Thursday, April 5, 2012

Presidential Field – FBI Ignores Root-Key Death Threat and KSM Olympic Nukes

Abel Danger’s Presidential Field McConnell claimed today that the FBI is ignoring evidence of a death threat from Khalid Sheikh Mohammed ('KSM') agents who have allegedly been given root-key access needed for a dirty nuke attack on the London 2012 Olympics.

McConnell has notified the FBI of the death threat while inferring from the behavior of his extorted sister Kristine Marcy that KSM’s Femme Comp agents were given root-key access to the UK MoD and US DOD Federal Bridge to support a CBRN attacks on the Thames Diamond Jubilee Pageant (June 3, 2012) or on the closing day of the Olympics (August 12, 2012).

Prequel:
Presidential Field Links Sister’s Silent Witness JABS To KSM Olympic Bombs


FBCA root key compromised through Nortel patent pool in custody of Al Gore’s Apple“In a stunning reversal, U.S. Attorney General Eric Holder announced on Apr. 4 that the Department of Justice was dropping charges filed secretly in 2009 against the 9/11 plotters, including professed plot mastermind Khalid Sheikh Mohammed, clearing the way for the five to be tried in a military court at Guantánamo Bay, where they have been imprisoned since 2006 (NYT, Washington Post, CNN, BBC, Telegraph).”

Obama’s mentor Bernardine Dohrn – Plus ca change?

“DOJ: FBI digital counterintelligence weakened by focus on child porn ... Cyberattacks are at an all time high; FBI [allegedly misdirected by Kristine Marcy's associates in DOJ Pride] spends twice as much effort fighting porn By Kevin Fogarty 3 comments April 29, 2011, 11:35 AM — Despite its growing digital surveillance capabilities and increasing responsibility for investigating and countering cyber attacks on the U.S., the FBI's core cyber security division turns out to be basically incompetent, according to a critical report from the Dept. of Justice. Part of the reason is that the 14 agencies that share some responsibility for online counter-espionage don't share information well. Another contributor is the lack of effective pressure from top managers to get agents trained in national-security intrusion topics and tactics. Most of the reason is that the FBI spends twice as much effort investigating child porn as it does attempts by foreign governments to attack U.S. facilities or steal information that would damage U.S. national security, the report found. To put that in perspective, the number of foreign attacks on the U.S. increased 40 percent between 2007 and 2008, according to the report, whose data are pretty old for such a sensitive topic. An April study from McAfee showed 80 percent of utilities in 14 countries had been attacked during the previous year, an increase of almost 50 percent compared to the year before. Attacks ranged from distributed denial of services to intrusions to remove data to intrusions that attempted to take control of the utility's internal IT systems.”

“Computerworld Missing PKI Root Key Causes a Panic Attack .. A potentially compromised root key threatens to undermine the entire corporate public-key infrastructure. … By Vince Tuesday February 3, 2003 12:00 .. A junior staff member, whom I'll call "Bob," had taken over Nick's work and couldn't find the test root key when he tried to issue test private keys for our customers. While searching on the server that held these files, he discovered that someone had logged in using Nick's account and deleted it. In a public-key infrastructure (PKI), everything boils down to the root key. If you have the root key, you can issue your own keys for any part of the system and pretend to be whomever you like. .. Meanwhile, I made an angry call to the telephone company and chased down the heads of the systems operations group, which quickly plugged the holes and corrected the process. It seemed that Nick had merely meant to clear up his files and free up disk space. No harm had been done. Or had it? Bob connected to the NT share, one of our companywide temporary file-sharing spaces that's open to all users. He navigated to the directory used by his team, then went to the section for the test keys, in a folder called Test. But what was the folder next to it, called Live? My heart missed a beat. The keys to our live system are produced under total care and close supervision, processed on machines not connected to external networks and carefully encrypted whenever they are transferred to backups. I pictured the result of them lying around on a wide-open NT share available to thousands of staffers. We would have to shut down our key systems, investigate all access to confirm it was legitimate and notify all users. The humiliation and ridicule from our customers and competitors would be huge. "Live?" I asked in a nervous tone. "Don't worry," Bob said. "Someone just added the directory to keep the structure consistent with all our others. We always have a Live and Test. Look, it's empty -- always has been." I checked the backup logs to confirm that Bob was correct before letting out along sigh of relief. By concentrating all the trust and security of the system into a few small files, PKI does limit what you have to protect and makes it easier to focus your efforts. But PKI's root key also makes it easier for things to go horribly wrong, as my experience shows. What Do You Think? This week's journal is written by a real security manager, "Vince Tuesday," whose name and employer have been disguised for obvious reasons. Contact him at vince.tuesday@hushmail.com, or join the discussion in our forum: QuickLink a1590

