrell Wed May 31 2006, 12:30 THE UNITED STATES' oldest federal law enforcement agency has switched all its databases to Red Hat Linux. The US Marshals provide [or withhold] protection for the federal judiciary, transport federal prisoners [to pedophile rendition and oath-taking centers], protect [or extort] federal witnesses and manage [liquidate and share kickbacks of] assets seized from criminal enterprises. The service wants to have 80 percent of its production databases and all of its data running on Red Hat Enterprise Linux by the end of June. Currently the outfit runs Sun Microsystems SCO Linux. The Marshals initially used Sun SCO because it ran on the Intel Pentium processors the agency had. But now it estimates it will save $50,000 to $100,000 a year by using Red Hat.”
“[Evidence that by the time of JonBenet Ramsey’s murder in 1996 and the 911 attacks, the former Senior Counsel to U.S. Marshals, Kristine Marcy, was able to generate extorted (?) Matrix 5 cutouts to plead guilty to almost any crime] Time U.S. .. The JonBenet Suspect: A Loner's Life in Thailand By Simon Montlake/Bangkok Thursday, Aug. 17, 2006 John Mark Karr, 41, lived on the ninth floor of a rundown apartment building in a Bangkok district full of similarly rundown buildings and guest houses. For Karr, it was an inexpensive place to reside; apartments in his building rent for as little as $160 a month. Other residents describe him as a dour loner who didn't let anyone into his peripatetic life, traveling in and out of Thailand. An Internet caf� clerk in Karr's building said he was a regular customer who kept a close eye on users in neighboring booths, as if he was afraid they were spying on him. "He never wanted to chat," said Nii, the clerk. "Actually I was afraid of talking to him. He always seemed to be a bad mood. He rushed in, then rushed out." Karr has now let the world into some of his secrets. On Wednesday evening, the wan, sandy-haired one-time grade school teacher arrived at Bangkok's Suan Phlu immigration pen, to spend the night in a solitary cell. The day before, a judge in Boulder, Colorado, had issued an arrest warrant for Karr in the nearly decade-old murder of JonBenet Ramsey, the six-year-old child beauty pageant contestant. Soon after, a small group of plainclothes Thai and U.S. officers arrived at his shabby apartment, where Karr had stayed since arriving from Malaysia in June, on the latest of several trips in recent years to the Thai capital. Later Karr sat silently as U.S. and Thai authorities discussed his case in a press center. The press conference broke up with a photo op of the suspect, who wore a sky-blue polo shirt and beige slacks without a belt. The press corps had begun to fade away when Karr, in a surprise, sent word that he wanted to speak directly to the media, and he was hustled back into the room. I found myself crouched directly in front of him as he sat at the table. His jaw was locked and his eyes darted as the questions began firing. Did he kill JonBenet Ramsey? Karr spoke slowly, his voice low and stuttering. "I was with JonBenet when she died... Her death was an accident." Other questions elicited silence, or pained glances. A "no comment" on his relationship to the Ramsey family. After a few minutes, he glanced upwards at his captors, and they quickly led him away. At the joint U.S.-Thai press conference Lt. Gen. Suwat Tumrongsiskul, head of immigration police, said Karr had admitted killing Ramsey, but had told his interrogators it was "unintentional." "He said he loved the girl," Suwat said. Ann Hurst, a Bangkok attach� of the Department of Homeland Security, said Karr was cooperating with U.S. investigators and had waived his right to a lawyer. Thai officials say Karr could be on a plane back to Boulder as early as the weekend, to face charges of murder, kidnapping and sexual assault of Ramsey. Karr has put up no legal barriers to the extradition, so getting him back to the U.S. will presumably be simply a matter of arranging for the marshals to escort him back to Colorado.”
