Such a sophisticated operation would require the fixed frame of a state intelligence organization; something not found in a loose group, like the one led by the student Mohammed Atta in Hamburg.This remains one of the great unanswered questions about 9/11: How was it done? How did nineteen outsiders manage to outwit and outmaneuver America's entire national security system? How could men on planes armed with box-cutters have possibly done that?
Or was America's security alarm switched off somehow? Otherwise, how could they have hit the Pentagon, for crying out loud?
Most so-called journalists pretend this riddle has already been solved -- or that it never existed in the first place. But Christopher Bollyn is still trying to solve it. And it seems like he's getting close; the piece he posted yesterday makes a lot of sense to me:
9-11 was a computer crime. Apart from being a monstrous crime of mass murder and false flag terrorism, 9-11 was also a sophisticated computer crime, carried out through long-term foreign infiltration of the most sensitive U.S. military and government computer networks.What? Listen:
This infiltration, carried out by a foreign intelligence agency, gave the perpetrators of 9-11 "real-time" access to all the data on the computers of the U.S. government and military. On 9-11, this "super-user" access to the data of the most critical government computer networks gave the terrorists the ability to thwart the military response to the emergency as it developed.
Most importantly, the terrorists who committed 9-11 through their "super-user" access to the most critical computer networks of the U.S. government still have that access. The evidence indicates that this infiltration was carried out by the military intelligence agency of the State of Israel.
The subject of computer sabotage in relation to the aerial attacks of 9-11 was brought to the fore by Indira Singh, who spoke at early 9-11 truth events organized by Kyle Hence.So ... who are Ptech and MITRE? What do you know about these companies?
During these early 9-11 "truth" events, a small Massachusetts-based software company called Ptech was brought up by Singh, who sought to link it to Arab terrorists.
Ptech was said to be a start-up company from Quincy, Mass. whose software was loaded onto the most sensitive computer systems across the U.S. government, including those of the Federal Aviation Administration (FAA) and the U.S. Air Force, two agencies whose systems failed miserably on 9-11.
Singh, a senior consultant with JP Morgan Chase on 9-11, is described as a "whistle-blower" because of her revelations about Ptech's involvement with the critical computer systems that failed on 9-11.
"Ptech was with MITRE Corporation in the basement of the FAA for two years prior to 9/11," Singh said. "Their specific job is to look at interoperability issues the FAA had with NORAD and the Air Force in the case of an emergency. If anyone was in a position to know that the FAA -- that there was a window of opportunity or to insert software or to change anything -- it would have been Ptech along with MITRE."
Singh has spoken extensively about Ptech's alleged connections with Saudi Arabia, for example with Pacifica Radio in 2005:It doesn't make any sense to me, either. But it looks like a gun, and it smells like smoke. And the powers that are really behind Ptech and MITRE are tightly connected to Israeli intelligence.
...
Ptech software "is utilized at the highest levels of almost every government and military and defense organization in this country," Singh said, "including the Secret Service, the FBI, the Department of Defense, the House of Representatives, the Treasury Department, the IRS, the U.S. Navy, the U.S. Air Force, and, last but not least, the Federal Aviation Administration."
I found it hard to believe that the most sensitive government and military computers would run enterprise software from a Lebanese-owned start-up company called Ptech from Quincy, Mass. All the talk about the Saudi-financier behind Ptech being linked to Osama bin Laden smelled like a "cut out" to me.
It simply did not make sense that the most secure computer systems of the U.S. government would be running software written by a Lebanese Muslim financed by a Saudi who happened to be on the most-wanted list of global terrorists.
No more excerpts. Go read the rest:
How Did Israeli Spy Software Get Onto Critical FAA Computers?
~~~
see this, too:
9-11 - Bush Was Behind Silencing of Dr. Steven E. Jones on Thermite