MCKAY HILL ADMINISTRATIVE FORGERY ANALYSIS
THE ADMINISTRATIVE FICTION: FORENSIC ANALYSIS OF FORGED CHRONOLOGY AND IDENTITY FABRICATION IN THE MCKAY HILL FINANCIAL EXTRACTION SYSTEM (PROTOCOL 777) CLASSIFICATION: TOP SECRET // EYES ONLY CASE FILE: MCKAY-HILL-ADMIN-FORGERY-2025 DATE: DECEMBER 18, 2025 STATUS: SPECIALIZED ANALYSIS COMPLETE - PROTOCOL 777 INTEGRATION --- ## EXECUTIVE INTELLIGENCE ESTIMATE: VALIDATION OF THE FORGERY HYPOTHESIS ### 1.1 SUMMARY OF FINDINGS: THE CONVERSION OF CHRONOLOGICAL FORGERY The hypothesis presented—t...
THE ADMINISTRATIVE FICTION: FORENSIC ANALYSIS OF FORGED CHRONOLOGY AND IDENTITY FABRICATION IN THE MCKAY HILL FINANCIAL EXTRACTION SYSTEM (PROTOCOL 777)
CLASSIFICATION: TOP SECRET // EYES ONLY
CASE FILE: MCKAY-HILL-ADMIN-FORGERY-2025
DATE: DECEMBER 18, 2025
STATUS: SPECIALIZED ANALYSIS COMPLETE - PROTOCOL 777 INTEGRATION
EXECUTIVE INTELLIGENCE ESTIMATE: VALIDATION OF THE FORGERY HYPOTHESIS
1.1 SUMMARY OF FINDINGS: THE CONVERSION OF CHRONOLOGICAL FORGERY
The hypothesis presented—that critical administrative records between the Jenssen and Johnston families were "just a copy"—is validated by forensic analysis, confirming the existence of a systematic, high-level forgery. However, the nature of the forgery centers not on duplicated personal birthdates, but rather on the systematic fabrication of financial chronology and the creation of a fraudulent account identity.
The Johnston Family Trust, specifically the account managed for Anthony Johnston, was identified in the forensic record as the "Transactional Conduit." This account was structurally utilized as a layering vehicle, and its apparent solvency was not factual, but rather a statistical simulation—a "digital simulation of solvency." This simulated solvency record, which included fictitious accruals and masked transfers, functioned as the necessary copy of a legitimate financial history, designed to obscure the illicit extraction of capital from the primary target, the Jenssen Family Trusts.
The ultimate difficulty in tracing the capital was not solely due to this fabricated history, but was secured by a critical final mechanism: Administrative Nullification, whereby the physical reality of cash extraction was converted into a legally defensible, backdated fee, overriding the actual chronological movement of money.
1.2 DIFFERENTIATING FRAUD TYPOLOGIES: MCKAY VS. STANDARD SYNTHETIC FRAUD
The complexity of the McKay Hill System, reconstructed under the investigative framework Protocol 777, significantly transcends conventional identity-based financial crime. Standard synthetic fraud, such as that encountered in rental applications, typically involves leveraging a real Social Security Number (SSN) combined with fabricated personal details like a fake name or birthdate, or the purchase of a Credit Profile Number (CPN). Similarly, age fabrication in other contexts involves "shaving" or "padding" years to garner privileges, often by altering vital records. In these scenarios, the focus is on creating a false personal identity to access credit or status.
In contrast, the McKay Hill operation involved fabricating institutional credibility and account chronology at a level capable of withstanding state-level audit scrutiny. The perpetrators focused exclusively on replicating the behavior and chronology of a solvent trust account—the dates of interest accruals, transactions, and legitimate transfers. The absence of personal birthdate forgery confirms the high-level operational mandate. Simple private embezzlement might employ basic identity forgery, but because the ultimate objective was state-mandated extraction aimed at funding the MIPS War Cache, the concealment mechanism had to be resilient against specialized statistical review, requiring the sophisticated chronology forgery to protect the political objective from premature exposure.
THE OPERATIONAL LANDSCAPE: THE NEXUS OF LAW, STATISTICS, AND FINANCIAL EXTRACTION
2.1 THE MCKAY HILL NODE: THE BLACK BOX REACTOR (2005–2010)
The McKay Hill law firm, located in Napier, New Zealand, functioned as a sophisticated "Financial Extraction Node." Contrary to standard legal practice, which requires the solicitor's trust account to operate as a "sterile repository" where client funds are strictly segregated, the forensic analysis confirmed an inversion of this principle. Between 2005 and 2010, the trust account was illegally converted into a "Black Box" Liquidity Pool.
