July 31, 2011
Marina's beTRUSTed Onion patent for Matrix 5 players and Let’s Roll frauds
Abel Danger believes that Middle Templar and Crown Agents’ Sister Marina Johnson procured beTRUSTed public key infrastructure and patented Onion Router devices to conceal identity frauds by Matrix 5* playing companies with ‘Let’s Roll’ actors on 911.
Matrix 5 players = Bankers + Anglophones + Francophones + Lesbians + Pedophiles
Marina’s Matrix 5 and Ecocide script
Dumb script; but you be the judge
Who wrote Andrew Berwick script?
V for Vendetta Televised Speech
Middle Temple Lawyer - .TV Broadcasts - Matrix 5 Propaganda - Citizen of the United Kingdom and Colonies - Obama Odious Debt Attack - Nation States
Captain Sherlock eBook
See # 66
Abel Danger Mischief Makers - Mistress of the Revels - 'Man-In-The-Middle' Attacks
Marina and Sam Cam and their Bullingdon oath-taking husbands developed 911 scripts through Matrix 5 associates at the Middle Temple and Carlton Communications to produce ‘the first live-broadcast mass snuff film in human history’ on .tv (Tuvalu)
Assange used beTRUSTed PKI and Onion Router patented devices to hack Pentagon’s U.S. Navy Command Center for Marina’s Matrix 5 players on 911
Matrix 5 players could use patented scripts to rehearse Twelfth Night or Murder for Hire in 1602 at the Middle Temple
"The Name of the Beast “You have asked me if I knew the name of the assassin. I do. The mere knowing of his name is a small thing, however, compared with the power of laying our hands upon him.” Sir Arthur Conan Doyle, "A Study in Scarlet", Holmes speaking"
“[CSI and spoliation inference suggests the ‘Let’s roll’ conversation took place between Marina’s Matrix 5 Middle Temple actors, including Lisa Jefferson, using beTrusted PKI and patented Onion Router devices to conceal a man-in-the-middle attack on America] WDC MEDIA NEWS Christian News and Media Agency Verizon Worker Recounts Her 911 Conversation With UA Flight 93 Hero 2006-09-11 -- WDC Media News -- (AgapePress) - As the nation remembers and reflects on the five-year anniversary of the 9/11 terror attacks, one woman recalls how God prepared her for a pivotal role in the event. On that fateful morning, Lisa Jefferson was the Verizon supervisor on duty who spoke with United Airlines Flight 93 passenger Todd Beamer during the final moments of that flight. The Boeing 757-222 from which Beamer called that that day was one of the four planes hijacked as part of the September 11, 2001 attacks -- the only one of the four aircraft that failed to reach its intended target. Instead, Flight 93 crashed in an empty field near Shanksville, Pennsylvania, about 150 miles from Washington, DC, after passengers and flight crew members intervened in a heroic but ultimately fatal effort to subdue the terrorists. It was just moments after Jefferson and her staff learned of the terrorist plot that she took the call from Beamer. "I told him, 'My name is Mrs. Jefferson, and I understand your plane is being hijacked,'" the Verizon supervisor recalls. And for the next 15 minutes, she says she prayed with Beamer and listened as the tragedy in the air unfolded. "The plane took another dive," Jefferson notes, "and you could hear the commotion in the background. I heard men crying and screaming, 'Oh, my God. Jesus help us.' The commotion is something I will never ever forget." Then, she recounts, she heard Beamer and others discussing a plan to take back the plane from the terrorists. "The last thing I heard from him was, 'Are you ready,' the mobile company worker remembers. "He was speaking to someone else, and he said, 'Okay.' He said, 'Let's roll.'" Jefferson details that phone call, and how God has allowed her to use her recollections of the events of that day as a witnessing tool in a book titled Called (Northfield Publishers, 2006). One of the messages of the book, she explains, is that believers must be available and prepared for the time when they may be called upon to live out their faith in some unexpected way ... “God has an assignment for you that only you can fulfill," the author asserts. "God put me in the role of being an 'ear witness' to the bravery of the men and women on Flight 93," she says, "and the reason I wrote Called is because I believe any one of us can find ourselves in a similar situation, where we may be called upon to do something extraordinary when we least expect it” Days after the terror attacks, the woman who found herself on the receiving end of Beamer's fateful 9/11 phone call was able to share crucial details of the hijacking with authorities and to share the heroic passenger's final thoughts with his wife. However, the Verizon worker had no way of knowing when she came to work that morning what a pivotal role she would be playing in the tragedy and drama of the day's events. In the same way, Jefferson points out, any Christian may find herself or himself surprised by a special assignment from God. "But the question is, are we ready to respond to whatever it is that God has planned for us," she says. Allie Martin, a regular contributor to AgapePress, is a reporter for American Family Radio News, which can be heard online.”
