Daily Archives: 11. September 2023


11.09.2023 - 23:59 [ Daniel Neun / Radio Utopie ]

DER 11. SEPTEMBER: Die Attentate – Ablauf, Hergang und Widersprüche

(13. September 2014)

Am Morgen des 11. Septembers 2001 sind im Zuge der in Teil I beschriebenen Militärmanöver eine große Anzahl von Kampfflugzeugen der US-Luftwaffe nach Kanada und Alaska verlegt. Zur Verteidigung des gesamten Nordostens der Vereinigten Staaten von Amerika verbleiben vier Kampfflugzeuge. Während der Attentate bricht in NORAD Verwirrung darüber aus, ob eintreffende Meldungen tatsächliche Ereignisse oder die Manöver betreffen (“Is this real world or exercise?”). Kommunikation wird gejammed, “Phantom”-Flugzeuge tauchen auf den Bildschirmen auf, simulieren in bzw aus entgegengesetzten Richtungen fliegende Maschinen und verschwinden wieder (die Quelle dieser Simulationen wird nie öffentlich) und lenken die verbliebenen Verteidigungskräfte ab.

Wie in Teil III beschrieben, hatte die Luftfahrtbehörde FAA, in Zusammenarbeit mit dem Pentagon, den Kriegskonzern Raytheon in 1996 beauftragt zwecks der Modernisierung des Computersystems der Luftfahrtbehörde deren IT-Systeme auszutauschen. Das Luftraumkontrollsystem “Standard Terminal Automation Replacement System” (STARS) von Raytheon wurde nachfolgend auch vom US-Militär bzw der Air Force eingesetzt. Gleichzeitig war 1996 an Raytheon der Auftrag für ein stationäres Radarsystem zur Überwachung des Luftraums in der Nähe von Flughäfen namens “Digital Airport Surveillance Radars” (DASR) ergangen. In 2011 beschrieb der Kriegskonzern Raytheon in Werbeveröffentlichungen für sein von Militär und ziviler Luftfahrtbehörde verwendetes STARS Luftraumkontrollsystem die Möglichkeit “Geisterziele” (“ghost targets”) auf den Bildschirmen der Fluglotsen erscheinen zu lassen.

Am Morgen des 11. September 2001 werden nun lokale Militärkommandeure, die sich um Hilfe bemühen, von ihren Vorgesetzten hingehalten und von einem Luftwaffenstützpunkt an den nächsten verwiesen, bis hin zum Mittleren Westen. Zwei Militärjets, die schließlich von einem Stützpunkt in Langley aufsteigen (dort befindet sich auch das CIA Hauptquartier) um eine der als entführt gemeldete Passagiermaschine im Anflug auf Washington abzufangen, werden von einem Kommandoposten namens “Giant Killer” auf den Atlantischen Ozean hinaus gelotst.

Die Befehlskette und Abfolge der durch verantwortliche US-Stellen zu treffenden Maßnahmen im Falle im Falle einer Flugzeugentführung im Inland, die wie berichtet in den drei Jahren vor 9/11 im Rahmen der Flugzeugentführungs-Szenarien betreffenden 28 Militärmanöver sechsmal trainiert worden war, eingeschlossen die Simulation von Flugzeugabstürzen in “hochwertige Ziele” wie die New Yorker Freiheitsstatue und das Weiße Haus in Washington, lautete nun wie folgt:

1. eine Identifizierung des entsprechenden Vorgangs durch die Luftfahrtaufsichtsbehörde FAA (“Federal Aviation Administration”)
2. eine Meldung der FAA an NORAD
3. entsprechende Maßnahmen durch NORAD

Diese Kommandokette ist am 11. September während der Attentate durch eine ganze Reihe höchst ungewöhnlicher Umstände erschwert bzw. unterbrochen…

11.09.2023 - 23:59 [ luogo commune ]

„September 11 – The New Pearl Harbor“

„September 11 – The New Pearl Harbor“ is a 5 hour documentary that summarizes 12 years of public debate on 9/11. While aimed primarily at a general, uninformed audience, the film also contains some new findings that may be of interest to advanced researchers.

