‘DEADFOO7’computer virus (‘deadfoot’) – clandestine nuclear-weapons procurement – Guild of Contract Hits – D2 Banking’s digital-data archives

Source: Hawks Cafe; Captain Sherlock; Abel Danger

November 27, 2010

Dear Nigel Farage:

DEADFOO7 Captain Sherlock kicks D2 Banking nuclear butt

Abel Danger asks UKIP to honor the late Gareth Williams who placed ‘DEADFOO7’ as a mis-spelling of ‘DEADFOOT’ in an MI-6 computer virus which has led members of our Captain Sherlock team to a clandestine nuclear-weapons procurement network operated through Crown Agents’ Sisters (see notes) and D2 Banking clients at Canary Wharf.

Our KSM agents have evidence that Crown Agents’ Sisters led by Kristine Marcy, Vicky Huhne, Hillary Clinton and Darleen Druyun, set up a virtual nuclear-procurement network for pedophile extortionists in what we call a, Guild of Common Purpose or Guild of Contract Hits.

This open letter is a warning to Crown Agents Sisters and their pedophile associates that everything has consequences, especially the use of D2 Banking’s digital-data archives in the backhauling, post-processing and sale of online content which allegedly shows the snuff-film torture killing of Mr. Williams in 2010 and JonBenet Ramsey on Christmas Day in 1996.

“[Evidence suggests that counter-intelligence experts and double or triple agents have infiltrated Crown Agents Sisters’ extorted man-in-the-middle positions and weapons procurement networks] The Next Generation of Private & Corporate Banking D2-Banking – Data custody and Digital banking – is the guaranteed custody of genomic maps and medical records [of participation in pedophile oath-taking ceremonies by – for example – the Mau Mau grandfather and father of Barack Obama]; art, photo, music and [snuff-film] video collections; personal files including wills, deeds and memoirs; and other intellectual property alongside traditional financial services. “Before the end of this decade every individual around the world will have the convenience and guaranteed security of one stop D2-Banking, which will become second nature to its customers as they enjoy the ability to store and access data and finances from anywhere at anytime without fear of being hacked or plagued by malicious software.” DK Matai, Executive Chairman, mi2g D2-Banking™ is an holistic approach to banking, which has evolved over the last eight years from eDFi™ to create the next generation of wealth management. D2-Banking utilises mi2g’s award winning Bespoke Security Architecture™ pedigree to deliver combined digital banking and data custody services with guaranteed security. The first phase of the D2-Banking™ initiative was completed on 17th December 2003, the same day as the first centenary of the Wright Brothers’ powered flight from Kitty Hawk, North Carolina. The Executive Summary for D2-Banking™ in pdf format can be accessed from here. Please contact us to find out more about delivering combined digital banking and data custody services. Renowned worldwide for the ATCA Briefings. Subscribe now HomeProfile ValuesPeopleCareersPartnersContact Us D2 BankingBespoke Security ArchitectureDigital Risk Management – Tools Intelligence Briefings – Brochures – Case Studies – SIPS Methodology FAQ (pdf) Keynote Speeches – ArticlesNews FeedsGlossary (pdf)

