-Caveat Lector-

From

This is a WorldNetDaily printer-friendly version of the article which follows.
To view this item online, visit
http://www.worldnetdaily.com/news/article.asp?24466

Wednesday, September 12, 2001
DAY OF INFAMY 2001
U.S. equipped
terror sponsors
Clinton exported NSA-ducking phone,
high-tech encryption devices to Syria
By Paul Sperry
© 2001 WorldNetDaily.com
WASHINGTON -- The dozen or so Islamic terrorists who pulled off the plot to
strike at America's nerve centers in New York and Washington spent
months, if not years, researching, planning and coordinating the surprise
attacks, U.S. security officials say. And they did it completely in secret,
using the world's most sophisticated telecommunications equipment, some
secured by advanced encryption technology that most armies don't have.

Where did they get such state-of-the-art, military-related gear?

First, you have to appreciate the high degree of communications activity their mission 
required at each stage.

In researching their targets, the terrorists picked ones relatively easy to hit at 
high air speeds, yet ones that would produce big casualties and provide symbolic blows 
to American morale. They had to pick airports close
 by, with weak security. They had to find jets with enough heft and wingspan and fuel 
to cause major damage, yet not so large that they required extra crew.

The Boeing 757s and 767s they hijacked were big, but all had just two pilots and no 
flight engineers, making it easier for terrorists to take the cockpits. And the 
heisted jets were from the same family of aircraft, obvia
ting additional cockpit training.

They also apparently studied passenger traffic patterns of airlines in order to pick 
flights with relatively few people aboard. All four flights had light passenger loads. 
The Boeing jets have roughly 160-seat capacities,
 yet American Flight 11 carried 81 passengers; American Flight 77, only 58; United 
Flight 175, 56; and United Flight 93, a skeletal 38.

Fewer passengers, fewer heroes to worry about.

More key, the terrorists needed to select transcontinental flights with big fuel loads 
to turn the planes into giant petro-bombs. All four flights were bound for California. 
They also had to know flight patterns, and how
to blind air-traffic controllers to the hijackings by turning off the planes' 
transponders, which send such warning signals, among other aviation information.

In planning the attack, they had to fashion weapons that they could sneak past airport 
security. Transportation Department officials think that they may have hedged their 
bets and even planted security people on the insid
e at Logan and Dulles airports, so that guards would look the other way when they came 
through metal detectors at the terminals.

The kamikaze pilots also had to log many hours on computer flight simulators with 
high-level graphics capability, to practice hitting their targets at full throttle. A 
Continental Airlines captain, who's flown both 757s a
nd 767s, told WorldNetDaily he thinks they may have even added the World Trade Center 
and Pentagon to the simulator's visual database.

"At the airspeed of those strikes, which hit their targets dead on, the hand-eye 
coordination demands would be too high for casual flying skill -- with, or without, an 
autopilot engaged," he said.

They had to practice, moreover, navigating the jets to abruptly change their course, 
by as much as 180 degrees in some cases, after take-off. Flying them at low altitudes 
was also something they had to work on.

Synchronized terrorists
Finally, in executing their murderous missions, the 12 or so terrorists had to 
coordinate their activities, flawlessly, within a roughly two-hour stretch. And, for 
the most part, they did. They all got to the airport on t
ime, they all got through security, they all boarded their flights, they all hijacked 
their flights and, with the exception of one group, they all hit their targets.

Pulling off such a complex plot would have generated an inordinate volume of 
communications -- whether by radio, cell phone, land line, fax or modem -- among
the terrorists, among their Middle-Eastern sponsors and among commercial contacts here 
and abroad.

But somehow eavesdroppers at the super-secret National Security Agency -- with their 
billion-dollar satellite "birds" and other surveillance technology -- were deaf, dumb 
and blind to the wicked plot.

