Attack Scenario 404

Attack Scenario 404 *
How the Attack Might Have Been Engineered (But Probably Wasn't)

The case that the 9/11/01 attack was an inside job can be made quite apart from any specific theory as to how it was accomplished, by simply demonstrating that only insiders had the means and opportunity to execute key elements of the attack. The true nature of such an operation is undoubtedly hidden behind layer upon layer of cover story, and its details may never be discovered. Speculative theories of the operation, while not verifiable, nonetheless can be useful in answering important questions about the attack, such as the size of the conspiracy required to carry it out.

Attack Scenario 404 is such a theory. It shows that, although the attack employed a variety of sophisticated communications and weapons technologies, all of these technologies were available "off-the-shelf", having been developed by secret programs ostensibly for other purposes. Specific tasks required to fulfill the mission were outsourced to companies providing strict confidentiality and working on a need-to-know basis.

This scenario shows that, through their positions of access in the military command structure, a very small group of people would have been able to appropriate these technologies to carry out the attack. While the attack is engineered by a core of only a dozen people, vast numbers of people facilitate the attack and cover-up, for the most part unknowingly, by simply doing what they normally do in their positions: promote and protect their agencies and the status quo. The public at large participates in the cover-up by failing to question the attack and instead believing the relatively comforting myth of bin Laden.

This scenario contrasts with Professor A.K. Dewdney's Operation Pearl, which requires large numbers of insiders. One of the most persuasive arguments made by defenders of the official story is that an inside job would have involved a conspiracy too large to keep concealed. Attack Scenario 404 provides a counterexample...



No comments:

Post a Comment