Humint Events Online: FAA Controllers Had To Be Part of the 9/11 Hijacking Exercise

Wednesday, November 23, 2005

FAA Controllers Had To Be Part of the 9/11 Hijacking Exercise

Otherwise this exchange (from the 911CR) makes no sense:
This was the first notification received by the military-at any level-that American 11 had been hijacked:

FAA: Hi. Boston Center TMU [Traffic Management Unit], we have a problem here. We have a hijacked aircraft headed towards New York, and we need you guys to, we need someone to scramble some F-16s or something up there, help us out.

NEADS: Is this real-world or exercise?

FAA: No, this is not an exercise, not a test.

If the controllers were NOT involved:
a) why does the military ask them if the hijacking was part of the exercise, and
b) why does the FAA they have to tell the military that the hijacking wasn't an exercise?

I suppose the commission put this passage in the report to illustrate the confusion going on that morning, but they oddly fail to explain the fact that there was a hijacking exercise going on that morning.

Note, the FAA is not taken aback by the odd question: "Is this real-world or exercise?" They responded immediately as if they knew what was going on.

But in any case, since the FAA was involved in the hijacking exercise that morning, are we really supposed to believe that the FAA wasn't confused by the real hijackings going on? Wouldn't this confusion have cost precious minutes in the response?

Another question: how did the FAA decide the hijacking was real and not part of the exercise, since at minimum, they knew there was a hijacking exercise going on?


Blogger Daniel F said...

I believe it was the persons who controlled the FAA and NORAD and DOD and FBI computers along with the computers at Treasury and the Congress. It is called enterprise wide software and allows anyone with it control of computers in different locations with different operating systems the power to make planes appear and to disappear on FAA screens. The 2 candidates are PROMIS and PTECH. The latter was on the "Terrorist" watch list. A CIA agent told Indira Singh that PTECH was a "front office" operation. Indira believes that PTECH's software is being used to steal billions of dollars each week from unaudited federal government contracts. Listen to Indira Singh here: Learn about the billions being stolen weekly here:

3:01 AM  

Post a Comment

<< Home

Powered by Blogger