This film is intended as an educational, non-profit operation, and must remain so in order to fulfill all the requirements for the usage of copyrighted material. As such, the entire film is made available online for free from day one.

11.09.2023 - 23:55 [ US Government Publishing Office ]

Hearings before the Committee on Armed Services, United States Senate, One Hundred Eighth Congress, Second Session, August 16 and 17, 2004

The following five exercise hijack events included a suicide crash into a high-value target. Synopses of exercise results are not available. They were discarded in accordance with DOD directives.

Exercise Name: Vigilant Guardian 01-1
Exercise Date: 23 Oct 00
Participants: HQ NORAD/Continental U.S. NORAD Region (CONR)/Sectors
Scenario: Weapons of Mass Destruction directed at the United Nations–an individual steals a Federal Express aircraft and plans a suicide attack on the United Nations Building in New York City.
Synopsis of actions: Conducted an interception, exercised command and control and coordinated with external agencies.

Exercise Name: Vigilant Guardian 01-1
Exercise Date: 16 Oct 00
Participants: HQ NORAD/Cheyenne Mountain Operations Center/CONR/
Canadian NORAD Region/Sectors
Scenario: Due to recent arrests involving illegal drug trafficking in Maine, an individual steals a Federal Express plane and plans a suicide attack into the United Nations Building in New York City.
Synopsis of actions: Exercised command and control, coordinated with external agencies and followed hijack checklists.

Exercise Name: Falcon Indian 99-3
Exercise Dates: 5 Jun 00
Participants: CONR/Sectors
Scenario: Learjet hijacked maintaining tight formation with Canadair airliner, loaded with explosives. Learjet planned to crash into the White House.
Synopsis of actions: Exercised command and control, coordinated with external agencies and followed hijack checklists.

Exercise Name: Falcon Indian 00-1
Exercise Dates: 5 Jun 00
Participants: CONR/Sectors
Scenario: Communist party faction hijacks aircraft bound from western to eastern United States. High explosives on board. Intends to crash into the Statue of Liberty.
Synopsis of actions: Cross-sector hand over. Exercised command and control, coordinated with external agencies and followed hijack checklists. Federal Aviation Administration requested assistance.

Exercise Name: Falcon Indian 00-1
Exercise Date: 6 Nov 99
Participants: CONR/Sectors
Scenario: China Air from Los Angeles to JFK airport hijacked east of Colorado Springs by five terrorists. If not intercepted, intends to crash into United Nations building.
Synopsis of actions: Cross-sector hand over. Exercised command and control, coordinated with external agencies and followed hijack checklists.

11.09.2023 - 23:42 [ SilentRepublicWTC / Youtube ]

11 Commission _ Trans. Sec Norman Mineta Testimony.mov

(02.05.2010)

Mineta’s Presidential Emergency Operations Center (PEOC) testimony was also edited out of the 9/11 Commission video archive.
When questioned about this, representatives at the National Archive stated that the video may have been lost because of a ’snafu‘. Following is a brief summary of the scrubbed video along with links to recently obtained C-SPAN video.

Mineta responds to an opening question by Commissioner Hamilton about the events in the PEOC and an alleged shoot down order. He describes a conversation between Cheney and a young man:

Mineta: „During the time that the airplane was coming into the Pentagon, there was a young man who would come in and say to the Vice President…the plane is 50 miles out…the plane is 30 miles out….and when it got down to the plane is 10 miles out, the young man also said to the vice president „do the orders still stand?“ And the Vice President turned and whipped his neck around and said „Of course the orders still stand, have you heard anything to the contrary!??“

11.09.2023 - 23:37 [ dotheordersstillstand.blogspot.com ]

Do The Orders Still Stand?

(September 12, 2011)

Secretary of Transportation Norman Mineta was in the Presidential Emergency Operation Center with Vice President Cheney as Flight 77 approaced Washington, D.C. This plane was unidentified and flying in restricted airspace for over 45 mintues since the second tower was attacked and it was not intercepted by the Airforce. In fact, two fighters were launched but were sent out over the Atlantic searching for Russians.