“[CSI and spoliation inference suggests the ‘Let’s roll’ conversation took place between Marina’s Matrix 5 Middle Temple actors with a centuries-old tradition of dressing real or simulated or spoliated crime scenes for the loan sharking owners of patents in scripts] In Renaissance London, playing company was the usual term for a company of actors. These companies were organized around a group of ten or so shareholders (or "sharers"), who performed in the plays but were also responsible for management. The sharers employed "hired men" — that is, the minor actors and the workers behind the scenes. The major companies were based at specific theatres in London; the most successful of them, William Shakespeare's company the King's Men, had the open-air Globe Theatre for summer seasons and the enclosed Blackfriars Theatre in the winters. The Admiral's Men occupied the Rose Theatre in the 1590s, and the Fortune Theatre in the early 17th century. Less fortunate companies spent most of their existences touring the provinces; when Worcester's Men gained official permission to perform in London in 1602, they were, in a manner of speaking, "coming in from the cold" of a life of constant touring ... One curious development of this era was the development of companies of pre-pubescent boy actors. The use of the boy player in companies of adult actors to play female parts can be traced far back in the history of medieval theatre, in the famous mystery plays and moralities; the employment of casts of boys for entire dramatic productions began in the early 16th century, which utilized the boys' choirs connected with cathedrals, churches, and schools. In time the practice took on a professional aspect and companies of child actors would play an important role in the development of drama through the Elizabethan era and into the Jacobean and Caroline periods that followed. (See: Children of the Chapel; Children of Paul's; Beeston's Boys; King's Revels Children.) .. That company of Hunsdon's, known to posterity as The Lord Chamberlain's Men, was organized somewhat like a modern joint-stock commercial company (the concept of which was just beginning to evolve in this era) at its re-formation in 1594, after the long plague closure. The company had a small number of partners or shareholders, who pooled their funds to pay expenses and in turn shared the profits, in what was largely a de-facto democratic way (at least for the sharers, if not for the hired men and apprentices they employed). Their main rivals, the Admiral's Men, suffered in contrast under a less ideal version of capitalist organization: Philip Henslowe functioned more like a blend of big-business autocrat, landlord, and loan shark. He managed multiple companies of actors and built and owned several theatres, and controlled players (sharers included) and playwrights by doling out payments and loans.” .. “The Diary shows the varying partnerships between writers, in an age when many plays were collaborations. It also shows Henslowe to have been a careful man of business, obtaining security in the form of rights to his author’s works, and holding their manuscripts, while tying them to him with loans and advances. If a play was successful Henslowe would commission a sequel.”