“[Evidence suggests that counter-intelligence experts and double or triple agents have infiltrated Crown Agents Sisters’ extorted man-in-the-middle positions and weapons procurement networks] In the 20th century, this would have been a job for James Bond. The mission: Infiltrate the highly advanced, securely guarded enemy headquarters where scientists in the clutches of an evil master are secretly building a weapon that can destroy the world. Then render that weapon harmless and escape undetected. But in the 21st century, Bond doesn’t get the call. Instead, the job is handled by a suave and very sophisticated secret computer worm, a jumble of code called Stuxnet, which in the last year has not only crippled Iran’s nuclear program but has caused a major rethinking of computer security around the globe. Intelligence agencies, computer security companies and the nuclear industry have been trying to analyze the worm since it was discovered in June by a Belarus-based company that was doing business in Iran. And what they’ve all found, says Sean McGurk, the Homeland Security Department’s acting director of national cyber security and communications integration, is a “game changer.” The construction of the worm was so advanced, it was “like the arrival of an F-35 into a World War I battlefield,” says Ralph Langner, the computer expert who was the first to sound the alarm about Stuxnet. Others have called it the first “weaponized” computer virus. Simply put, Stuxnet is an incredibly advanced, undetectable computer worm that took years to construct and was designed to jump from computer to computer until it found the specific, protected control system that it aimed to destroy: Iran’s nuclear enrichment program. The target was seemingly impenetrable; for security reasons, it lay several stories underground and was not connected to the World Wide Web. And that meant Stuxnet had to act as sort of a computer cruise missile: As it made its passage through a set of unconnected computers, it had to grow and adapt to security measures and other changes until it reached one that could bring it into the nuclear facility. When it ultimately found its target, it would have to secretly manipulate it until it was so compromised it ceased normal functions. And finally, after the job was done, the worm would have to destroy itself without leaving a trace. That is what we are learning happened at Iran’s nuclear facilities — both at Natanz, which houses the centrifuge arrays used for processing uranium into nuclear fuel, and, to a lesser extent, at Bushehr, Iran’s nuclear power plant. At Natanz, for almost 17 months, Stuxnet quietly worked its way into the system and targeted a specific component — the frequency converters made by the German equipment manufacturer Siemans that regulated the speed of the spinning centrifuges used to create nuclear fuel. The worm then took control of the speed at which the centrifuges spun, making them turn so fast in a quick burst that they would be damaged but not destroyed. And at the same time, the worm masked that change in speed from being discovered at the centrifuges’ control panel. At Bushehr, meanwhile, a second secret set of codes, which Langner called “digital warheads,” targeted the Russian-built power plant’s massive steam turbine. Here’s how it worked, according to experts who have examined the worm: –The nuclear facility in Iran runs an “air gap” security system, meaning it has no connections to the Web, making it secure from outside penetration. Stuxnet was designed and sent into the area around Iran’s Natanz nuclear power plant — just how may never be known — to infect a number of computers on the assumption that someone working in the plant would take work home on a flash drive, acquire the worm and then bring it back to the plant. –Once the worm was inside the plant, the next step was to get the computer system there to trust it and allow it into the system. That was accomplished because the worm contained a “digital certificate” stolen from JMicron, a large company in an industrial park in Taiwan. (When the worm was later discovered it quickly replaced the original digital certificate with another certificate, also stolen from another company, Realtek, a few doors down in the same industrial park in Taiwan.) –Once allowed entry, the worm contained four “Zero Day” elements in its first target, the Windows 7 operating system that controlled the overall operation of the plant. Zero Day elements are rare and extremely valuable vulnerabilities in a computer system that can be exploited only once. Two of the vulnerabilities were known, but the other two had never been discovered. Experts say no hacker would waste Zero Days in that manner. –After penetrating the Windows 7 operating system, the code then targeted the “frequency converters” that ran the centrifuges. To do that it used specifications from the manufacturers of the converters. One was Vacon, a Finnish Company, and the other Fararo Paya, an Iranian company. What surprises experts at this step is that the Iranian company was so secret that not even the IAEA knew about it. –The worm also knew that the complex control system that ran the centrifuges was built by Siemans, the German manufacturer, and — remarkably — how that system worked as well and how to mask its activities from it. –Masking itself from the plant’s security and other systems, the worm then ordered the centrifuges to rotate extremely fast, and then to slow down precipitously. This damaged the converter, the centrifuges and the bearings, and it corrupted the uranium in the tubes. It also left Iranian nuclear engineers wondering what was wrong, as computer checks showed no malfunctions in the operating system. Estimates are that this went on for more than a year, leaving the Iranian program in chaos. And as it did, the worm grew and adapted throughout the system. As new worms entered the system, they would meet and adapt and become increasingly sophisticated. During this time the worms reported back to two servers that had to be run by intelligence agencies, one in Denmark and one in Malaysia. The servers monitored the worms and were shut down once the worm had infiltrated Natanz. Efforts to find those servers since then have yielded no results. This went on until June of last year, when a Belarusan company [Crown Agents proxy] working on the Iranian power plant in Beshehr discovered it in one of its machines. It quickly put out a notice on a Web network monitored by computer security experts around the world. Ordinarily these experts would immediately begin tracing the worm and dissecting it, looking for clues about its origin and other details. But that didn’t happen, because within minutes all the alert sites came under attack and were inoperative for 24 hours. “I had to use e-mail to send notices but I couldn’t reach everyone. Whoever made the worm had a full day to eliminate all traces of the worm that might lead us them,” Eric Byers, a computer security expert who has examined the Stuxnet. “No hacker could have done that.” Experts, including inspectors from the International Atomic Energy Agency, say that, despite Iran’s claims to the contrary, the worm was successful in its goal: causing confusion among Iran’s nuclear engineers and disabling their nuclear program. Because of the secrecy surrounding the Iranian program, no one can be certain of the full extent of the damage. But sources inside Iran and elsewhere say that the Iranian centrifuge program has been operating far below its capacity and that the uranium enrichment program had “stagnated” during the time the worm penetrated the underground facility. Only 4,000 of the 9,000 centrifuges Iran was known to have were put into use. Some suspect that is because of the critical need to replace ones that were damaged. And the limited number of those in use dwindled to an estimated 3,700 as problems engulfed their operation. IAEA inspectors say the sabotage better explains the slowness of the program, which they had earlier attributed to poor equipment manufacturing and management problems. As Iranians struggled with the setbacks, they began searching for signs of sabotage. From inside Iran there have been unconfirmed reports that the head of the plant was fired shortly after the worm wended its way into the system and began creating technical problems, and that some scientists who were suspected of espionage disappeared or were executed. And counter intelligence agents began monitoring all communications between scientists at the site, creating a climate of fear and paranoia. Iran has adamantly stated that its nuclear program has not been hit by the bug. But in doing so it has backhandedly confirmed that its nuclear facilities were compromised. When Hamid Alipour, head of the nation’s Information Technology Company, announced in September that 30,000 Iranian computers had been hit by the worm but the nuclear facilities were safe, he added that among those hit were the personal computers of the scientists at the nuclear facilities. Experts say that Natanz and Bushehr could not have escaped the worm if it was in their engineers’ computers. “We brought it into our lab to study it and even with precautions it spread everywhere at incredible speed,” Byres said. “The worm was designed not to destroy the plants but to make them ineffective. By changing the rotation speeds, the bearings quickly wear out and the equipment has to be replaced and repaired. The speed changes also impact the quality of the uranium processed in the centrifuges creating technical problems that make the plant ineffective,” he explained. In other words the worm was designed to allow the Iranian program to continue but never succeed, and never to know why. One additional impact that can be attributed to the worm, according to David Albright of the Center for Strategic and International Studies, is that “the lives of the scientists working in the facility have become a living hell because of counter-intelligence agents brought into the plant” to battle the breach. Ironically, even after its discovery, the worm has succeeded in slowing down Iran’s reputed effort to build an atomic weapon. And Langer says that the efforts by the Iranians to cleanse Stuxnet from their system “will probably take another year to complete,” and during that time the plant will not be able to function anywhere normally. But as the extent of the worm’s capabilities is being understood, its genius and complexity has created another perplexing question: Who did it? Speculation on the worm’s origin initially focused on hackers or even companies trying to disrupt competitors. But as engineers tore apart the virus they learned not only the depth of the code, its complex targeting mechanism, (despite infecting more than 100,000 computers it has only done damage at Natanz,) the enormous amount of work that went into it—Microsoft estimated that it consumed 10,000 man days of labor– and about what the worm knew, the clues narrowed the number of players that have the capabilities to create it to a handful. “This is what nation-states build, if their only other option would be to go to war,” Joseph Wouk, an Israeli security expert wrote. Byers is more certain. “It is a military weapon,” he said. And much of what the worm “knew” could only have come from a consortium of Western intelligence agencies, experts who have examined the code now believe. Originally, all eyes turned toward Israel’s intelligence agencies. Engineers examining the worm found “clues” that hinted at Israel’s involvement. In one case they found the word “Myrtus” embedded in the code and argued that it was a reference to Esther, the biblical figure who saved the ancient Jewish state from the Persians. But computer experts say “Myrtus” is more likely a common reference to “My RTUS,” or remote terminal units. Langer argues that no single Western intelligence agency had the skills to pull this off alone. The most likely answer, he says, is that a consortium of intelligence agencies worked together to build the cyber bomb. And he says the most likely confederates are the United States, because it has the technical skills to make the virus, Germany, because reverse-engineering Sieman’s product would have taken years without it, and Russia, because of its familiarity with both the Iranian nuclear plant and Sieman’s systems. There is one clue that was left in the code that may tell us all we need to know. Embedded in different section of the code is another common computer language reference, but this one is misspelled. Instead of saying “DEADFOOT,” a term stolen from pilots meaning a failed engine, this one reads “DEADFOO7.” Yes, OO7 has returned — as a computer worm [through MI-6’s late, great Gareth Williams]. Stuxnet. Shaken, not stirred.”