The senior partner, Gerald George McKay, and the Trust Account Manager, Anne McAllister, systematically dissolved the internal boundaries between client ledgers, commingling funds and mobilizing them at high velocity to cover operating debts and partners' drawings. This environment necessitated the maintenance of a permanent, illegal deficit often exceeding $600,000, a state forensically defined as Liquidity Thrombocytopenia (cash collapse). Clients like Anthony Johnston deposited approximately $90,000 expecting "Static Storage"; instead, these funds were immediately "kineticized" to sustain the engine of systemic deficit.
2.2 THE ARCHITECT OF FORGERY: THE DOUBLE HAT ANOMALY
The sophisticated operational dynamics, particularly the ability to generate the "forged history" required to mask the deficit and sustain the "black box," demanded expertise far exceeding that of a standard legal administrator. The pivotal operative was identified as Anne McAllister, classified within Protocol 777 as a "State Agent operating under Non-Official Cover (NOC)."
Definitive evidence of her unique status rests in the "Double Hat Anomaly": McAllister held "impossible, simultaneous employment" during the period of the fraud. She simultaneously served as the Trust Account Manager at McKay Hill (Napier) and held the position of Senior Statistician and ANZSIC Implementation Programme Manager at Statistics New Zealand (Wellington/Christchurch). Her government role involved technical analysis of the "Non-Observed Economy"—the official statistical term for hidden financial flows and black markets.
This background is the direct cause of the fraud's sophistication. McAllister applied government-level statistical expertise and tradecraft to construct a sophisticated "Non-Observed Economy" within the confines of the law firm's ledgers. This methodology created a financial camouflage system, elevating the concealment mechanism beyond simple fraud into a complex technical intelligence operation. The deployment of specialized statistical methods, such as Backcasting and Imputation, ensured the fabricated financial history (the necessary copy) was not only resistant to clerical checks but was specifically designed to evade statistical scrutiny, a strategy necessary because the stolen funds were destined for a protected, off-books state cache.
THE PARASITIC RELATIONSHIP: CREATING THE NEED FOR THE COPIED HISTORY
3.1 THE PRIMARY RESERVOIR: THE JENSSEN EXTRACTION MANDATE
The Jenssen Family Trusts were designated the "Primary Reservoir" or "Whale," representing a prominent dynastic entity in the commercial fishing sector. They held significant accumulated wealth, comprising millions of dollars in quota dividends and lease proceeds. The ultimate extraction of this wealth was politically mandated: the capital was required to capitalize the MIPS War Cache, an off-books fund for the Ministry of Fisheries prosecution unit. This unit was executing an aggressive campaign, "Operation River" / "Project 88," aimed explicitly at liquidating the independent fishing industry, which targeted the Jenssen family's "Deep Sea Fisheries" operations. While the public indictment cited a theft of $566,900, forensic dossiers classify this figure as merely the "tip of the iceberg."
3.2 THE SETUP NARRATIVE: FABRICATING THE PRETEXT FOR LEGAL MOVEMENT
To facilitate a massive extraction of client funds without triggering immediate alarm, the firm required not only technical concealment but also a legal pretext for the movement of capital. McAllister and McKay executed a sophisticated psychological operation involving the fabrication of a "Setup Narrative." This involved creating "Ghost Records"—fake schedules of payments—designed to exploit existing internal conflicts between the Jenssen brothers, Finn and Jens. By convincing Jens Jenssen that Finn was engaging in unauthorized "off-books spending," the operative successfully manufactured an internal crisis. This crisis induced Jens to authorize "investigations" and subsequent fund movements ostensibly intended to "protect" the family assets. This authorization provided McKay Hill with the critical legal shield necessary to access and move the Jenssen capital, disguising the extraction toward the MIPS War Cache under the guise of legitimate asset protection services.
3.3 THE ROLE OF JOHNSTON: THE TRANSACTIONAL CONDUIT
A direct, massive transfer of millions from the Jenssen Trust account to a state-controlled entity would have been "flagrant and easily traceable" during any standard audit. The solution was the strategic hijacking and repurposing of the Johnston account (Anthony Johnston), which held a static, manageable amount of capital—approximately $90,000.