http://publicintelligence.net/ufouo-u-s-army-network-operations-netops-manual/ 2-28. These events and incidents (both initiated by potential or actual adversaries or by Army users or administrators as a result of carelessness or non-compliance) are identified by the IA and CND communities into categories that include: Category 1: root level intrusion (incident) unauthorized privileged access (administrative or root access to a DOD system). Category 2: user-level intrusion (incident) unauthorized non-privileged access (user-level permissions) to a DOD system. Category 3: unsuccessful activity attempt (event) attempt to gain unauthorized access to the system that is defeated by normal defensive mechanisms. Attempt fails to gain access to the system (e.g., attacker attempt valid or potentially valid username and password combinations) and the activity cannot be characterized by as exploratory scanning. Category 4: denial of service (incident) activity that impairs, impedes, or halts normal functionality of a system or network. Category 5: non-compliance activity (event) activity that due to DOD actions (or non-actions) makes an IT system potentially vulnerable (e.g., missing security patches, connections across security domains, installation of vulnerable applications, etc.). Category 6: reconnaissance (event) an activity (scan or probe) that seeks to identify a computer, an open port, an open service, or any combination thereof for later exploit. Category 7: malicious logic (incident) installation of malicious software (e.g., Trojan, backdoor, virus, or worm).”

“Welcone toi Femme Copm Inc (FCI) Our Company For more than three decades, FCI has provided the highest quality Systems Engineering and Technical Assistance (SETA) solutions and Advisory and Assistance Services (A&AS) to the Department of Defense. We are: • Customer focused. • Core competent in Engineering Services, Information Technology, Enterprise Architecture, C4IT Strategy Planning and Implementation, Space, C4ISR, Operational, and Program Management Support. • Ranked 27th on the list of 100 largest and most successful woman-owned federal contractor businesses by Federal Times in 2010. • Headquartered in Chantilly, Virginia with offices in Hanover, Maryland (Fort Meade) and Colorado Springs, Colorado. Network Operations (NetOps) Toolset Implementation … Implementing a Network Operations (NETOPS) Toolset solution is a complex and challenging undertaking. FCI’s enterprise solutions team has the practical knowledge and real world experience to reduce the risk and ensure your implementation is planned and executed with precision and accuracy to address your needs in the context of your situation. Our domain expertise crosses all the crucial NETOPS implementation areas: - eHealth and Spectrum - Systems Center [Re] Configuration Manager (SCCM) - Systems Center Operations Manager (SCOM) - Security Information Management Systems (SIMS) - Hardware and Software Procurement Services - Enterprise-Wide NETOPS Infrastructure Design, Testing, and Global Integration - Certification and Accreditation Support - Information Technology (IT) Systems Engineering and Integration - Integrated Logistics Support (ILS) – Training”

“Counter Terror Expo [infiltrated by KSM agents] is the critically acclaimed, highly specialised, event for those who are tasked with the demanding and complex role of delivering a robust defence against the threat posed from international terrorism. … Conference Programmes Date and Times: DAY ONE Global Counter Terrorism Conference Day One – 0800 – 1730 Critical National Infrastructure Conference Day One – 0800 – 1730 SOLD OUT Protecting Crowded Places Conference Day One – 0800 – 1730 The Cost of Terrorism to Business - Best Practice Risk Management – 0900 – 1700 SOLD OUT DAY TWO Global Counter Terrorism Conference Day Two – 0800 – 1630 Critical National Infrastructure Conference Day Two – 0900 – 1600 Protecting Crowded Places Conference Day Two – 0800 – 1630 Cyber Security & Electronic Terrorism - 0800 - 1630 The Grand Hall, Olympia is located in West Kensington and offers a purpose built venue for conferences and exhibitions. The centre is in an ideal and central location which is serviced well by all modes of transport.”

“Field Forensics manufactures ELITE EL100 and EL240 explosives detection kits and IDEX explosive precursor identifiers. ELITE and IDEX kits are pocket sized, extremely accurate, simple to use, reliable, and work in any environment. The EL100 can detect trace (or bulk) amounts of ALL nitrogen based explosives. The EL240 can detect and identify extremely dangerous HME's made with peroxides and chlorates. This is the only pocket sized test that works on powders, liquids, and vapors. IDEX Identifiers help police and military units identify substances that are used in manufacturing HME's. Each kit is pocket sized and can be used to retain evidence.”