On May 23, 2003 in front of the 9/11 Commission, Secretary Mineta testified:

„During the time that the airplane was coming in to the Pentagon, there was a young man who would come in and say to the Vice President, „The plane is 50 miles out.“ „The plane is 30 miles out.“ And when it got down to „the plane is 10 miles out,“ the young man also said to the Vice President, „Do the orders still stand?“ And the Vice President turned and whipped his neck around and said, „Of course the orders still stand. Have you heard anything to the contrary?“

Watch Mineta‘s Testimony To The 9/11 Commmission on CSPAN:

11.09.2023 - 23:04 [ Federation of American Scientists - fas.org ]

CRITICAL FOUNDATIONS: PROTECTING AMERICA’S INFRASTRUCTURES – The Report of the President’s Commission on Critical Infrastructure Protection

(13.10.1997)

Existing Information Sharing Efforts

(…) We also found a great deal of information sharing already underway. Trade associations, consortia, and other groups exchange information among their members and, in some cases, directly with government. Many federal, state and local government agencies have existing relationships with infrastructure owners and operators. Within all the infrastructure sectors, at least some portions are subject to regulatory control by government agencies, and information is shared, albeit sometimes within carefully defined constraints. Several federal agencies provide information to infrastructure owners and operators. The FBI’s Awareness of National Security Issues and Response (ANSIR) program gives over 25,000 industry members information that provides threat and vulnerability insights. More narrowly focused programs are the Department of Transportation’s terrorist threat notification to the civil aviation industry and the National Security Agency’s INFOSEC Vulnerability Assessment Program, which provides information systems-related data to private sector partners. The Comptroller of the Currency operates another system providing advisories on information integrity and security risks to financial institutions.

(…)

The third and least predictable threat to the infrastructure comes from deliberate attack. Depending on their objectives, attackers may seek to steal, modify, or destroy data stored in information systems or moving over networks, or to degrade the operation of the systems and net-works themselves, denying service to their users. Attackers include national intelligence organizations, information warriors, terrorists, criminals, industrial competitors, hackers, and aggrieved or disloyal insiders. While insiders constitute the single largest known security threat to information and information systems, controlled testing indicates that large numbers of computer based attacks go undetected, and that the unknown component of the threat may exceed the known component by orders of magnitude.

(…)

The air traffic control system of the FAA is based on decades old technology. The replacement system, while doubtless more efficient, will be more vulnerable unless special security measures are incorporated.

(…)

The Commission recommends the Secretary of Transportation:

1) Fully evaluate actual and potential sources of interference to, and vulnerabilities of, GPS before a final decision is reached to eliminate all other radiovnavigation and aircraft landing guidance systems.

2) Sponsor a risk assessment for GPS-based systems used by the civilian sector, projected from now through the year 2010.

3) Base decisions regarding the proper federal navigation systems mix and the final architecture of the NAS on the results of that assessment. The DOT and FAA must develop a better understanding of interference and other vulnerabilities of GPS before a final decision is reached concerning the status of all other radionavigation and landing guidance systems. A federally sponsored thorough, integrated risk assessment would lay a sound foundation for decisions on future courses of action.

The National Airspace System

The Commission recommends the FAA act immediately to develop, establish, fund, and implement a comprehensive National Airspace System Security Program to protect the modernized NAS from information-based and other disruptions, intrusions and attack. Program implementation should be guided by the recommendations found in the Vulnerability Assessment of the NAS Architecture, prepared for the Commission. The Vulnerability Assessment included the following recommendations: (…)

3) The FAA should consider the implementation of full “trusted” hardware and software security capabilities for only the FAA’s most vulnerable future subsystems, since the software cost for embedded applications, together with full audit, tracking, and monitoring, may be too great if applied to all subsystems. Relaxation of the full capabilities, such as less rapid revalidation (e.g., a slower fifteen minutes down time) and less constant vigilance of data integrity, should be considered on a case-by-case basis for less critical subsystems, particularly in situations where existing air traffic control recovery procedures exist.