"The real issue in this tragedy is how the hell were these people able to plan and 
coordinate such a strike over a period of months without the NSA intercepting their 
signals?" demanded Peter M. Leitner, a senior strategi
c trade adviser at the Defense Department.

Leitner, who reviews commercial license applications for exports of some of the most 
sophisticated military-related technology, thinks he knows the answer.

"The technology that would allow these terrorists to mask their communications was 
given away, hand over fist, by the Clinton administration," he said in an interview 
with WorldNetDaily.

Leitner says the previous administration rubber-stamped the shipment of top-end
military-related telecommunications equipment to Syria, which is on the FBI's list of 
sensitive countries that pose a threat to U.S. security.

"Syria is a terrorist-supporting nation," he said. "They provide infrastructure to 
bastards like [Osama] bin Laden. They provide backup and support and communications 
abilities to these terrorist cells."

So what kind of gear has Syria -- and likely bin Laden, by way of Syria -- gotten from 
America?

Spread-spectrum radios
"We're giving them spread-spectrum radios, which are almost impossible to break into. 
We're giving them fiber optics. We're giving them a high level of encryption. We're 
giving them computer networks that can't be tapped,
" Leitner said.

Spread-spectrum radios, originally designed for military use only, change their 
frequency constantly.

"Bin Laden's cells aren't having any trouble communicating anymore," Leitner said.

Bin Laden, the world's No. 1 terrorist and the  Pentagon's chief suspect in Tuesday's 
attacks, is known to use portable satellite telephones, advanced encryption cell 
phones and other encrypted telephony equipment, as wel
l as secure computer networks -- all compliments of U.S. technology, Leitner says.

"If people are worried about how these people were able to coordinate and communicate 
something like this -- which had to be pretty extensively coordinated -- without it 
being intercepted, it's because of the crap we've b
een selling these people," he said.

"How can you penetrate their networks when you can't even eavesdrop on their 
conversations?" he said.

"You can't stop them when they're coming right at your building," he said. "But, damn 
it, you should be able to stop them months in advance by breaking up their networks."

Leitner posits that the NSA wasn't able to detect the Islamic terrorists' plot because 
of the "high quality of the communications gear that they've been acquiring over the 
last couple of years, thanks to the Clinton admin
istration's decontrols on advanced telecommunications equipment."

Terrorists' secured telecom gear "makes it infinitely more difficult to get even early 
warning signs" about their activities, he said.

Tuesday's attacks took the entire U.S. government, including the intelligence 
community, by surprise.

"We had no specific warning of the U.S. attacks," said Sen. Richard Shelby, R-Ala., 
ranking minority member of the Intelligence Committee.

Complete surprise
The Pentagon issued an alert of "Threat Con Alpha" the day before the attack, which 
meant that no threats were on the horizon. The same alert was issued the morning of 
the attack.

"We got no word of anything," Leitner said.

"We weren't warned of anything," another Pentagon official told WorldNetDaily.

Asked Tuesday if he had any inkling of the plot, Defense Secretary Donald Rumsfeld 
dodged the question: "We don't discuss intelligence matters."

Three weeks ago, some overseas papers quoted bin Laden saying that a major strike 
against the U.S. was coming soon. But there were no specifics. And bin Laden
reportedly sent an e-mail to unknown government sources three days ago warning holy 
hell would break out. But again, he didn't say how, when or where.

Still, it's baffling that the U.S. intelligence community didn't pick up, early on, 
any specifics of the complex and long-planned plot through electronic intercepts and 
signals intelligence.

But it's actually not that baffling, Leitner asserts, against the backdrop of loose 
government controls on dual-use telecom exports.

"I've testified to Congress that it will take serious numbers of body bags before we 
wake up to the need to tighten dual-use export controls," he said. "Unfortunately, 
we've got them now."

"This is so tragic and yet so preventable," he said. "Now we're going to have to knock 
out their [terrorist] camps, just like we had to bomb the Iraqi's several times now to 
try to take out the fiber-optics network that t
he Chinese are installing in Iraq's air-defense systems."