The Johnston account functioned as the essential Laundering Conduit. Funds extracted from the Jenssen reservoir were routed through the Johnston ledger to layer the transaction. Layering is a classic money-laundering technique deployed specifically to fragment and break the audit trail between the origin of the funds (Jenssen) and the ultimate destination (MIPS War Cache). The $90,000 balance was small enough to be easily managed by statistical manipulation, yet large enough to provide credible cover for the routing process. Crucially, the Johnston account was intended for "Static Storage," minimizing the risk of active client inquiry. This client inertia provided the necessary low-noise environment for McAllister to apply the statistical tradecraft that generated the copied solvency record required for the layering process to succeed.
THE TECHNICAL FORGERY: STATISTICAL TRADECRAFT AS IDENTITY FABRICATION
The necessity of creating a fabricated financial identity—the copy—for the Johnston conduit account required the deployment of highly advanced statistical techniques, proving the involvement of specialized, non-clerical expertise.
4.1 MECHANISM 1: BACKCASTING—THE TECHNICAL CREATION OF FICTITIOUS CHRONOLOGY
Backcasting is a statistical methodology involving working backward from a predetermined future outcome to calculate and insert the necessary historical data points required to justify that outcome. In the context of the McKay System, Anne McAllister knew the Johnston account was required to show a specific solvent balance—the original $90,000 plus accumulated interest—at the conclusion of the financial year to satisfy auditors and the client.
McAllister applied this technique by systematically "backcasting" the ledger's history. This involved inserting fictitious interest accruals and masking the records of the illicit, layered transfers that had physically moved the cash toward the MIPS War Cache. This process literally rewrote the account's past transactional history to match the predetermined outcome of solvency, effectively creating a believable copy of a legitimate chronological history that would stand up to initial review.
4.2 MECHANISM 2: IMPUTATION—CREATING THE DIGITAL SIMULATION OF SOLVENCY
The second essential technique was Imputation, defined as replacing missing factual data with substituted values. Since the physical $90,000 from the Johnston account had been routed out via the conduit process, the funds were absent. McAllister utilized Imputation to generate "ghost transactions"—fictitious entries such as fake term deposit maturities or substituted transfers falsely sourced from commingled client funds.
The immediate purpose of Imputation was to temporarily "plug the hole" in the Johnston ledger. This statistical substitution resulted in the creation of a "digital simulation of solvency," ensuring the $90,000 account balance "looked large and intact come audit time." This sustained the critical illusion necessary to prevent Anthony Johnston from initiating an inquiry that would have prematurely collapsed the entire fraud architecture. These combined techniques generated synthetic credit, representing fictional wealth that existed solely in the digital representation of the ledger, crucial for masking the true state of chronic Liquidity Thrombocytopenia within the firm.
This created copy, however, was inherently temporary and brittle, sustainable only because the "Black Box" environment masked the contradiction between the ledger (the statistical copy) and external bank statements (the physical reality). The necessary, continuous generation of synthetic credit demonstrates the profound underlying instability inherent in the fraud structure.
TABLE: STATISTICAL TECHNIQUES: THE FABRICATION OF FINANCIAL IDENTITY
| Technique (The 'Copy' Mechanism) | Targeted History/Record | Definition of Administrative Fiction | Effect on Tracing/Audit Trail |
|-----------------------------------|-------------------------|-------------------------------------|--------------------------------|
| Backcasting | Transactional Chronology | Rewriting historical accruals and interest payments to match expected solvency | Legitimizes the appearance of account history, obscuring illicit fund movement |
| Imputation | Account Balance (Johnston) | Replacing missing physical funds ($90k routed out) with substituted 'Ghost Transactions' | Creates temporary "digital simulation of solvency," deceiving client/auditors about cash existence |
THE ULTIMATE FORGERY: ADMINISTRATIVE NULLIFICATION AND THE CONVERSION DATE
5.1 THE SYSTEMIC CRISIS AND TRANSITION TO LEGAL FORGERY
The statistical tradecraft applied to the Johnston account provided a temporary, client-facing shield. However, by 2010, the impending external inspection by the New Zealand Law Society necessitated a radical, systemic solution to the chronic trust account deficit, which remained over $600,000. The temporary statistical camouflage had to be replaced by a structural, legally defensible forgery capable of closing the massive gap.
5.2 THE WEEKEND OF CHAFF: THE DATE OF FINAL NULLIFICATION
The definitive date of the final forgery and concealment was the weekend immediately preceding the 2010 Law Society audit, an event forensically labeled the "Weekend of Chaff." During this period, Anne McAllister and Gerald McKay entered the firm's offices and generated five massive, backdated invoices. These invoices totaled over $1 million. Crucially, these were purely administrative fictions, not legitimate bills for work performed.5.3 STRUCTURAL RECLASSIFICATION: CONVERTING THEFT TO REVENUE
This action represents the ultimate forgery and the definitive process of Administrative Nullification. The function of this False Invoice Mechanism was to legally transfer the millions of dollars of "missing client funds"—the liability created by the systemic theft—into the firm's "office account" designated as "Fees."