“[Evidence suggests that counter-intelligence experts and double or triple agents have infiltrated Crown Agents Sisters’ extorted man-in-the-middle positions and weapons procurement networks] Gareth Williams was brought into close proximity to US intelligence, Islamic radicals and Middle Eastern agents. He would rub shoulders with the Russians, too, according to a foreign intelligence analyst based in the UK, who described how technology and software honed by GCHQ was deployed in tracking a Moscow-backed sleeper cell to which Britain had been alerted as early as 2003. The case blew up in June 2010 when 10 people were arrested in the US and accused of being part of an espionage ring. One of them, a glamorous 28-year-old called Anna Chapman [a Crown Agents Sister and pedophile extortionist], had lived for five years in the UK. According to the former GCHQ contractor, “Williams had been obsessed by the case, its methodology and characters.” He was now on secondment to MI6, with its focus on foreign targets and intelligence-gathering, becoming more of a spy than a desk-bound technician, although Williams would shortly be called back to GCHQ to work on a new and ambitious project. He had been liaising again with counterparts at the NSA, who were part of an effort to create an American cyber defence policy, to prevent the siphoning off of secret or commercially sensitive data or a military style assault on defence or civil systems. Its importance was alluded to last month in a speech by home secretary Theresa May, in which she identified cyber crime as among the pre-eminent future threats facing the UK. A cyber crimes specialist who knew Williams revealed that at the time of his death he was researching British vulnerability to Russian, Turkish and Chinese gangs: “He was already on top of it.” Rogue individuals and nation states, Islamist terror groups and radical loners, extortionists and organised criminals – these were just some of those Williams had observed, investigated, disrupted and provoked. Any one of them was capable of reciprocating, lethally. Back at the Yard, Operation Finlayson detectives were looking at a vast range of potential threats, but still had few clues, no accomplices or even a plausible denouement for a man whose personal and professional inclinations were to camouflage everything he did. By September, an exhaustive trawl had come up with some CCTV footage. In the frames released to the public, Gareth Williams saunters by Holland Park tube station in west London at 3pm on 14 August, three days after he had last spoken to his sister. Staff at the nearby Valerie’s Patisserie said that in the week before, a man fitting Gareth’s description had spent several hours in the cafe on consecutive days, sitting at the rear with a laptop, receiving occasional visitors. One security source said that he believed Williams was “working” in west London – monitoring one of the many foreign embassies in the area – just as he had been “working” while on his recent “holiday” to the US. Police released footage of Williams on 15 August, too. At 2pm, he was filmed at a cash machine, visiting Harrods, walking at 2.30pm via Hans Crescent in Knightsbridge towards Sloane Street. Soon after he vanished. By the end of September, after a second barrage of toxicology tests proved inconclusive, Gareth Williams’s body was released and laid to rest in North Wales. On 26 September, the extended Williams clan gathered outside the Bethel chapel in Holyhead to bid farewell. Given the florid rumours that had circulated around his death, they were surprised by the appearance there of Sir John Sawers, head of MI6. Williams had been with his service for less than a year, yet Sawyers told reporters, “I wanted to be here today as the only public face of the Secret Intelligence Service. My deepest sympathies go to the family. Gareth was a hugely talented person, and he was very modest and generous as well. He did really valuable work with us in the cause of national security.” What a difference 30 days make. After an investigation that had failed to turn up the smallest vice, Williams was no longer lampooned but celebrated as a very British spy: modest, capable and known well by no one’”