4) The FAA should conduct a comprehensive investment analysis of NAS INFOSEC in order to determine the degree of security protection that is needed

(…)

Transportation: A critical infrastructure characterized by the physical distribution system critical to supporting the national security and economic well-being of this nation, including the national airspace system, airlines and aircraft, and airports; roads and highways,trucking and personal vehicles; ports and waterways and the vessels operating thereon; mass transit, both rail and bus; pipelines, including natural gas, petroleum, and other hazardous materials; freight and long haul passenger rail; and delivery services.

11.09.2023 - 22:43 [ AviationNewsPortal / Youtube ]

NASA Aircraft Crash Test 1984 – Inside a Plane

(04.07.2012)

On December 1st, 1984, a remote controlled 4 engined transport jet took off from Edwards AFB, CA and crashed into a barren patch of nearby desert. This Controlled Impact Demonstration was a joint R&D program by the FAA and NASA

11.09.2023 - 22:39 [ 911InvestigationVids / Youtube ]

Plane Crash On The White House Lawn (1994)

(video)

11.09.2023 - 22:24 [ Central Intelligence Agency / Archive.org ]

CIA Document 1035-960 – Concerning Criticism of the Warren Report

(01. April 1967)

Presumably as a result of the increasing challenge to the Warren Commission‘s report, a public opinion poll recently indicated that 46% of the American public did not think that Oswald acted alone, while more than half of those polled thought that the Commission had left some questions unresolved. Doubtless polls abroad would show similar, or possibly more adverse results.

(…)

Innuendo of such seriousness affects not only the individual concerned, but also the whole reputation of the American government. Our organization itself is directly involved: among other facts, we contributed information to the investigation. Conspiracy theories have frequently thrown suspicion on our organization, for example by falsely alleging that Lee Harvey Oswald worked for us. The aim of this dispatch is to provide material countering and discrediting the claims of the conspiracy theorists, so as to inhibit the circulation of such claims in other countries. Background information is supplied in a classified section and in a number of unclassified attachments.

3. Action. We do not recommend that discussion of the assassination question be initiated where it is not already taking place. Where discussion is active, however, addresses are requested:

a. To discuss the publicity problem with liaison and friendly elite contacts (especially politicians and editors), pointing out that the Warren Commission made as thorough an investigation as humanly possible, that the charges of the critics are without serious foundation, and that further speculative discussion only plays into the hands of the opposition. Point out also that parts of the conspiracy talk appear to be deliberately generated by Communist propagandists. Urge them to use their influence to discourage unfounded and irresponsible speculation.

b. To employ propaganda assets to answer and refute the attacks of the critics. Book reviews and feature articles are particularly appropriate for this purpose. The unclassified attachments to this guidance should provide useful background material for passing to assets. Our ploy should point out, as applicable, that the critics are (I) wedded to theories adopted before the evidence was in, (I) politically interested, (III) financially interested, (IV) hasty and inaccurate in their research, or (V) infatuated with their own theories.

(…)

4. In private to media discussions not directed at any particular writer, or in attacking publications which may be yet forthcoming, the following arguments should be useful:

a. No significant new evidence has emerged which the Commission did not consider. The assassination is sometimes compared (e.g., by Joachim Joesten and Bertrand Russell) with the Dreyfus case; however, unlike that case, the attack on the Warren Commission have produced no new evidence, no new culprits have been convincingly identified, and there is no agreement among the critics. (A better parallel, though an imperfect one, might be with the Reichstag fire of 1933, which some competent historians (Fritz Tobias, AJ.P. Taylor, D.C. Watt) now believe was set by Vander Lubbe on his own initiative, without acting for either Nazis or Communists; the Nazis tried to pin the blame on the Communists, but the latter have been more successful in convincing the world that the Nazis were to blame.)

11.09.2023 - 20:24 [ New York Times ]

Cable Sought to Discredit Critics of Warren Report

(December 26, 1977, Page 32)

Conspiracy theories,” the cable went on, “have frequently thrown suspicion on our organization, for example by falsely alleging that Lee Harvey Oswald worked for us. The aim of this dispatch is to provide material for countering and discrediting the claims of the conspiracy theorists, so as to inhibit circulation of such claims in other countries.”