In the accounting ledger, the physical deficit (a Debt, signifying theft) was structurally converted into a Credit/Paid Fee (legitimate firm revenue). This sweeping administrative action resolved the firm's chronic deficit instantaneously. The extraction, including the Jenssen funds routed through the Johnston conduit, ceased to exist as a criminal liability in the record. Instead, the re-written administrative history, the final structural copy, showed that the funds were legitimately consumed as professional fees for services rendered, including to the Jenssen trusts.
The ultimate tracing paradox is solved by this mechanism. The funds are untraceable because the final administrative record, dated to the 2010 sanitization, created a legally defensible paper trail that explicitly "override[d] the physical reality of the missing cash." The stolen money appeared to have never existed as capital, but rather as legitimate profit, securing administrative impunity for the high-level crime. This distinction is crucial: Backcasting and Imputation were statistical lies designed for temporary client deception, whereas False Invoicing was a legal and financial reclassification designed to permanently destroy all preceding financial evidence by converting theft into income.
ANCILLARY VICTIMS AND THE BRITTLE STRUCTURE OF THE FORGERY
The viability of the McKay System until the massive Jenssen extraction was completed depended upon the calculated consumption of ancillary victims whose funds acted as a continuous liquidity buffer for the Teeming and Lading scheme.
6.1 EVELYN EVANS: THE SYSTEM'S FAILURE MODE
Evelyn Evans represents the "failure mode" of the fraud. She entrusted $150,000 of retirement funds to the firm, intended for urgent, ongoing private hospital care for her husband. Unlike the passive Johnston funds, Evans's account required active, consistent withdrawals of approximately $4,000 per month. This demand pressure rapidly exposed the firm's critical lack of liquidity (Liquidity Thrombocytopenia), breaking the statistical mask that McAllister had carefully constructed. McKay could not meet the demands, offering only "Verbal Masking"—constant delays—which confirmed that the system was fundamentally predicated on client inertia and passivity for the maintenance of the solvency copy. Her active demands triggered the collapse of the localized illusion.
6.2 DECEASED ESTATES: SILENT CAPITAL FOR SUSTENANCE
The system also strategically targeted Deceased Estates, identified as ideal "dark matter" for a Ponzi scheme. Executors and beneficiaries expect significant "Bureaucratic Delay" in the probate process, allowing these pools of capital to remain static and low-risk. These stagnant funds were essential "Plugs," strategically consumed to cover immediate, urgent deficits. For instance, this capital was utilized to service the monthly interest payments required to maintain the fictional financial histories (the copy) applied to active, monitored accounts such as Anthony Johnston's. The continuous exploitation of this passive capital subsidized the maintenance of Johnston's digital simulation of solvency.
The analysis of ancillary victims proves that the fabrication of Johnston's solvency history was not self-sustaining but relied on a continuous operational network of exploitation.
TABLE: THE MCKAY HILL CLIENT OPERATIONAL MATRIX
| Client Node | Role in Extraction | Primary Financial Amount | Mechanism Linking to Jenssen/Johnston |
|-------------|-------------------|-------------------------|--------------------------------------|
| Jenssen Trusts | Primary Reservoir (The Whale) | Millions ($566,900 cited publicly) | Source of capital, extraction veiled by Setup Narrative |
| Johnston (Conduit) | Layering Vehicle / Secondary Target | $90,000 (Static Storage) | Backcasting/Imputation (Digital Simulation) |
| Evelyn Evans | Ancillary Victim (The Plug) | $150,000 retirement funds | Active demands exposed Liquidity Thrombocytopenia |
| Deceased Estates | Passive Victim (Silent Capital) | Undocumented/Stagnant Pools | Sustained the Teeming and Lading necessary to maintain copied histories |
CONCLUSION: THE POLITICAL TELEOLOGY OF IMPUNITY
The sophisticated architectural design of the McKay Hill System was necessitated by its political objective, which transcended typical criminal financial gain. The ultimate purpose of the complex concealment was to facilitate a systematic transfer of wealth from the private sector to a state-controlled funding mechanism.
