Just as a conclusion to this;
After much study though many manuals I have determined that this catastrophic effect is, in fact, caused by a fundamental incompatibility between Cisco proprietary features (PVST+ and EtherChannel Guard) and the IEEE 802.1q VLAN trunking standard.
Because 802.1q only supports 1 STP instance, Cisco’s per-VLAN BPDU are (in effect) “tunneled” through the 802.1q STP instance on the “Native VLAN”. This means that all Cisco devices running PVST end up being logically adjacent to each other. Because EtherChannel Guard examines BPDU to determine if the EC is healthy, a loop-type failure in one Cisco edge device is transferred through the network cloud to all the other Cisco edge devices because of the per-VLAN BPDU “tunneling” and logical adjacency.
In our case, we MUST use 802.1q because our core devices are Nortel, but this problem is with the 802.1q standard, not Nortel, and even all-Cisco equipment running the IEEE standard for VLAN trunks would see the same issue. On the other hand, ISL trunking does support per-VLAN BPDU, so "Good Boys" won't see this.
The answer is, in fact, to explicitly disable STP on all Cisco devices for all VLANS. In our case we do not view this as a problem because there is a proprietary Nortel feature called Simple Loop Prevention Protocol (SLPP) that provides the same function as Cisco’s EtherChannel Guard, but a) it does not use the STP-BPDU and b) it is core-based, not edge-based.
So, in addition to turning off STP everywhere, we have turned on this SLPP protection, and life should be good (until Next Time).