“[Evidence that by the time of the Ron Brown and JonBenet Ramsey murders in 1996 and the 911 attacks, the former Senior Counsel to U.S. Marshals, Kristine Marcy, had equipped Matrix 5 counterpart cutouts in Interpol and the Metropolitan Police with dual-use Sun-Mozilla public key infrastructure to support murder for hire financed by the liquidation of assets seized from or donated by criminal enterprises] Projects Open source PKI projects include: Network Security Services (NSS) Libraries designed to support [Mozilla] cross-platform development of security-enabled applications. Applications built with NSS can support SSL v2 and v3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509 v3 certificates, and other security standards. Netscape and Sun use NSS to support these standards in a wide range of products, including iPlanet Certificate Management System, Netscape Certificate Management System, iPlanet Web Server, Netscape Enterprise Server, iPlanet Directory Server, Netscape Directory Server, iPlanet Messaging Server, and Netscape Messaging Server. NSS also provides the security foundation for Netscape Communicator.” ... “ I thought export of encryption software from the U.S. was governed by the International Traffic in Arms Regulations. What happened to the ITAR? The ITAR still exist, but are no longer used in the context of export control of encryption software; for this purpose they have been replaced by the EAR. Authority for non-military encryption export was transferred from the U.S. State Department to the U.S. Department of Commerce by Presidential Executive Order 13026 on November 15, 1996, for regulation under the Export Administration Regulations (EAR), along with all other export-controlled commercial products. At that time encryption hardware, software, and technology was transferred from the U.S. Munitions List to the Commerce Control List (CCL) of the EAR. For more information see the document "Principal Statutory Authority for the Export Administration Regulations", which contains a copy of Executive Order 13026.”
“[Evidence that, by the time of the Ron Brown and JonBenet Ramsey murders in 1996 and the 911 attacks, former Senior Counsel to U.S. Marshals, Kristine Marcy, would have known how to procure ‘backdoored’ public key infrastructure to support Matrix 5 cutouts and murder for hire] How can the PKI system fail? First, be assured that PKI is a lot better than any alternative system. All security systems require you to trust something or someone. PKI requires you to trust things a fewer number of times and it scales well to a larger number of participants. Here are some ways it can fail. The private key is revealed to a 3rd party. To prevent this, you must trust the hardware and user interface to your private key store. If your PC has been hacked or infected (easy with many default Microsoft platforms) then the attacker can read your keystrokes and screen so all trust is gone. Ideally, you should have a platform that has a client-side firewall and does not readily execute mail attachments and has pure Java clients (to prevent buffer-overrun attacks). A Linux system with IPTABLES firewall configured and running Club Cycom pure Java software is suitable. A 3rd party masquerades as you or someone false using his own keypair. To prevent this, you must trust that your partners have the correct public key associated with you (and that you have their true public key). The CA is useful here in certifying the association between identity and public key but you must first have the true public key of the CA (usually pre-installed in most software). A 3rd party masquerades as you to the CA and fools the CA into certifying the 3rd party's public key as associated with you. E.g an imposter has obtained a code signing certificate from VeriSign certifying that the imposter is MicroSoft! (it really happened). The level of security here varies with CA. Most will call you back on the telephone and ask you if you are you (please don't lie!). Man-in-the-middle, replay and chosen text attacks. To prevent this you must use secure protocols that consider these attacks. E.g make sure that when you are challenged to use your private key to encrypt or decrypt data, that data was truly random and could not have been specially chosen by the attacker. http://club.cycom.co.uk/whatisPKI.html”
“[Evidence that, by the time of the Ron Brown and JonBenet Ramsey murders in 1996 and the 911 attacks, former Senior Counsel to U.S. Marshals, Kristine Marcy, would have known how to procure ‘backdoored’ public key infrastructure to support Matrix 5 cutouts and murder for hire] Entrust contributes essential PKI technology component to open source community Entrust has supplied a royalty-free license to Sun Microsystems for a key component in an open-source PKI. Entrust’s patent on certificate revocation list points allow greater efficiency and reduced network traffic for managing certificate revocation lists, used to track revoked users’ security credentials and associated rights. Intellectual property issues have slowed the adoption of PKI-enabled applications among the open source