The C.I.A. was careful to caution its stations overseas not to initiate a discussion “of the assassination question” where such a discussion was “not already taking place.” But where such discussions were under way, C.I.A. officers abroad were directed to “discuss the publicity problem with liaison and friendly elite contacts, especially politicians and editors,” and to “employ propaganda assets to answer and refute the attacks of the critics.”

11.09.2023 - 19:21 [ Daniel Neun / Radio Utopie ]

DER 11. SEPTEMBER: Duplikat, Drone, Plan

(12. September 2014)

Bereits vor Jahrzehnten entwickelte das Militär der Vereinigten Staaten von Amerika den Plan ein eigenes ziviles Passagierflugzeug in der Luft gegen eine unbemannte „Drone“ auszutauschen, um diese dann selbst zur Explosion zu bringen und einen Abschuss vorzutäuschen. Ebenso wurde der Plan einer „Terrorkampagne“ in der eigenen Hauptstadt Washington, sowie die Versenkung eines US-Kriegsschiffes autorisiert. Ziel war es, diese Vorfälle einer feindlichen Macht zu unterstellen, vor der Weltöffentlichkeit das Opfer zu spielen und nachfolgend eine Invasion starten zu können.

Jahr der Entwicklung des Plans: 1962. Zielobjekt: Kuba.

11.09.2023 - 19:15 [ Archive.org ]

Operation Northwoods

(March 13, 1962)

c. Commence large scale United States military operations.
3. A „Remember the Maine“ incident could be arranged in several forms:
a. We could blow up a US ship in Guantanamo Bay and blame Cuba.
b. We could blow up a drone (unmanned) vessel anywhere in the Cuban waters. We could arrange to cause such incident in the vicinity of Havana or Santiago as a spectacular result of Cuban attack from the air or sea, or both. The presence of Cuban planes or ships merely investigating the intent of the vessel could be fairly compelling evidence that the ship was taken under attack. The nearness to Havana or Santiago would add credibility especially to those people that might have heard the blast or have seen the fire. The US could follow up with an air/sea rescue operation covered by US fighters to „evacuate“ remaining members of the non-existent crew. Casualty lists in US newspapers would cause a helpful wave of national indignation.
4. We could develop a Communist Cuban terror campaign in the Miami area, in other Florida cities and even in Washington.

The terror campaign could be pointed at refugees seeking haven in the United States. We could sink a boatload of Cubans en route to Florida (real or simulated). We could foster attempts on lives of Cuban refugees in the United States even to the extent of wounding in instances to be widely publicized. Exploding a few plastic bombs in carefully chosen spots, the arrest of Cuban agents and the release of prepared documents substantiating Cuban involvement, also would be helpful in projecting the idea of an irresponsible government.

11.09.2023 - 19:11 [ New York Times ]

Declassified Papers Show Anti-Castro Ideas Proposed to Kennedy

(19. November 1997)

“We could blow up a US warship in Guantanamo Bay and blame Cuba,“ the memorandum said.

“We could develop a Communist Cuban terror campaign in the Miami area, in other Florida cities and even in Washington,“ it continued. “The terror campaign could be pointed at Cuban refugees seeking haven in the United States. We could sink a boatload of Cubans enroute to Florida (real or simulated).“

The records show that on March 13, 1962, the Joint Chiefs of Staff endorsed these ideas as “suitable for planning purposes.“ No evidence exists that they were carried out.

11.09.2023 - 18:44 [ George Washington University ]

Chile and the United States: Declassified Documents Relating to the Military Coup, September 11, 1973

(September 11, 1998)

Since the coup, however, few U.S. documents relating to Chile have been actually declassified- -until recently. Through Freedom of Information Act requests, and other avenues of declassification, the National Security Archive has been able to compile a collection of declassified records that shed light on events in Chile between 1970 and 1976.

These documents include:

– Cables written by U.S. Ambassador Edward Korry after Allende‘s election, detailing conversations with President Eduardo Frei on how to block the president-elect from being inaugurated. The cables contain detailed descriptions and opinions on the various political forces in Chile, including the Chilean military, the Christian Democrat Party, and the U.S. business community.