“[Evidence suggests that counter-intelligence experts and double or triple agents have infiltrated Crown Agents Sisters’ extorted man-in-the-middle positions and weapons procurement networks] Darleen A. Druyun (born November 7, 1947) is a former United States Air Force civilian official (Principle Deputy Undersecretary of the Air Force for Acquisition) and Boeing executive. Education Druyun graduated from Chaminade University of Honolulu and the executive education program at the Kennedy School of Government at Harvard University Controversies Air Force For more details on this topic, see United States Air Force tanker contract controversy. In 1993 Darleen Druyun was investigated for her involvement in a plan to speed up payments by the Air Force to McDonnell Douglas. Although several other people involved were discharged, Druyun kept her position. In 2000 Druyun sent the resumes of her daughter, a recent college graduate, and her daughter’s fiancé, a published PhD Aeronautical Engineer, to Boeing and both were hired. Although this was a conflict of interest, it was not illegal. After leaving the Air Force in 2003 she took a job with Boeing at an annual salary of $250,000 She also received a $50,000 signing bonus. Boeing In May 2003, the United States Air Force announced it would lease 100 KC-767 tankers to replace the oldest 136 of its KC-135s. The 10 year lease would give the USAF the option to purchase the aircraft at the end of the contract. In September 2003, responding to critics who argued that the lease was vastly more expensive than an outright purchase, the United States Department of Defense announced a revised lease. In November 2003, the Air Force decided it would lease 20 KC-767 aircraft and purchase 80 tankers. Buying one KC-767 outright costs $150 million. The contract called for 100 aircraft being purchased or leased at an aggregate price of $26b, or $260m per plane. Therefore, the contract, if it had been executed, would have forced the DOD to pay Boeing much more money for each plane than it would have had to if the aircraft were purchased individually. In December 2003, the Pentagon announced the project was to be frozen while an investigation of allegations of corruption by Druyun (who had moved to Boeing in January 2003) was begun. Druyun pleaded guilty to inflating the price of the contract to favor her future employer and to passing information on the competing Airbus A330 MRTT bid (from EADS). In October 2004, she was sentenced to nine months in jail for corruption, fined $5,000, given three years of supervised release and 150 hours of community service. She began her prison term on January 5, 2005. She was released from prison on September 30, 2005. The ramifications extended to Boeing CFO Michael M. Sears, who was fired from Boeing, and Boeing CEO Phil Condit resigned. On February 18, 2005, Sears was sentenced to four months in prison. Boeing ended up paying a $615 million fine for their involvement. According to The Federal Times, Darleen Druyun will still be receiving a federal pension. CBS News called it “the biggest Pentagon scandal in 20 years” and said that she pled guilty to a felony. Druyun was also found guilty in awarding the initial Small Diameter Bomb contract to Boeing. Donald Rumsfeld [former boss of Kristine Marcy in 1969] stated that he was told that “what she did was acquire a great deal of authority and make a lot of decisions, and there was very little adult supervision.”

“[Evidence suggests Crown Agents Sisters’ extorted man-in-the-middle positions and nuclear-weapons procurement and delivery networks have been infiltrated by counter-intelligence experts and double or even triple agents] Over 36 hours on August 29-30 2007, six AGM-129_ACM Air Launched Cruise Missiles each containing one W80_(nuclear_warhead) were removed from safeguarded weapons storage facilities at the Minot AFB in North Dakota, loaded aboard a B-52 bomber and flown 1500 miles to Barksdale AFB in Louisiana. While removed from secure storage, these weapons passed through six separate links in the chain of custody without being discovered, without being visually inspected and were left unguarded and unsecured on the runways of both Minot and Barksdale for 15 hours and 12 hours respectively before the Ordnance Unloading Team at Barksdale discovered the error, established a security zone and activated a Nuclear Security Alert to further safeguard the warheads. Attempting to conceal the incident as part of the DOD’s policy on neither confirming nor denying the presence of nuclear weapons, Defense Secretary Robert Gates notified President Bush and ordered in internal Air Force Investigation of the incident, the first of it’s kind in the 40+ years of nuclear weapons handling. This lasted 6 days until the story of the incident was broken by the Military Times, quoting unnamed sources and picked up by the MSM. Soon after, the Air Force announced that the Minot Munitions Squadron commander was relieved of command and 25 airmen were disciplined. They also assured the public that the weapons never left the custody of Air force personnel and the public was never in danger. The results of that investigation saw the commanders of the 5th Bomb wing and the 5th Maintenance Group at Minot and the 2nd Operations Group at Barksdale relieved of command, four senior NCOs of the 5th Bomb Wing received “administrative action”, all personnel of the 5th Bomb Wing were stripped of their nuclear certifications, 65 airmen lost their Personnel_Reliability_Program certifications [tScheme] and all tactical weapons ferry operations were suspended, citing: “There has been an erosion of adherence to weapons-handling standards at Minot Air Force Base and at Barksdale Air Force Base.” Additionally, the Inspector General offices of all USAF major commands with a nuclear mission were tasked to conduct “Limited Nuclear Surety Inspections” at every nuclear-capable unit under Defense_Threat_Reduction_Agency oversight. This prompted Gates to appoint retired USAF General Larry Welch to lead a special Defense Science Board to study the mishap in the context of the overall review of all nuclear weapons handling policies and procedures. That report was released in February of 2008 and is available for viewing here

Please study the text, links and notes and do the right thing.