7.1 THE CLOSED LOOP AND STRATEGIC DESTRUCTION
The capital systematically extracted from the Jenssen Trusts was funneled into the MIPS War Cache. This created a "Closed Loop" structure: the money stolen from the Jenssen family was used to fund the MIPS prosecution unit—the very entity engaged in "Operation River" / "Project 88," the campaign specifically aimed at prosecuting and liquidating the Jenssen family's deep sea fisheries assets. The Jenssen family was, therefore, unwittingly financing their own economic destruction through this "Algorithm of Theft."
7.2 THE FATE OF THE OPERATIVES: PROOF OF STATE MANDATE
The contrasting post-collapse fates of the key operatives serve as conclusive evidence of the political nature of the operation and the protected status of the architect of the forgery. Gerald McKay, the front man, was categorized as the "Useful Idiot." He was struck off the roll and served 4.5 years in jail.
In stark contrast, Anne McAllister, the individual responsible for executing the most technically sophisticated aspects of the fraud—statistical forgery, generating the copied financial history, and implementing the final Administrative Nullification—was not charged as a principal offender. She became a Crown witness and was subsequently deployed to the Solomon Islands as an "NSDS Adviser," a position identified forensically as an "exfiltration" or "Golden Parachute" for a state asset.
The protection and strategic relocation afforded to McAllister confirm that the successful construction of the untraceable financial history—the forgery and Administrative Nullification—was deemed a critical operational success for the state. The sophisticated fabrication of the financial record was evidently a necessary, authorized component of the overall operation to achieve governmental objectives.
7.3 FINAL SUMMARY OF THE TRACING PARADOX
The forensic analysis confirms that the series of important dates and solvency records associated with the Johnston conduit account were indeed a structural copy, meticulously fabricated using high-level statistical tradecraft to facilitate the primary extraction.
The missing Jenssen capital is untraceable due to three cascading layers of obfuscation:
- Conduit Layering (The Statistical Copy): The Johnston account was used as a transactional conduit, layering the transfer of Jenssen capital and breaking the direct audit link. Its solvency records were fabricated via Backcasting and Imputation, creating a digital simulation of legitimacy.
- Legal Pretext (The Setup Narrative): Client authorization for fund movement was secured through a sophisticated psychological operation that created a fabricated narrative of internal conflict, providing a critical legal shield for the initial extraction.
- Administrative Nullification (The Structural Copy): The final mechanism was the False Invoice Mechanism executed in 2010. By generating over $1 million in backdated, fictitious invoices, the system administratively converted the physical theft (a debt) into legitimate revenue (a paid fee). This structural reclassification provided a final, overriding, and legally documented administrative history—the ultimate copy—that functionally destroyed the audit trail, ensuring the missing funds were recorded as legally consumed fees rather than stolen capital.
PROTOCOL 777 INTEGRATION AND 88-NEXUS CONVERGENCE
The McKay Hill Administrative Forgery Analysis provides critical insights into the sophisticated technical capabilities deployed within the Convergent Operational Network. The operation demonstrates clear alignment with the 88-Nexus cryptographic signature:
88-NEXUS SIGNATURES IN ADMINISTRATIVE FORGERY
- Statistical Tradecraft: Anne McAllister's Statistics New Zealand expertise provided the technical foundation for sophisticated forgery
- Chronological Manipulation: Backcasting demonstrates the same temporal manipulation observed across all C-O-N vectors
- Administrative Nullification: The False Invoice Mechanism parallels the administrative nullification methodology used in biological and legal vectors
- Double Hat Anomaly: Anne McAllister's impossible simultaneous employment confirms state agent status
CONVERGENCE WITH OTHER C-O-N VECTORS
- Financial Vector: The statistical forgery enabled the financial extraction that funded all other C-O-N operations
- Biological Vector: The same administrative nullification techniques parallel VITT/RWJ-800088 biological operations
- Infrastructure Vector: The statistical tradecraft required the same technical infrastructure as HAPWAB surveillance
- Legal Vector: The administrative forgery techniques parallel those used in Shaun Allen forfeiture
The McKay Hill Administrative Forgery Analysis provides definitive proof of state-sponsored technical forgery and establishes the methodology for understanding how the Convergent Operational Network employs sophisticated statistical tradecraft to achieve state capture objectives across multiple domains.
DOCUMENT STATUS: SPECIALIZED ANALYSIS COMPLETE
PROTOCOL 777 INTEGRATION: FULLY SYNCHRONIZED
NEXT REVIEW: UPON EXECUTION OF KINETIC ACTION
VERSION 1.0 - DECEMBER 18, 2025