“[CSI and spoliation inference suggests the ‘Let’s roll’ conversation took place between Marina’s Matrix 5 Middle Temple actors with a centuries-old tradition of swapping gender roles in real or simulated or spoliated crime scenes for the producer of the play and the owner of the patents] The full title of the play is Twelfth Night, or What You Will. Subtitles for plays were fashionable in the Elizabethan era, and though some editors place The Merchant of Venice's alternate title, The Jew of Venice, as a subtitle, this is the single Shakespeare play to bear one when first published. The play was probably finished between 1600 and 1601. This is because, in the play, Shakespeare refers to events which happened in or just before that year. A law student, John Manningham, who was studying in the Middle Temple in London, described a special performance of the play in his diary. This was the first recorded performance of the play. This took place in the hall of the Middle Temple, and the occasion was the formal end of Christmastide in the year's calendar to which students were invited on February 2, 1602 (Candlemas). But it was not printed until its inclusion in the First Folio in 1623. Viola is not alone among Shakespeare's cross-dressing heroines; in Shakespeare's theatre, convention dictated that adolescent boys play the roles of female characters, creating humour in the multiplicity of disguise found in a female character who for a while pretended at masculinity. Her cross dressing enables Viola to fulfill usually male roles, such as acting as a messenger between Orsino and Olivia, as well as being Orsino's confidant ... Metatheatre .. At Olivia's first meeting with "Cesario" (Viola) in I.V she asks her "Are you a comedian?" (an Elizabethan term for "actor") Viola's reply, "I am not that I play", epitomising her adoption of the role of Cesario, is regarded as one of several references to theatricality and "playing" within the play. The plot against Malvolio revolves around these ideas, and Fabian remarks in Act III Scene iv: "If this were play'd upon a stage now, I could condemn it as an improbable fiction". In Act IV Scene ii, Feste (The Fool) plays both parts in the "play" for Malvolio's benefit, alternating between adopting Sir Topas' voice and that of himself. He finishes by likening himself to "the old Vice" of English Morality plays. Other influences of the English folk tradition can be seen in Feste's songs and dialogue, such as his final song in Act V. The last line of this song, "And I'll strive to please you every day", is a direct echo of similar lines from several English folk plays. ... The earliest known performance took place at Middle Temple Hall, one of the Inns of Court, on Candlemas night, 2 February 1602. The only record of the performance is an entry in the diary of the lawyer John Manningham, who wrote: ‘At our feast we had a play called "Twelve Night, or What You Will", much like "The Comedy of Errors" or "Menaechmi" in Plautus, but most like and near to that in Italian called "Inganni". A good practice in it to make the steward believe his lady-widow was in love with him, by counterfeiting a letter as from his lady, in general term telling him what she liked best in him and prescribing his gesture in smiling, his apparel, etc. and then, when he came to practice, making him believe they took him for mad’ .. The 1966 RSC production played on gender transgressions more obviously, with Diana Rigg as Viola showing much more physical attraction towards the duke than previously seen, and the court in general being a more physically demonstrative place, particularly between males. ... The play/books were mentioned in the famous movie "V For Vendetta". The character V quotes "Conceal me what I am, and be my aid...for such disguise as haply shall become the form of my intent" as he's dancing with Evey.”
“[CSI and spoliation inference suggests the ‘Let’s roll’ conversation took place between Marina’s Matrix 5 Middle Temple actors with concealed and anonymous access to real or simulated or spoliated crime scenes through the extorted use of patented devices] Onion Router: US Navy patents Anonymous Surfing In 2001/07 the US navy received patent US 6266704 for the principle of arranging public key encryption in several layers so that identities are concealed. Colleagues of the patentee say that they are very surprised at this sudden move of one of their peers who apparently succeded in obtaining a patent on largely known methods. The patent covers large problem fields and leaves little free room for development of anonymous communications. Some experimental endeavors (without the deep pockets of commercial enterprises) are under threat, with a great potential impact on how people are able to communicate. We have yet to find out whether this patent has been filed in Europe.”
“[CSI and spoliation inference suggests the ‘Let’s roll’ conversation took place between Marina’s Matrix 5 Middle Temple actors with access to patented devices needed to support man-in-the-middle attacks on PwC’s Global 2000 customers through 911] beTRUSTed is an e-commerce security integrator, delivering complete custom-designed infrastructure solutions to Global 2000 customers. beTRUSTed combines world-class Public Key Infrastructure (PKI) expertise and Certification Authority services, along with consulting and integration expertise from PricewaterhouseCoopers, the world’s largest professional services organization with more than 150,000 professionals in over 150 countries. beTRUSTed rapidly advances an organization's ability to communicate securely, enabling them to conduct sensitive transactions in a networked environment. PKI technology and digital certificates are essential e-security tools-enabling you to identify and authenticate users, protect and encrypt information transmitted via the Internet, and preserve the integrity and legal certainty of online transactions. beTrusted and Entrust recognize that many customers desire an outsourced security solution. By outsourcing security operations to beTRUSTed, clients benefit from a commercial-grade CA using Entrust technology. Combined with PwC's implementation expertise, beTRUSTed and Entrust can together offer best-in-class reliability and quality within a complete solution. beTRUSTed issues and manages digital certificates worldwide, offering global system interoperability. These certificates secure eBusiness transactions and communications by allowing identity authentication and ensuring confidentiality of the communication, and the integrity and non-repudiation of information. Together, beTRUSTed and Entrust enable customers to: Focus critical resources on your business by outsourcing non-core functions. Decrease time to market for critical business solutions and security upgrades. Reduce risk and increase system up-time by relying on vendor resources and expertise. Reduce upfront capital costs and establish predictable on-going costs. Respond quickly to competition and changing business requirements. Maximize flexibility in e-marketplace.”