https://abeldanger.blogspot.com/
http://www.captainsherlock.com/

“Note (i): List of Crown Agents Sisters who allegedly use pedophile actors to extort ‘man-in-the-middle’ leaders and execute Livery Company bordereaux frauds on family trusts .. 1. Kristine Marcy (nee McConnell) [Sold SBA 8(a) CDOs to D2 Banking and KPMG clients at Canary Wharf; LGBT pedophile extortion through DOJ Pride; launched Femme Comp Inc. C4 in 1979; Minder for Bruce McConnell White House PKI; Con Air; JPATS; Oracle-Serco; Robert Hanssen’s S.E.S. handler; PROMIS theft and translation into French for Sûreté du Québec; USIS; DNS; ICE; U.S. Marshals at Murrah; Timothy McVeigh decoy maneuvers; Reduction in Recruitment (RIR) for illegals in preparation for 9/11; Obama’s alien CUKC Passport; Unabombs; National Academy of Public Administration of FBI and ICE; ‘Mindless Breathers – Useless Breeders’ comment to brother Field McConnell] 2. Annabel Lucy Veronica Astor, Viscountess Astor (nee 1948 Jones) [CEO of OKA Direct, a home furnishings design company; former owner and designer of Annabel Jones jewellery business in London; daughter Samantha wife of British Prime Minister and Conservative Party leader David Cameron; she is daughter of Timothy Angus Jones and his wife Patricia David “Pandora” Clifford; her mother married secondly in 1961 to Michael Astor, based in London when the Metropolitan Police and House of Lords was controlled in a pedophile protection racket by the Kray Twins; paternal grandparents were Sir Roderick Jones, the Chairman of Reuters, and the novelist Enid Bagnold; Her mother Pandora Clifford was the daughter of the Hon. Sir Bede Edmund Hugh Clifford (son of William Hugh Clifford 10th Baron Clifford of Chudleigh, a descendant of King Charles II of England) by his wife Alice Devin Gundry] 3. Samantha Cameron (nee Sheffield) [Wife of former Jardine Matheson’s ‘Jump-Ship’ Dave ‘The Rave’ Cameron; Assigned colour code pink to Smythson passport covers and travel accessories used in sex tourism; Astor heroin family; nickname ‘Smoky’; underage groupie for Tricky and Massive Attack; Oracle-Menzies Aviation and Newspaper Distribution; Princess Di’s Boston Brakes; Reuters pump and dump] 4.. Dame Stephanie “Steve” Shirley [First Master Worshipful Company of Information Technologists; funded City base to the tune of £5 million; alleged sponsor of D2 Banking digital data archives of pedophile snuff films; head of Shirley Trust; patron of think-tank Tomorrow’s Company; radical feminist; born 1933 during the last (?) year of Lustmord and hyperinflation in Weimar Republic allegedly orchestrated by Crown Agents; parents sold (?) five-year-old as unaccompanied refugee, vulnerable to pedophile abuse to England; researcher at Post Office in Dollis Hill, London; resigned from ICL; launched Flexible Information (FI) for women at home] 5. Cressida Dick (nee Dick) [Sextortion of police with LGBT groups; Entrapment Bullingdon Club, Oxford; Metropolitan Police; Metronet and Sohonet integration; Airwave, TETRA; My Range; Walled Garden radios; man-in-the-middle crime scene of threats to life, contracts to kill, kidnap, hostage, organised drug dealing; other criminal networks, gun supply, shootings and gun crime homicide; Specialist Operations surveillance of Ministers, VIP’s and Royal Family; opportunity to use Boston Brakes in alleged 1997 assassination of Princess Diana; Common Purpose extortion of leaders] 6. Eliza Manningham-Buller [Oracle-MI5-CIA, Airwave; Money laundered with Net1, CRYPTOCard and Entrust technologies; Amec-Spie TETRA, Serco, Promis, K-Branch, IRA, Pan Am 103, NetJets 9/12, 7/7, RAF Brize Norton, Rendition, Waterboarding, Daughter Reginald Manningham-Buller of Bodkin’s Dope Inc. case] 7. Paule Gauthier [Chair of SIRC 1996-2005 through the development of CANARIE and alleged use of Piggy’s Palace as Crown-registered charity for sexual extortion of top officials] 8. France Desmarais (nee Chrétien) [Daughter former Prime Minister of Canada Jean Chrétien. Husband Andre Desmarais; Special Assistant, Minister of Justice of Canada; Power Financial Corp; Groupe Bruxelles Lambert S.A.; Great-West Lifeco Inc. and Great-West Life Assurance Company; Pargesa Holding S.A.; Bertelsmann AG; Seagram; Director of Bombardier Inc.-Metronet, until 2004; Vivendi; Canada China Business Council; Chief Executive’s Council of International Advisers of The Government of the Hong Kong Special Administrative Region; CITIC International Advisory Council; Canadian Executive, United States Executive, Canadian Investment and Credit, United States Investment and Credit and Corporate Management Committees] [Husband is David Emerson, former Canadian foreign minister; “son-in-law of China”; director MDA co-developer of Final Approach and MindBox debt recovery software used through 9/11, Fannie Mae and BP-Deepwater Horizon bordereaux insurance frauds] 9. Theresa Emerson (nee Yeuk-Si Tang)10. Jamie Gorelick [Oracle-Fannie Mae, David Emerson, MindBox, DOJ Pride, Vince Foster, Waco, Promis, 9/11 Wall, Schlumberger, Transocean, BP Cancelled Cement Job, Sabotage] 11. Hillary Clinton (nee Rodham) [Crown Agents’ USAID-SBA liquidations; Gyroscope QRS11; Patent on NetJets Boeing and Gulfstream V devices for 9/11] [Oracle-LSE For You, Matrix Terrorists, Law of the European Union, European Convention on Human Rights] 12. Cherie Blair (nee Booth)[Oracle-LSE For You, Matrix Terrorists, Law of the European Union, European Convention on Human Rights]13. Michelle Obama (nee Robinson) [Oracle- AT&T CIA Henry Bienen, Princeton, Sidley Austin, Union Carbide Bhopal] 14. Miriam Clegg [Oracle DLA Piper head of international trade law practice, clients Standard Chartered Bank, wife of Lord President of the Council Nick Clegg, late Robin Cook passports for ‘al-Qaeda’ illegals, BBC Royal Charter, exclusive alliance in corporate finance, tax, ICT, telecommunications, public private partnerships, infrastructure, energy and aviation] [Oracle-Northwestern University, Unabomb, Weather Underground, Rwanda Genocide, Torture Paradigms and Practice] 16. Mary Harron [Oracle-Netflix DVD American Psycho, Weather Underground, Bondage S&M, SCUM, Former girlfriend of Tony Blair at Oxford University] 15. Bernardine Dohrn [Oracle-Northwestern University, Unabomb, Weather Underground, Rwanda Genocide, Torture Paradigms and Practice] 