– CIA memoranda and reports on „Project FUBELT“–the codename for covert operations to promote a military coup and undermine Allende‘s government. The documents, including minutes of meetings between Henry Kissinger and CIA officials, CIA cables to its Santiago station, and summaries of covert action in 1970, provide a clear paper trail to the decisions and operations against Allende‘s government

– National Security Council strategy papers which record efforts to „destabilize“ Chile economically, and isolate Allende‘s government diplomatically, between 1970 and 1973.

– State Department and NSC memoranda and cables after the coup, providing evidence of human rights atrocities under the new military regime led by General Pinochet.

– FBI documents on Operation Condor–the state-sponsored terrorism of the Chilean secret police, DINA. The documents, including summaries of prison letters written by DINA agent Michael Townley, provide evidence on the carbombing assassination of Orlando Letelier and Ronni Moffitt in Washington D.C., and the murder of Chilean General Carlos Prats and his wife in Buenos Aires, among other operations.

These documents, and many thousands of other CIA, NSC, and Defense Department records that are still classified secret, remain relevant to ongoing human rights investigations in Chile, Spain and other countries, and unresolved acts of international terrorism conducted by the Chilean secret police. Eventually, international pressure, and concerted use of the U.S. laws on declassification will force more of the still-buried record into the public domain–providing evidence for future judicial, and historical accountability.

11.09.2023 - 18:43 [ LA Times ]

Previously classified documents released by U.S. show knowledge of 1973 Chile coup

(Aug. 29, 2023)

Every once in a while, the voices of ghosts emerge to reveal dark chapters in U.S. political history.

The State Department with the CIA last week declassified two 50-year-old documents that had been withheld from public view that shed new light on the military coup in Chile that overthrew the country’s elected president.

(…)

The full extent of the role of the CIA and other U.S. players in the Chile coup has long been debated. While the Nixon administration was not thought to have had a direct hand in executing the coup, it appeared to fit the pattern of numerous so-called regime changes the U.S. clandestinely engineered over the decades in Latin America, Iran and beyond.

11.09.2023 - 18:16 [ Amerika21.de ]

Wie die Diktatur in Chile sich auf deutsche Nazis im BND verlassen konnte

Die von Zeugen geschilderten höchstrangigen Zugänge von Rauff in der Hierarchie der Diktatur sowie sein Auftreten und seine Anordnungen zeigten seine wichtige Rolle im „System der chilenischen inneren Sicherheit“. Die Schilderungen lassen erkennen, dass der deutsche Nazi für die Verfolgung der Opposition, die Schulung in Verhörtechniken und bei der Perfektionierung des spurlosen Verschwindenlassens von gefolterten und getöteten Oppositionellen dem Repressionsapparat wertvolle Mitarbeit bot.

Die Doku belegt frühe Begegnungen zwischen Rauff und Pinochet in Ecuador, die eine langjährige Bekanntschaft begründeten. Pinochet soll Rauff angeregt haben, nach Chile überzusiedeln, was dieser laut CIA-Erkenntnissen 1958 tat. Zwischen 1960 und Februar 1962 hielt Rauff sich mehrfach zur Schulung durch den BND in der BRD auf. Der bundesdeutsche Haftbefehl von 1961 bildete kein Hindernis.

11.09.2023 - 18:07 [ Amerika21.de ]

50. Jahrestag des faschistischen Militärputsches in Chile

Am 11. September 2023 jährt sich zum 50. Mal der Tag des faschistischen Militärputsches gegen die demokratisch gewählte Regierung der Unidad Popular unter Salvador Allende in Chile. Diesen Tag wollen wir zum Anlass nehmen, um an den 50. Jahrestag des Putsches zu gedenken.

11.09.2023 - 18:00 [ USA Today ]

‚The other 9/11‘: As US marks attack anniversary, another infamous milestone looms

The other 9/11 happened in 1973, when Chile‘s government was overthrown by a military coup d‘état led by Augusto Pinochet and encouraged by the United States. It was the beginning of a 17-year dictatorship that saw the deaths and disappearances of at least 3,065 people, the brutal torture of thousands more and a child-trafficking system that stole babies from poor mothers and adopted them out in the U.S. and other nations.