"Yet, it was the Clinton administration that gave the Chinese the technology to give 
to Iraq," he noted.

The Bush administration apparently hasn't woken up, either.

Wake-up call
In June, Leitner was asked by the Commerce Department to OK a new round of exports of 
dual-use telecom equipment to Syria. He denied the request, and was asked to 
reconsider. He denied it again, arguing in a letter to Kar
en Vogel, the Commerce export licensing officer who requested the approval, that:

"Doing so vastly upgrades the C3 and C41 systems of the Syrian military and 
Intelligence Services. My concerns are also obviously compounded by the fact that 
Syria is one of the foremost state sponsors of terrorism."

Leitner continued: "Since an 'upgraded telecom infrastructure' will also greatly 
facilitate Syrian planning, coordination, secrecy and execution of terrorist acts, as 
well as direct military communications, I see absolute
ly no basis for any position other than a denial."

Vogel argued in an earlier letter that her request came on the heels of eight previous 
approvals of licenses for similar exports to Syria.

"There's still a lot of things inside the government involving national security that 
have just got to be changed," Leitner said.

Another senior Pentagon official who specializes in counterterrorism says his own 
faith in the U.S. intelligence community has been shattered.

"This full-court press by terrorists blows the hell out of the line that we've been 
hearing for years from the intelligence community that if they try anything big, we'll 
know about it and warn you. Anything bigger than a
 couple of people, don't worry, we'll know about it," he said. "Well, I guess they 
didn't."

Previous stories:

Is Pentagon muzzling its export watchdogs?
Pentagon suspects Osama bin Laden
Why the Pentagon was so vulnerable
Terrorists slit throats of 2 AA stewardesses
Flight 11 had mechanical delays last week
Lobsters, not explosives, on American jet
Related columns:

Media Mr. Magoos blind to Clinton pattern
Revenge of Gary Aldrich
Paul Sperry is Washington bureau chief for WorldNetDaily.
~~~~~~~~~~~~~~~
Forwarded as information only; no endorsement to be presumed
+ + + + + + + + + + + + + + + + + + + + + + + + + + + +
In accordance with Title 17 U.S.C. section 107, this material
is distributed without charge or profit to those who have
expressed a prior interest in receiving this type of information
for non-profit research and educational purposes only.
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + +
The only real voyage of discovery consists not in seeking
new landscapes but in having new eyes. -Marcel Proust
+ + + + + + + + + + + + + + + + + + + + + + + + + + + +
"Do not believe in anything simply because you have heard it. Do not believe
simply because it has been handed down for many generations. Do not
believe in anything simply because it is spoken and rumored by many. Do
not believe in anything simply because it is written in Holy Scriptures. Do not
believe in anything merely on the authority of Teachers, elders or wise men.
Believe only after careful observation and analysis, when you find that it
agrees with reason and is conducive to the good and benefit of one and all.
Then accept it and live up to it."
The Buddha on Belief, from the Kalama Sutta
+ + + + + + + + + + + + + + + + + + + + + + + + + + + +
A merely fallen enemy may rise again, but the reconciled
one is truly vanquished. -Johann Christoph Schiller,
                                     German Writer (1759-1805)
+ + + + + + + + + + + + + + + + + + + + + + + + + + + +
It is preoccupation with possessions, more than anything else, that
prevents us from living freely and nobly. -Bertrand Russell
+ + + + + + + + + + + + + + + + + + + + + + + + + + + +
"Everyone has the right...to seek, receive and impart
information and ideas through any media and regardless
of frontiers."
Universal Declaration of Human Rights
+ + + + + + + + + + + + + + + + + + + + + + + + + + + +
"Always do sober what you said you'd do drunk. That will
teach you to keep your mouth shut."
--- Ernest Hemingway

<A HREF="http://www.ctrl.org/";>www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html";>Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/";>ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to