16. Mary Harron [Oracle-Netflix DVD American Psycho, Weather Underground, Bondage S&M, SCUM, Former girlfriend of Tony Blair at Oxford University]17. Charlotte Bryan [Oracle-Serco FAA Contract Towers FC-KU crime scenes of 9/11] 18. Lucy Adams [Director/sponsor of LGBT quotas and ‘Diversity Dividend’ in Serco and BBC; Women in London’s Economy conference; Government must provide incentives and penalties for procurers to commit to diversity; Ascension Island transmission towers used to broadcast snuff films on 9/11 and 7/7] 19. Vicky Huhne (nee Pryce) [UK Government Economic Service, Greek, LSE Fabian, KPMG ‘abusive’ tax shelters; KGEN lesbians; Company Voluntary Arrangements with “bordereau” insurance cover for liquidation of extorted borrowers, Exxon Valdez, Military Bank, Williams & Glyn’s Bank, Royal Bank of Scotland, Department for Trade and Industry, FTI; cuckolded by Chris Huhne Secretary of State for Energy and Climate Change for bisexual Carina Trimingham] 20. Alison Woodhams [BBC World Service COO since 2004; BBC Group Financial Controller 2001-04; used AT & T Istel and Net1 to reward special weapons and tactics and propaganda teams deployed through BBC World Service Ascension Island in 43 languages] 21. Baroness Sue Garden (nee Button) [Wife late 9/11 war-game maestro Tim Garden, Volunteer Citizens’ Advice Bureaux, welfare counsellor, military caseworker, City & Guilds vocational qualifications [Launderers] 1988 – 2000, advisory until 2008, member World Traders’ Livery Company since 2000, Master 2008-09, spokesperson in Lords for Children, Schools and Families] 22. Lynne Ann Cheney (nee Vincent) [PEOC on 9/11; Lockheed director 1994 to 2001, Sisters novel portrays rape and depictions of lesbian sex] 23. Nancy Pelosi (nee D’Alesandro) [Speaker U.S United States House Representatives; Appropriations and Intelligence Committees. Son Paul Pelosi Jr.; Cisco Urban Development for Metronet tracking of victims; NASA Ames Research Center, AirPatrol Corporation; Bank of America Securities, Bank of America; Countrywide MindBox loan-recovery bordereaux for contract hits on 9/11 et al and JP Morgan] 24. Anna Chapman (nee Kushchenko) [Sextortionist and organizer of sex tourism at Barclays, NetJets and Navigator Asset Management in the City of London and for various mortgage bordereaux brokers in New York; KIT-Fortis in Russia and Belgium; Pleaded guilty to a charge of conspiracy to act as an agent of a foreign government; deported to Russia July 8, 2010 in Russia-United States’ crony prisoner swap on Con Air and covert NetJets aircraft] 25. Linda Wright (nee Pickton) [former Kerrisdale realtor mortgage bordereau on Piggy’s Palace Burns Road site; brothers served as sextorted men in the middle; allegedly used Burnaby AirPatrol / ADT security network to track killers and victims and transmit snuff film content from FC-KU crime scenes (Femme Comp Inc on Ku band)] 26. Mila Mulroney (nee Milica Pivnički) [On the Take, decade of crime, greed and corruption at 24 Sussex Drive; husband former Canadian Prime Minister Brian Mulroney; opening ceremony Canada Square; shoe fetishist; Balkans War. Alleged sextortion of husband and Yves Fortier, his former boss at Ogilvy Renault, Oxford University Rhodes Scholar (1960), Security Council (October 1989); London Court of International Arbitration Development through the 9/11] 27. Julia Middleton (nee Morland) [Common Purpose; French lycee; Economics degree LSE. CP supporters; BBC business editor Robert Peston, Metropolitan Police Assistant Deputy Commissioner Cressida Dick and many TOPOFFS; Uses Civilia FRS8 exemption to launder money for members in central and local government, Houses of Parliament, police, military, legal profession, BBC, NHS, church, 8,500 quangos, education, social services, civil service, and regional development agencies; Founder DEMOS with Obama and Rockefeller Brothers Fund; $64 trillion Carbon Disclosure Project, Media Standards Trust with Salz of Rothschild), Good Governance Network, Impetus Trust, and Alfanar] 28. Anne Elizabeth Sikorski (nee Applebaum) [Husband Polish Foreign Minister Radoslaw Sikorski, a Bullingdon ‘Blood and Steal’ Club member with David Cameron and Boris Johnson; supports Roland Polanski, snuff-film producer and pedophile rapist; Father is Harvey M. Applebaum, Covington and Burling partner with A-G Holder; Marshall Scholar, London School of Economics (1987); St Antony’s College, Oxford; Warsaw, Poland 1988 for The Economist; former editor at The Spectator; Former columnist for Daily Telegraph and Sunday Telegraph ergo spins for The Stationers] 29. Jana Clemmow (nee Bennett) [Husband owner of Juniper peer to peer media production company andOxford buddy of Blair. She linked to U.S. Discovery Communications; Director Vision BBC Fiction, Knowledge, Children’s and Entertainment, in-house TV and multi-media content through BBC Vision Productions; claimed £4,862 in expenses for taxi fares in 3 months to make confidential calls “in private”] 30.. Laura Liswood (nee Liswood) [Women and Power – Mechanisms to Advance Women’s Leadership; SCREAM pay-per-view; Council of Women World Leaders, Managing Director, Global Leadership and Diversity for Goldman Sachs; Abacus extorts men to allow a woman President of the United States; former GM Pacific Northwest and TWA; Boston Consulting Group; author ‘Serving Them Right’ and ‘ The Loudest Duck’; Seattle’s Women’s Commission; Seattle Woman; May’s List; In 2000, three-year term on Defense Advisory Committee on Women in the Services (DACOWITS); reserve police officer in Washington, D.C. Metropolitan Police Department after 9/11] 31. Brenda Stewart [Senior V-P Net1; extorted (?) control of Dr. Belamant patents in COPAC (Chip Off-Line Pre-Authorized Card) and Net 1 universal electronic payment systems (or UEPS) for saboteurs, assassins and pedophiles based in unbanked or underdeveloped economies in South Africa, Europe, Asia, and Latin America] 32. Hanne Strong (nee Marstrand) [Maurice Strong; man-in-the-middle pass officer position in Identification Unit of the U.N. Security Section; CalTex job as front 1953-1954 for Mau Mau oath taking rituals; torture-film pedophile with Obama grandfather; Canadian International Development Agency (CIDA) 1966-1970; United Nations Environment Programme (UNEP) in Nairobi, Kenya 1973-1975; depopulationist death sentence for babies who exhale CO2!; ran Manitou Foundation near Baca Ranch for sexual entrapment and extortion of pedophile guests, forced later to pay genocidaires through Net 1 for the contract killing of families with children and heterosexual parents; Fellow of the Royal Society (U.K.) and Royal Society of Canada] 33. Winnie Mandela (nee Madikizela) [Sexual extortionist, pedophile and kidnapper; ex wife Nelson Mandela; used young men and children as personal bodyguards in Mandela United Football Club; rubber tyres filled with petrol, ignited as “necklaces”; used Net 1 (?) to pay killers of 14-year-old Stompie Seipei; 1983 ANC car bomb of military headquarters in Pretoria; 1988 BBC World Service propaganda rock concert Wembley Stadium; Harry Belafonte, Whitney Houston, Roberta Flack, Stevie Wonder; smuggled message from Mandela read out, watched by 72,000 spectators, 200 million viewers in 60 countries. 