“GENERAL DYNAMICS [FBCA root key compromised] UK LIMITED Castleham Road St Leonards-on-Sea East Sussex TN38 9NJ UK +44 (0) 1424798109 +44 (0) 1424798009 www.generaldynamics.uk.com General Dynamics UK will be at the Counter Terror Expo to showcase its 50 years experience of protecting critical national infrastructure around the world. As a leading integrator of defence and security systems, the Company has a global capability in security and resilience solutions, including deployable security command facilities, installation surveillance and protection for ports, transport and vital energy infrastructure, and urban ISTAR situational awareness. The Company provides configurable strategic and tactical shelter solutions for command and communications, together with the vital systems that enable personnel to live and work in hostile environments. CCTV / Surveillance Equipment | Communication Systems | Covert Surveillance | Information Management and Security Systems | Night Vision Equipment | Perimeter Security and Intrusion Detection | Sighting and Image Recording and Processing | Systems Integrator

“KI CANADA I CBRN medical countermeasures | CBRNE Detection and Protection | Emergency Response Equipment |Explosive Ordnance Disposal / Improvised Explosive Device Disposal | Personal Protection Equipment | Personal Protective Clothing | Training & Simulation

“NORTHROP GRUMMAN [FBCA root key compromised] .. Unit 5, Quinn Close Manor Park, Whitley Coventry West Midlands CV3 4LH UK +44 (0) 2476516041 www.northropgrumman.com Northrop Grumman is a leading global security company and provider of advanced information solutions for defence, intelligence, civil agency and commercial customers around the world. We offer a wide range of integrated security capabilities including command and control, counter IED and remote bomb disposal, critical infrastructure protection, surveillance and intelligence, emergency services interoperability and border security. Our C4I systems are network enabled theatre and battle command systems which provide decision superiority and mission-enabling solutions. Our unmanned ground vehicle systems are used by military and civil customers to perform hazardous activities such as bomb disposal and surveillance of hostile environments. .. CBRNE Detection and Protection | Communication Systems | Explosive Ordnance Disposal / Improvised Explosive Device Disposal

Athletics at the 2012 Summer Olympics is scheduled to be held during the last 10 days of the games, from August 3 to August 12, 2012, at the Olympic Stadium. The Olympic sport of athletics is split into four distinct sets of events: track and field events, road running events, and racewalking events. Road events will begin and end at The Mall. The competition will see around 2000 athletes competing in 47 events with both men and women having very similar schedule of events. Men will compete in 24 events and while women in 23, as the women's schedule lackes the 50 km race walk. In addition, both the men's 110 m hurdles and decathlon are reflected in the women's schedule by the 100 m hurdles and heptathlon, respectively.”

“The Queen’s Diamond Jubilee Programme of Events and Central Weekend Official celebrations for The Queen’s Diamond Jubilee will take place over a central weekend between Saturday 2 June and Tuesday 5 June 2012. .. Sunday 3 June The Big Jubilee Lunch – people will be encouraged to share lunch with neighbours and friends as part of the Diamond Jubilee celebrations. The Thames Diamond Jubilee Pageant – up to 1,000 boats, assembled from across the UK, the Commonwealth and around the world, will sail down the Thames. The Queen will lead the flotilla in the Royal Barge.”

“Russ Mansford’s name is synonymous with emergency preparedness; his work focusing on the ambulance service’s input to major incident planning throughout England and Wales. In a career that spans 38 years’ operational expertise in ambulance services – most of it spent in London - Russ has been involved in the management of some of the defining major incidents of recent times. These include the Moorgate tube train disaster of 1975 and the aftermath of the various IRA bombs throughout the 70’s and 80’s, through to the Southall and Paddington train crashes of more recent times. For many years Russ has been an active member of various influential working groups and committees in the civil contingency field, including the London Resilience Team working on cross-government emergency planning, where he led the work on CBRN (Chemical, Biological, Radiological and Nuclear) resilience planning for London. In 2004, Russ became the Strategic Ambulance Adviser to the Department of Health in Whitehall, where he is responsible for developing a broad range of specialist ambulance service programmes as part of the Department’s overall health service response to major incidents or hazardous situations. These include directing the implementation of the HART (Hazardous Area Response Team) Programme across all NHS ambulance trusts in England; managing the ambulance service’s links with the British armed forces; the introduction of mobile emergency response incident teams (MERITs); pandemic influenza planning for ambulance services; various projects linked to the security services and all other CBRN-related work streams. Aside from the strategic side of his role, Russ also has a direct operational role within the Department of Health as part of the response to major incidents both in the UK and abroad where British Nationals are involved. This has so far included such notable events as the December 2004 Tsunami in Asia, the July 2005 terrorist bombings in London [during a phony PKI exercise involving compromised root key] and the large-scale floods across Yorkshire and Gloucester in 2007. .. Update on HART progress and linkages with emergency preparedness structures in the NHS … Preparations for the Olympic and Paralympic games …Examples of work to date and future developments”


As part of his Presidential Field election campaign, McConnell is now asking for Secret Service protection until he and his fellow veterans have had an opportunity to neutralize the source of the murder-for-hire death threat and the possible detonation of a dirty nuke at the Thames Diamond Jubilee Pageant or the London Olympics.


1 comment:

  1. The event security Bristol personnels where all over the place to witness this event. It was truly amazing!

    ReplyDelete

Note: Only a member of this blog may post a comment.

Looking into our circumstances...