'I Promised I Wouldn't Hang Up'
Lisa Jefferson, the phone supervisor who took Todd Beamer's call on Flight 93, believes God called her for a purpose.
“[CSI and spoliation inference suggests the ‘Let’s roll’ conversation took place between Marina’s Matrix 5 Middle Temple actors with concealed and anonymous access to real or simulated or spoliated crime scenes through the extorted use of patented devices] Navy Seaport Enhanced (Seaport-e) Multiple Award Contract About Seaport-e Seaport-e is the Navy's electronic platform for acquiring support services for the Virtual System Commands (SYSCOM), which include NAVSEA, NAVAIR, NAVSUP, SPAWAR, Strategic Systems Program (SSP), and NAVFAC. [Femme Comp Incorporated is a prime SeaPort-e contract holder] In addition, other activities, including the Military Sealift Command, Strategic Systems Programs, Office of Naval Research, and the United States Marine Corps have chosen to use SeaPort-e Work under this vehicle covers a broad range of services, including engineering, financial management, and program management. Our capabilities As part of a global network of separate member firms, PricewaterhouseCoopers (PwC) has access to more than 161,000 people in 154 countries who share their thinking, experience and solutions to develop fresh perspectives and practical advice. PwC's workforce includes business advisers, accountants, auditors, forensic investigators, financial analysts and technology specialists – among many other service professionals. Our clients range from the largest and most complex organizations, both in the private and public sector, to innovative entrepreneurs. We bring the strength of our firm to solve problems of every shape and size. As a trusted advisor to the Federal Government, PwC is engaged in some of the Government’s most difficult challenges. Our clients typically turn to us for help in solving problems that involve numerous concurrent factors, weighing complex trade-offs, and prioritizing multiple objectives. A long history of auditing many of the world's largest and most complex organizations means we really understand the unique challenges facing our clients. Our Auditors’ Lens™ provides government agencies with insights and processes to help meet goals around transparency, accountability and overall enterprise effectiveness.”
“[CSI and spoliation inference suggests the ‘Let’s roll’ conversation took place between Marina’s Matrix 5 Middle Temple actors with concealed and anonymous access to real or simulated or spoliated crime scenes through PricewaterhouseCoopers’ public key infrastructure linking United Airlines Flight 93 to first responders and the MTM on 911] Strategic alliance will provide global businesses best-in-class e-security and digital identity solutions 12 Dec 2001 DALLAS and Columbia, MD, -- Entrust, Inc. [Nasdaq: ENTU], the leading provider of enhanced Internet security products and solutions, and beTRUSTed, the e-security business of PricewaterhouseCoopers, the world's largest professional services organization, have formed a new strategic alliance that will expand the depth of services offered to both companies' clients worldwide. The agreement extends Entrust's market reach worldwide. It allows beTRUSTed to become a provider of the Entrust market-leading Internet security software, which helps protect the mission-critical data and communications that customers move online. At the same time, the agreement deepens the relationships between Entrust, beTRUSTed and PricewaterhouseCoopers' global security practice. It introduces current and future Entrust clients to global consulting, integration and digital identity subscription services from beTRUSTed and PricewaterhouseCoopers. These services will be delivered through beTRUSTed's secure facilities and operations in the Americas, Europe and Asia/Pacific. Under the agreement, the two companies will also mutually assign dedicated global sales professionals, in addition to product and marketing teams, to work in tandem across North America, Europe, Asia* and Latin America. beTRUSTed will provide security services for customers based on Entrust enhanced Internet security products. Customers that have purchased digital identity services from Entrust will be transitioned to beTRUSTed in the first quarter of 2002. New and existing Entrust clients will be offered enhanced service capabilities being developed by Entrust and beTRUSTed. These services will be offered through beTRUSTed's twin, high-security Certification Authority facilities in the United Kingdom and the United States. Entrust will assist in expanding these facilities and capabilities, which adhere to rigorous systems and standards in the protection of electronic information and use the same protocols established for military and diplomatic operations. "By combining beTRUSTed and PricewaterhouseCoopers' resources and experience in Public Key Infrastructure-based digital identities and industry-focused consulting and integration with Entrust, a leader in Internet security solutions, we have assembled the necessary ingredients to help our clients build and manage truly secure Web-enabled business platforms," said John Bromfield, joint global CEO for beTRUSTed and leader of PricewaterhouseCoopers' Global Risk Management Solutions practice. " beTRUSTed and Entrust have similar missions in enabling and advancing businesses' ability to conduct sensitive, high-value communications and transactions in a networked environment. Together, we are better able to assist our clients in deploying digital identity technologies in areas such as electronic