34. Franny Armstrong ( ), Spanner Films, indie pop group The Band of Holy Joy, McLibel; Drowned Out; Narmada Dam Project; 10:10 No Pressure snuff film of exploding kids; ‘We ‘killed’ five people to make No Pressure – a mere blip compared to the 300,000 real people who now die each year from climate change’ The Age of Stupid in New Orleans; Passion Pictures client of Sohonet showed special effects of UNDEX after Hurricane Katrina 35. Dame Julia Charity Cleverdon DCVO, CBE [Late husband John Garnett, was director of the Industrial Society. She is Vice-PresidentBusiness in the Community; was Chief Executive from April 1992 – March 2008; sponsors Age of Stupid linkage of environmental impact, diversity, workplace practice and ethical operations in the wider marketplace; Teach First; National Council for Educational Excellence; Prime Minister’s Talent and Enterprise Taskforce Advisory Group; ‘In Kind Direct’; Helena Kennedy Bursary Scheme; World Wildlife Fund; former Director Industrial Society’s Education and Inner City Division; industrial relations British Leyland] 36. Charlotte Beers [Uncle Ben’s; J. Walter Thompson first female vice president in firm’s 106-year history; Tatham-Laird & Kudner CEO; Ogilvy & Mather Worldwide Chairman and CEO (1992-1997); handed over to Shelly Lazarus; J. Walter Thompson Worldwide chairman; 2 October 2001 sworn in as Under Secretary of State for Public Diplomacy and Public Affairs (at the US Department of State); assigned, amongst other things, to sell so-called War on Terrorism [WTF?] to [Stupid Men and Women in] public] 37. Shelly Lazarus [CEO and chairman of Ogilvy & Mather Worldwide; branding for American Express, Dove, Ford, Kraft, Kodak and IBM; ‘I’ve always believed that a brand is a relationship. And like all good relationships, it is built on trust .. we established [email protected], our digital media, direct response and search marketing unit two years ago. Mobile marketing also has a lot of potential .. mobile devices have become the “third screen,” and in some cases, the primary screen. We’ve formed digital innovation labs in five key markets around the world … Gaming [event arbitrage and bordereau insurance fraud?] is another hot area in which our digital labs are innovating’] 38. Condoleezza Rice [66th United States Secretary of State; President Bush’s National Security Advisor during first term; political science Stanford University Provost 1993 to 1999; chaired Millennium Challenge Corporation; Met CIA Director George Tenet July 10, 2001 in “emergency meeting” on impending al Qaeda attack; in PEOC with Lynne Cheney when Sisters disrupted 9/11 response by Dick Cheney and George Bush] 39. Heather Boyles [Director Partner Relations Internet2; Non-US networking initiatives; US federal research networks; US-based advanced regional networks; Oversaw Internet2 International Relations program from its first partnership in 1997 with Canada’s CANARIE organization to over 45 partnerships today; Director of Policy and Special Projects at Federation of American Research Networks (FARNET); Master’s Degree International Affairs: International Economic Policy, American University in Washington, DC and a Bachelor’s Degree in International Studies and German from Indiana University of Pennsylvania. 40. Lily Safra (nee Watkins) [Daughter Wolf White Watkins, British railway engineer; At age 17 husband 1, Mario Cohen, an Argentine hosiery magnate; 1965 husband 2 Alfredo Monteverde, leader in the Brazilian household appliance distribution business after establishing Ponto Frio brand; suicided by two shots from a revolver in his bed; all his assets to her and his former banker, Edmond Safra cut off the rest of the family; 1972 husband 3, Samuel Bendahan; 1976 husband 4, Edmond Safra, founder Republic National Bank of New York [and founder investor in Canary Wharf Group] who was killed in a fire that was determined to be arson security camera tapes from the night went missing; French examining judge claims trial “fixed in advance”; couple had no children together] 41: Joanne Ellis [Group General Counsel at Sohonet Limited London, United Kingdom; Motion Pictures and Film; tScheme encryption for FC-KU crime scene management; former Commercial / Legal Director at BT Global Services; former Senior Legal Counsel at 02 (Airwave) Telefonica; former General Counsel, EMEA at Hitachi Data Systems] 42. Jill Knesek [Chief Security Officer BT Global Services; responsible for all security matters globally including Strategy, Security Policy & Compliance, Physical Security, Information Security, Travel Security, Regulatory Compliance and Investigations; former Director of Reactive Operations for the Cable & Wireless Managed Security Services group; in 1998 joined FBI as a Special Agent in Computer Crime Squad in the Los Angeles field office; Kevin Mitnick co-case agent; Mafiaboy FBI case agent with Royal Canadian Mounted Police (RCMP) in Montreal, Canada; case agent for first FBI undercover operation that infiltrated the hacker community to support many criminal investigations in the U.S. and abroad and National Infrastructure and Protection Center (NIPC) during Kosovo bombings; CISSP (Certified Information Systems Security Professional); CISM (Certified Information Security Manager). Office El Segundo, CA; routinely travels to London, New York and Washington DC area; monitored movement of Gareth Williams]

