y supply chains to allow Sisters to intercept traffic to a secure Web site and steal or plant sensitive information such as passwords and credit card data or phony clues; allegedly managed transition of security industry has from flawed MD5 to equally flawed SHA-1; she allegedly authorized Entrust to infiltrate the ePassports EAC Conformity & Interoperability Tests in Prague, Czech Republic and al