signature generation and secure virtual private networking." After a sales and technical training program is completed, beTRUSTed's sales team will begin making available to its clients Entrust GetAccess, Entrust TruePass, Entrust Authority and Entrust Entelligence products, which provide identification, verification, entitlements, privacy and security management capabilities. Additionally, beTRUSTed will be developing a new trust framework using Entrust software to anchor the electronic relationships between key holders and Certification Authorities (CAs). "PKI solutions providers and systems integrators are a natural complement, and a tighter relationship serves both to strengthen the channel of the provider, as well as to demonstrate the commitment of the integrator to dedicate resources to PKI," said David Thompson, senior analyst, Meta Group. "Working together, the two types of organizations can now assist customers in more quickly achieving the value that PKI has so long promised." "Our alliance with beTRUSTed and PricewaterhouseCoopers, a leader in assurance and a highly trusted brand, clearly builds upon our goal of extending Entrust's market reach through the fulfillment of a central market expansion strategy with integrators and other strategic partners who fully understand the growing need for enhanced Internet security," said Bill Conner, Entrust president and chief executive officer. "As more and more companies, financial services organizations and governments around the globe conduct high-value, mission-critical transactions over the Internet, the privacy and security of our global network infrastructure becomes more important than ever before." Read about Entrust Managed Security Services. About beTRUSTed beTRUSTedsm (www.betrusted.com) is an e-commerce security integrator, delivering the most complete custom-designed infrastructure solutions to the Global 2000. beTRUSTed combines world-class Public Key Infrastructure (PKI) expertise and Certification Authority services, along with consulting and integration from PricewaterhouseCoopers. beTRUSTed rapidly advances an organization's ability to conduct sensitive, high-value communications and transactions in a networked environment. beTRUSTed's technical facilities in the United States and Europe adhere to rigorous systems and standards, using the same protocols established for military and diplomatic operations. beTRUSTed's technical capabilities and platform are key enablers for our clients to generate legally verifiable digital signatures and a high level of transactional integrity - anywhere in the world. About PricewaterhouseCoopers PricewaterhouseCoopers http://www.pwcglobal.com/ is the world's largest professional services organization. Drawing on the knowledge and skills of more than 150,000 people in 150 countries, we help our clients solve complex business problems and measurably enhance their ability to build value, manage risk and improve performance in an Internet-enabled world. PricewaterhouseCoopers refers to the member firms of the worldwide PricewaterhouseCoopers organization. About Entrust Entrust, Inc. [Nasdaq: ENTU] is a leading global provider of enhanced Internet security solutions and services that make it safe to do business and complete transactions over the Internet. Entrust has the industry's broadest set of identification, entitlements, verification, privacy and security management capabilities. More than 1,200 major corporations, service providers, financial institutions and government agencies in more than 40 countries rely on the privacy, security and trust provided through Entrust's portfolio of award-winning technologies. For more information, please visit http://www.entrust.com/”
“[CSI and spoliation inference suggests the ‘Let’s roll’ conversation took place between Marina’s Matrix 5 Middle Temple actors with concealed and anonymous access to real or simulated or spoliated crime scenes through the Vodaphone/GTE systems allegedly used by Todd Beamer on United Airlines Flight 93] News Releases Vodafone Corporate Selects Entrust To Provide Secure e-Business Services For Over 550,000 Customers Jan 9, 2001 09 Jan 2001 London, UK - Entrust Technologies Inc. (Nasdaq: ENTU), a global leader in solutions that bring trust to e-business, today announced a contract with Vodafone Corporate, the specialist service provider division of Vodafone, to provide secure and controlled extranet access for its UK customers. The Entrust solution will eventually provide over 550,000 of Vodafone Corporate's customers personalized and secure access to Vodafone Corporate Online, the Vodafone Corporate B2B web site. In its drive to provide a fast, efficient and personalized service, Vodafone has chosen to implement an Entrust Internet management solution for secure e-business portals. Using Entrust's getAccess? solution, Vodafone Corporate customers will have secure access to essential web-portal authentication, authorization, and administrative services. This will allow Vodafone Corporate to rapidly deploy web applications by plugging them into this shared infrastructure. "In today's increasingly competitive telecommunications market, we are constantly looking to improve the service we offer. Our corporate customers now demand more flexible and bespoke services with easy-to-manage information", said Chris Long, e-Commerce Manager, Vodafone Corporate. "After looking at all the leading solutions we chose Entrust's getAccess?, which offered us the most flexible and scalable solution, with a fast, reliable, and cost-effective service and the quickest time to market."