community, and Entrust has now increased the value of the applications that use the enhanced open source security libraries. Contribution of PKI technology through Sun Microsystems, Mozilla opens certificate revocation list distribution points DALLAS, July 25–Entrust, Inc. believes that everyone deserves to be secure on the Internet. To support that goal, the layered security expert is contributing public key infrastructure (PKI) technology to the open-source community through Sun Microsystems, Inc. and the Mozilla Foundation. Specifically, Entrust will supply its certificate revocation list distribution points (CRL-DP) patent 5,699,431 to Sun under a royalty-free license for incorporation of that capability into the Mozilla open-source libraries. “When it comes to online security, PKI really is the gold standard. If companies are going to use open-source PKI, we felt it was our duty to make sure they had the important piece of CRL-DP incorporated,” said Entrust Chairman, President and Chief Executive Officer Bill Conner. “To this day, PKI remains one of the strongest, most-trusted security infrastructures available. The ability to leverage the technology to solve a variety of security challenges makes it the cornerstone of a layered security model – regardless of its intended purpose or objective.” Certificate revocation lists (CRL) are used to track revoked users’ security credentials and associated rights. CRL-DPs are a key aspect of secure and robust PKI deployments and allow for efficient distribution and processing of revocation lists. Specifically, CRL-DPs partition a revocation list into more manageable pieces and allow greater efficiency, improved performance and reduced network traffic. “Having support for CRL-DPs is an increasingly essential ingredient to any PKI-enabled application,” said Karen Tegan Padir, vice president, software infrastructure Sun Microsystems. “We appreciate Entrust’s intellectual property contribution, and we are pleased to share this valuable security resource with the open-source community.” As part of the agreement, Sun Microsystems will incorporate the CRL-DP capability into the Mozilla Network Security Services (NSS) libraries. Under the flexible Mozilla licensing scheme, users of these libraries will have access to the CRL-DP capability and may use the associated NSS code under the terms of any of the Mozilla Public License (MPL), GNU General Public License (GPL), or GNU Lesser General Public License (LGPL). “Incorporating the CRL-DP capability into our existing NSS libraries will significantly elevate the value of the PKI-enabled applications that use these libraries,” said Frank Hecker, executive director of the Mozilla Foundation. “We are grateful Entrust wanted to participate in this offering and understands that secure technology like PKI is too important not to provide to the open-source community.” About Entrust Entrust secures digital identities and information for consumers, enterprises and governments in 1,650 organizations spanning 60 countries. Leveraging a layered security approach to address growing risks, Entrust solutions help secure the most common digital identity and information protection pain points in an organization. These include SSL, authentication, fraud detection, shared data protection and e-mail security. For information, call 888-690-2424, e-mail entrust@entrust.com or visit http://www.entrust.com. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All Entrust product names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited. All other company and product names are trademarks or registered trademarks of their respective owners. Sun, Sun Microsystems, and Java are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries.”
1. Kristine Marcy (nee McConnell) [Revised July 19 2011: Kristine Marcy is currently the President and Chief Executive Officer of Washington D.C.-based NAPA (The National Academy of Public Administration); she and her Matrix 5 colleagues set up a revolving fund (# 15X4275) with assets confiscated from the drug trade to finance illegal modifications to aircraft to support EW/ELINT contract hits executed through the U.S. Justice Prisoner and Alien Transportation System (‘Con Air’); through brokers of Women @ Sidley, Marcy procured ‘Con Air’ Lear Jet aircraft which had been designed by Bombardier's homicidal EW pilot, Russell Williams to support an Entrust chain of command and the decoy-and-drone maneuvers of 911; Marcy allegedly sabotaged continuity of government protocols during Matrix 5’s phony war-game exercise on 911; she allegedly staged the war games with bogus Entrust cutout identities such as the ‘al-Qaeda’ operatives allegedly created by the Canadian Privy Council and ‘advised’ by the recently appointed NAPA vice president Lena Trudeau; given her role in building Matrix 5 hit teams inside targeted sovereign governments, Marcy is now recognized by Abel Danger as the most dangerous woman in America; Marcy was allegedly recruited into Matrix 5 in the 1964-1968 period at pedophile oath-taking ceremonies designed by Canadian depopulationist Maurice Strong for the mothers, aunties, ‘clients’ and sponsors of SOS Children’s Villages; she was an alleged witness to crimes of the type described in Strong’s paper in the archives of Harvard University, “Mau Mau oath ceremonies – Kenya 1954”; she was an alleged participant in sexual oath-taking ceremonies, organized off campus by Odd Fellows or Rebekah cult leaders to entrap students and faculty at targeted universities; Marcy allegedly infiltrated Matrix 5 hit teams into George Washington University, University of Chicago and Northwestern University (she visited Chicago in July 1966 prior to alleged Matrix 5 contract killing of Valerie Percy), University of Hawaii BA French and Georgetown University where she took an MFS, master foreign service; she is an alleged user of Tuvalu .tv root authority from Privy Council in Britain to support Matrix 5 pedophile entrapment, sexual extortion and snuff-film murder for hire; Marcy is an alleged handler of Matrix 5 communities `B.A.F.L.P.' – pronounced ‘baffle-pee’ – where acronym stands for (a) Bankers associated with the Bombardier Master Trust, HSBC and Rothschild who helped to launder drug money through the DOJ Pride revolving funds and liquidate targeted SBA 8(a) companies on 911 (b) Anglophones associated with the U.S. Senior Executive Service which Marcy launched in 1979 (c) Francophones associated with Femme Comp Inc C4 which she launched in 1979 (d) Lesbians associated with the DOJ Pride community which Marcy founded in 1994 and, (e) Pedophiles associated with rendition and logistics of the US Justice Prisoner and Alien Transportation System (‘Con Air’) which Marcy founded in 1995; in 1969, after the pedophile Kray Twins had received a life sentence for murder, Matrix 5 leaders ‘placed’ Marcy as a `sextortionist' aide to Donald Rumsfeld, Dick Cheney and Frank Carlucci in Robert Sargent Shriver, Jr.'s Office of Economic Opportunity; evidence of ongoing [wo]man-in-the-middle extortion of top officials in FBI, ICE USIS, DNS, Reduction in Recruitment (RIR) and ATF etc; evidence of her organizing the theft of PROMIS from owners and translation into French for La Sûreté du Québec and Francophonie 9/11; evidence Marcy is a psychopath from her recent 'Mindless Breathers - Useless Breeders' comment to her brother, Field McConnell; evidence of pedophile trade and Tuvalu snuff-film .tv joint venture between Marcy’s associates in the U.S. Justice Prisoner and Alien Transportation System and Krayleigh Enterprises; evidence of Marcy’s use of SBA 8(a) military-industrial patent pool devices including Unabombs, QRS11 gyroscopes, Smacsonic and Onion Router at Waco, Murrah Building and 9/11 crime scenes; evidence Marcy auctioned off SBA 8(a) CDOs with patented-device liquidation rights to D2 Banking and KPMG clients at Canary Wharf; evidence Marcy exfiltrated U.S. Marshals from Murrah Building OKC before initiating bombs; allegedly procured public key infrastructure – PKI – for a .tv show of the torture murder of JonBenet Ramsey on Christmas Day 1996; evidence Marcy organized the execution of Timothy McVeigh as a cutout patsy; evidence she used .tv snuff films to blackmail Office of Personnel Management; evidence she has prevented release of `paperclip' passport files which would otherwise show Obama's status as CUKC alien and a victim of Matrix 5 pedophile grooming by Frank Marshall Davis and his grandparents; evidence Marcy forced U.S. patent office to re-assign liquidation rights in patent pool devices including .tv encryption to Crown Agents' Worshipful Company of Spectacle Makers; allegedly Marcy used Entrust PKI to set up cutouts for 911 such as Lynn McNulty who designed ‘al-Qaeda’ Onion Routes, Dr. David Finkleman who sent Onion Router relay messages via ALPA pilots to al-Qaeda gyroscopes, Gen. Ralph E. Eberhart, Commander in Chief, NORAD and Commander USNORTHCOM in Cheyenne Mountain, who stood down the U.S. Air Force, Rear Admiral Gordon Piche who used the U.S. Coast Guard in posse comitatus, Robert Mueller who opened a backdoor into FBI CSI, Bruce McConnell who stole Entrust public keys, Robert Hanssen who set up bogus continuity of government protocols and John Mark Kerr who claimed to have killed JonBenét Ramsey; collectively, these extorted victims give Marcy and her Matrix 5 colleagues the power to set up the President of the United States himself as an Entrust PKI cutout for a WMD attack on America from an on-campus elite and the traitors within the gates]"
http://www.abeldanger.net/
I can't believe I would be the first to comment! I've been unable to join the chat forum and fully participate, but here goes. As a woman, who could not escape early seventies feminist indoctrination,the Lesbian aspect of Abel Danger's Matrix 5 conspiracy allegations, along with the macho Dectective story format of disclosure was a little jarring at first. BUT I AM HOOKED! Synchronicity is ablaze in my own mind now and I would love to share some of what I know myself. What a crazy, upside down world we live in! My own grandmother was one of the first sufferagettes allowed to attend Oxford University in 1920. I would love to attend the 911 party, goading Bullingdon Bullies!
ReplyDelete