“Note (ii) City & Guilds’ livery companies associated with Crown Sisters’ pedophile oath taking for the man-in-the-middle crime scenes and bordereau-insurance frauds.
Insurers (Asymmetric Threats Contingency and Abacus frauds on Lloyd’s of London)
Scriveners (Registering family bonds at pedophile oath-taking ceremonies since 1617)
Air Pilots and Air Navigators (Femme Comp Inc, Serco use of QRS11 in Boeing 9/11)
Master Mariners (Shares HQS Wellington with Scriveners for phony D2 Banking Bonds)
International Bankers (D2 Banking fraud on Livery/Feudal Families at Canada Square)
Stationers & Newspapermakers (Sohonet Age of Stupid Copyright for sexual extortion)
Launderers (First responders to be deployed for spoliation of crime scene evidence)
Information Technologists (Canary Wharf digital data for D2 Banking snuff films)
Solicitors (Manipulation of Franco-PROMIS to enrich Daubert defense lawyers)
Management Consultants (Abusive tax shelters to finance fake/real CSI snuff films)
Security Professionals (Prison-based pedophiles through Krayleigh CSI crime scenes)
Constructors (Built CANARIE Sohonet virtual war rooms for Canary Wharf Group)
Haberdashers (Paisley pattern strangler scarf, United 93 Ogilvy/Sohonet crime scene)
Solicitors (Structure snuff-film production debt recovery on box-office bordereaux)
Environmental Cleaners (Cleaned up UNDX levees after Hurricane Pam and Katrina)
Arbitrators (Nominees’ “bordereaux” insurance at 9/11 sites, MI-6 Pimlico safe house)
Leathersellers (Pink bags, ePassport and Traka key rings for pedophile sex tourists)
Hackney Carriage Drivers (Airwave/Traka into Metropolitan Police and MI-6 pink bag)
Plumbers (Crime scene signature with Gareth Williams’ body placed in bath)
Fishmongers (Triangular trader, dolphin tattoo, contract hits back to at least 1381)
Gunmakers (Triangular traders, supplied weapons, Zodiac for Mumbai Massacre 2008)
World Traders (Event arbitrage in London. Naked shorting DJIA in Chicago on 9/11)
Butchers (Williams’ body mis-treated per the M.O. of Sextortionists at B.C. pig farm)
Fuellers (Diesel in WTC7, Murder of Carlton Bartels, founder of CO2e.com)
Armourers and Brasiers (Molten Metal nano-powder incendiary demolition of WTC#7)
Gardeners (Sextortion – By the sweat of thy brow thow shalt eate thy bread)
Firefighters (My Range radios for man-in-the-middle Twin Towers snuff films on 9/11)
Cordwainers (Tools fit description of wound which allegedly killed Kit Marlowe)Brewers (Set up Deptford tavern of Dame Eleanor Bull for Kit Marlowe murder)
Apothecaries (Production of Bodkin heroin – Dope – near Calvi Blackfriars Bridge)

“Note (iii) With Sexting, Sexcam sessions, and Indiscretion, Comes Sextortion It was inevitable that the number of sextortion cases reaching the public’s attention would climb as the spread of sexting and sexcam sessions continues unabated. Sextortion – the combination of the words “sex” and “extortion” isn’t a web phenomenon, extortionists and blackmailers have used their knowledge of other’s infidelities, or possession of compromising images, videos, phone calls, and letters since close to the dawn of man. Perhaps the most recent public example was when a former CBS producer threatened to disclose David Letterman’s history of affairs unless Letterman paid him $2 million .. The photos may be used for blackmail or sextortion as in the cases listed above. The photos may be classified as child pornography, and the image taker, the image recipient, and any other recipients may be charged and registered as sex offenders – a label that will follow them through life. “Sexting” Leads to Child Porn Charges for Teens, ‘Sexting’ Teens May Face Child Porn Charges” .. “In cryptography (Man in the Middle – MITM) is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private [Airwave] connection, when in fact the entire conversation is controlled by the attacker.”

688 Total Views 2 Views Today
Please follow and like us:
0

Related Post

3 comments