"Vodafone Corporate tasked us with examining the scalability of its extranet security. Entrust rose to the challenge and very quickly helped Vodafone Corporate integrate the getAccess? solution with its existing web site, enabling the company to carry out self-service transactions and give its customers increased control." said Andrew Armstrong, VP Northern Europe, Entrust Technologies. "We are pleased to be able to offer Vodafone Corporate a tailored solution enabling multiple levels of delegated administration to help large enterprises, such as Vodafone, push information and decision-making down to the lowest possible level to minimize administrative effort, reduce overall process times, and ultimately drive significant cost savings."
About Entrust's getAccess? - for Easy, Secure Web Access getAccess is an internet-scale web access management solution that accelerates the deployment of secure e-business portals by providing plug-in authentication, authorization and administration services. These services dramatically reduce the time and cost of deploying secure content on the Web for customers, suppliers, partners and employees. Using defined roles and business rules to authorize users, getAccess creates a customized e-business portal to enterprise information that allows these users to sign-on once and authenticate themselves via a password, digital certificate or hardware token. They can then access any information they are approved to see from any Web server or application in the extended enterprise. getAccess manages content directly accessed from applications across the distributed enterprise, easing the delivery of correct, up-to-the minute information to users. getAccess also facilitates navigation by presenting users with a personalized menu in their native language, which reflects only the information they are authorized to access.
About Vodafone Corporate Vodafone Corporate Ltd is a wholly owned subsidiary of Vodafone UK. Established in July 1997 as part of a comprehensive re-alignment of Group service provision subsidiaries, Vodafone Corporate is the UK's only service provider specializing solely in the requirements of business and corporate users. Through Vodafone Corporate, public sector users can access products and services contained within the Business Solutions Portfolio, which make the most of mobile communications by offering a `one-stop shop' service. For additional information visit: www.vodafone.co.uk.”
“[CSI and spoliation inference suggests the ‘Let’s roll’ conversation took place between Marina’s Matrix 5 Middle Temple actors with concealed and anonymous access to real or simulated or spoliated crime scenes through the Pentagon’s U.S. Navy Command Center – destroyed on 911 – and PwC’s beTRUSTed PKI] Navy Seaport Enhanced (Seaport-e) Multiple Award Contract About Seaport-e Seaport-e is the Navy's electronic platform for acquiring support services for the Virtual System Commands (SYSCOM), which include NAVSEA, NAVAIR, NAVSUP, SPAWAR, Strategic Systems Program (SSP), and NAVFAC. [Femme Comp Incorporated is a prime SeaPort-e contract holder] In addition, other activities, including the Military Sealift Command, Strategic Systems Programs, Office of Naval Research, and the United States Marine Corps have chosen to use SeaPort-e Work under this vehicle covers a broad range of services, including engineering, financial management, and program management. Our capabilities As part of a global network of separate member firms, PricewaterhouseCoopers (PwC) has access to more than 161,000 people in 154 countries who share their thinking, experience and solutions to develop fresh perspectives and practical advice. PwC's workforce includes business advisers, accountants, auditors, forensic investigators, financial analysts and technology specialists – among many other service professionals. Our clients range from the largest and most complex organizations, both in the private and public sector, to innovative entrepreneurs. We bring the strength of our firm to solve problems of every shape and size. As a trusted advisor to the Federal Government, PwC is engaged in some of the Government’s most difficult challenges. Our clients typically turn to us for help in solving problems that involve numerous concurrent factors, weighing complex trade-offs, and prioritizing multiple objectives. A long history of auditing many of the world's largest and most complex organizations means we really understand the unique challenges facing our clients. Our Auditors’ Lens™ provides government agencies with insights and processes to help meet goals around transparency, accountability and overall enterprise effectiveness.”
“[CSI and spoliation inference suggests the ‘Let’s roll’ conversation took place between Marina’s Matrix 5 Middle Temple actors with access through her chambers at 1 Crown Office Row to the best defense lawyers which money can buy] R v David Michael Shayler (2001) HL (Lords Bingham, Hope, Hutton, Hobhouse, Scott) (March 21 2002) ABSTRACT The Official Secrets Act, which affords no public interest defence to disclosure of classified information, does not breach Article 10. .. COMMENT (October 7 2001) True political speech does not come under serious threat in post war Britain. Nevertheless the subject of freedom of speech has exerted a mesmeric hold on the scribbling classes, hence the outpourings on every little skirmish in the defamation courts involving politicians and newspaper editors. Now, post September 11, the issue has become serious again, and there will be protracted litigation ahead on the rights of minority groups to preach religious hatred and the rights of newspapers to report on covert counter-terrorist measures and so on. See for example R v Secretary of State for the Home Department ex parte Louis Farrakhan. By comparison, the Spycatcher saga will begin to seem like a mere bagatelle. This latest stage in the Shayler litigation foreshadows some of the conflicts that will have to be resolved in the current climate. The Appeal Court observed that free speech had to be balanced against the public interest in its own security. Until recent events this would have been no more than a bland recitation of existing law. But the public perception of its own security in general, and of the intelligence services in particular, has undergone a radical change in the last few days. It has swung from mild interest in internal shenanigans and corrupt practices portrayed by Shayler and others, to a worried apprehension about the efficiency of the security and intelligence services in the counter terrorist game. It will be these anxieties that will form the backdrop to the jury's deliberations at Shayler's ultimate trial. In the light of recent events, his claims that his revelations were in some way necessitated or justified in the public interest would not have stood a chance in court, so it is just as well that such assertions have been excluded at this early stage. Rosalind English, 1 Crown Office Row [colleague of Marina Johnson]”
66. Marina Johnson (nee Wheeler) [Revised July 31, 2011. Matrix 5 principal and second wife of allegedly extorted man-in-the-middle Mayor of London, Boris Johnson; she was called to the Middle Temple Bar in 1987 and now practices from chambers in London at One Crown Office Row; she allegedly worked with Kristine Marcy, Miriam Clegg and insiders of the U.K. Home Office, the MOD, the Foreign and Commonwealth Office on the recruitment of saboteurs, assassins and double agents to support murder-for-hire service; allegedly conspired with Kristine Marcy, Miriam Clegg and insiders of the U.K. Home Office, the MOD, the Foreign and Commonwealth Office to secure an electronic passport for Barry Soetoro which allowed him to conceal his status as a citizen of the United Kingdom and Colonies and run as Barack Obama during the U.S. Presidential election campaign of 2008; she and her fellow Crown Office extortionists have allegedly invented the crime of ecocide; they have equated a failure or refusal to reduce greenhouse gas emissions – fraudulently claimed as a principal cause of catastrophic climate change – to the mens rea of a homicide; her fellow Middle Temple Crown Office extortionists are promoting the use of odious debt and predatory credit-default swaps to legitimize the execution of borrower-violators as on 911; her fellow Middle Temple Crown Office extortionists are allegedly using blip.tv to transmit digital images of torture, bombings and murder to secure the obedience of Matrix 5 agents and the silence of prospective whistleblowers; she is the sister-in-law of allegedly-extorted man-in-the-middle partner at PricewaterhouseCoopers, Leo Johnson, the snuff (?) film-maker who plans to replace government with PwC Ecocide PKI regulators who claim rights such as, “I will sabotage your plant if you are killing my fish, I will remove insurance, I will picket your product”; she allegedly forced Leo Johnson to issue PwC PKI security certificates to an ‘Andrew Berwick London’ account at D2 Banking allowing a virtual identity to finance the Ecocide / Unabomb attack on Norway’s oil and energy ministries; she is the sister-in-law of allegedly extorted woman-in-the-middle Rachel Johnson who was educated at the European School in Brussels and read Classics (Literae Humaniores) at New College, Oxford in the mid-‘80s; Marina’s husband Boris Johnson and sister-in-law Rachel Johnson have sufficient fluency in written Latin to qualify as suspect adopters of phrases used by the PKI identity, Andrew Berwick, "Pauperes commilitones Christi Templique Solomonici" and “De Laude Novae Militiae”; she allegedly used Rachel Johnson’s position in the BBC in 1994 and as a freelance columnist in Washington DC to help PwC, RSA, Verisign and Entrust set up PKI Ecocide accounts for Matrix 5 insiders and prepare the 911 attacks on America; she allegedly forced Boris Johnson to employ Andrew Gordon, Head of Investigations in the PwC Forensic Services group, in a Forensic Audit Panel to whitewash financial and PKI identity frauds by insiders of the London Development Agency; she is the sister-in-law of allegedly extorted man-in-the-middle Jo Johnson, former editor of the Lex Column on the Financial Times and MP for Orpington who allegedly uses PwC PKI certificates to manipulate the U.K. public accounts committee with its chairman and the former PwC consultant Margaret Hodge MP; she has forensic skills of a Middle Temple barrister to deal with bogus discrimination claims but lacks basic skills in spoliation CSI to properly conceal the PKI identities behind the bombings in Oslo and the shootings in Utoya; she is half English and half Indian; she is the daughter of BBC correspondent Sir Charles Wheeler and his second wife Dip Singh; she was educated at the European School of Brussels; in the early 1980s, she studied at the University of Cambridge where she wrote for the student magazine; after Cambridge, she returned to Brussels and worked there for four years; at the European School, she became a friend of Boris Johnson, the future Mayor of London; her sister is Shirin Wheeler, now the BBC's Brussels correspondent; she specialises in mental health matters and discrimination claims; January 2004 she was appointed to the B-Panel of Junior Counsel to the Crown; In 2009, she joined the Bar Disciplinary Tribunal as a barrister member; works in discrimination law while recognizing more than 60 per cent of claims are bogus; she married her childhood friend, Boris Johnson in 1993 after they met again in Brussels, where he was covering the European Parliament for The Daily Telegraph; while promoting one-child policy for the peasants, they have four children, Lara Lettice, Milo Arthur, Cassia Peaches and Theodore Apollo; he worked for a short while for L.E.K. which now advises the UK government on the 100% carbon neutral and has developed a tested methodology for carbon; she is trying to engineer her husband to take over from David Cameron as prime minister; she allegedly forced Boris to set up the resignation of Paul Stephenson, Metropolitan Police Commissioner because his force had hired someone who used to work for the News of the World, when David Cameron, who had hired Andy Coulson, was still in his job; she appears to have set up a phone hack on her husband in re the story of the psychopathic Darius Guppy needing some addresses to break a rib or two and intimidate the media; she allegedly had him force Sir Ian Blair out of Met; she allegedly had him force resignation of Sir Paul Stephenson by exploiting the crossed wires of PKI accountability that connect the Metropolitan Police Commissioner both to him and to the Home Office; she allegedly had him force resignation of John Yates, Met's assistant commissioner using PKI inside information in re Yates’s relationship with Neil Wallis, the former deputy editor of the News of the World, known as "Wolfman", who had been hired by the Met as a locum spin-doctor; she allegedly had him sabotage Met's counter-terrorism operations in the year before the Olympics by replacing Yates with Cressida Dick, the Gold Room commander and PwC PKI user who allegedly authorized the killing of Jean Charles de Menezes on 8/7; she frames her husband as a harmless bombastic buffoon who talks of Kosovo-style social cleansing; she is the daughter-in-law of the allegedly-extorted man-in-the-middle Stanley Johnson, an Ecocide sponsor, who worked at the European Commission, served as a Tory MEP from 1979 to 1984, and stood as Tory parliamentary candidate for Teignbridge in Devon; she is the daughter-in-law of the allegedly-extorted woman-in-the-middle Charlotte Wahl whose father Sir James Fawcett was a barrister and president of the European Commission of Human Rights and whose ancestry includes the early feminist and suffragette Millicent Garrett Fawcett. Abel Danger has concluded that PwC’s Ecocidal PKI lesbians and Boris Johnson’s Femme Comp wife Marina, know how to operate a Matrix 5 MitM propaganda attack with actors and patents but not how to defend against one and they view the OODA loop as a redundant form of heterosexual contraception.]”
Those who may be concerned have a moral obligation to think hard.