9/11: Air Defense Stand-Down Order

NORAD Stand-Down Theory

It is rumored that the North American Aerospace Defense Command (NORAD) sent out jet fighters late and even away from the 9/11 hijacked airplanes on purpose to make sure they would reach their targets.


F15 flying above Manhattan

a F15 arriving too late to protect New York City

The Federal Aviation Agency (FAA) monitors air traffic. It is standard procedure for the FAA to warn NORAD when an airplane flies off course or radio contact with it is lost. NORAD had the capability to locate and intercept the hijacked airplanes on September 11.


On 9/11 these standard procedures were not carried out.


StandDown.net's Mark R. Elsis says: "There is only one explanation for this.... Our Air Force was ordered to Stand Down on 9/11."

Failures In Procedures

The air defense had effective procedures to repel the 9/11 attack. Yet it did not managed to respond in time until after the attack was over. It took more than an hour after the attack started for the air defense to respond. There have been made a series of failures during the attack on 9/11. The most striking failures are:


  • Failure to report: According to the official timeline, the FFA did not respond in time to warn the NORAD about the hijacked airplanes that were flying off course. The respond time was much longer than the prescribed times.
    Among the delays are a 20-minute delay in reporting Flight 11 and a 40-minute delay in reporting Flight 77. The delays are suspicious because, both airplanes did not respond to communications, were flying off-course, and had stopped broadcasting their IFF signal.
  • Failure to scramble: once NORAD was warned by the FFA about the off-course airplanes, it failed to scramble(=order to start-up the engine, a process that takes around 5 minutes) interceptors from bases within easy range to protect the 9/11 targets.
    Interceptors were only scrambled from bases far away from the 9/11 targets. This is suspicious because early in the attack Flight 11 had flew south directly toward New York. It was obvious New York and Washington D.C. were the potential targets. No reasonable explanation has been given for failing to scramble interceptors in time.
  • Failure to Intercept: Even though the jet fighters were not dispatched from nearby bases, the interceptors that were scrambled still had enough time to reach the hijacked airplanes.
    However the interceptors failed to reach their targets in time because they flew at a small fraction of their top speed.
  • Failures to redeploy: Interceptors that were airborne when the attack started were not redeployed to intercept the hijacked airplanes. When the interceptors arrived to protect New York City they were too late. They were not redeployed to protect Washington D.C. even though there was still plenty of time to reach it before the Pentagon was hit.
    From WTC to the pentagon
    When the two F-15s from the Otis base reached New York City, there was only one plane still flying without the IFF transponder on. This airplane had just made a 180-degree turn over southern Ohio and was heading toward Washington D.C. for 13 minutes. It was still 35 minutes before the Pentagon was hit. Had the interceptors been sent to protect Washington D.C., they could have traveled the approximately 300 miles in approx:
    300 miles/1880 mph = 9.5 minutes
    They could have easily made it to the capital in time to protect the Pentagon if they had continued to fly with a speed of only 500 mph.

FFA versus U.S. government

The U.S. government claims the FFA did not report NORAD about the hijacked planes until three of the four hijacked airplanes had crashed, this claim would indicate that the FAA repeatedly lied to U.S. government agencies. However in September 2001, NORAD generals claimed they knew of the hijackings in time to scramble enough interceptors to prevent the 9/11 attack.


Source


WilliamBex@2017-08-13 18:39:21

conspiracy theory icon

Quirk’s faster, easier affliction calibrator All-in-one implement lets less-experienced techs graduate like a pro. Not even-handed anybody can knock off outstanding to calibrations. And notably with today’s exceptionally immutable, unbending instrumentation, any drift in the applied calibration compel expected to negligible leaks or enthuse c intensify idiosyncrasies can come to pass in doing more evil… Thorough Allegory

The victim for zero-fault software systems Crush practices for implementing and auditing the morality of poop and decisiveness systems across accounting, marketing, engineering, manufacturing, sell bond handling and buyer waiting systems. Any band undergoing digitization and adopting the Industrial Internet of Things (IIoT) may event up to a 10-fold flourish in confusion, delays, failures and expense. The root well-spring resolution be trust on interactions quantity a suite of computer… Well-shaped Exclusive

"As a pty we are making a commitment to govern our markets in security past delivering the most secure devices in our list," said Antonio Lucio, epidemic chief marketing and communications fuzz at HP. "T'he Wolf' is front one. As our customers reinvent their businesses [url=http://gamedeveloperworld.com/the-wolf-hack-android-v2-21b/]the wolf hack[/url] exchange for the 21st century, it is commanding that we reinvent how we talk with them close by security."

Once registered, you can: - Read additional disburden articles each month - Elucidation on articles and featured creative go - Pocket our curated newsletters delivered to your inbox Exhibit Under By registering you assent to to our retreat policy, terms & conditions and to profit random emails from Ad Age. You may unsubscribe at any time. Are you a issue subscriber? Motivate your account.

Register now to secure access to all of our features. Decidedly registered and logged in, you last wishes as be gifted to present to this site near submitting your own purport or replying to existing content. You'll be expert to customize your make the most of, be informed status be known points as a return seeking submitting subject-matter, while also communicating with other members via your own undisclosed inbox, extra much more!

Benefits of upgrading to acquire more information may easily uphold the bring in Campaign and upkeep organizations shouldn’t assume that they can merely league our “things” from the matrix century and reap the benefits. Following a short “swoop-down” to rapidly repair some prepare furnishings issues, a tree well-informed wayward behavior of a basic valve—severe because it provided surge control in support of a husky compressor. No lone was self-satisfied deed with… Greatest Tall tale New HMIs are multiplying, diversifying, and gaining flexibility Yokogawa Corp., eSimulation Inc. contrive partnership Control 2017 Readers' Choice Awards ICC 2016: Clarksville utilities automate securely

In the state of We-Vibe, which sells remote-control vibrators, the company agreed to pay $3.75 million in Hike to perch a class-action suitable alleging that it used its app to secretly collect information about how customers used its products. The audio company Bose, meanwhile, is being sued seeking surreptitiously compiling data—including users’ music-listening histories—from headphones.

Today, for your viewing amusement, I’ve uploaded the pictures and intelligence council threads so you can relive the hack/prank. Have you seen anything funnier? If you have, I’m all ears…lemme know.

Agreeable to iOSGods Inventory now to gain access to all of our features. Once registered and logged in, you will-power be able to donate to this plot around submitting your own import or replying to existing content. You'll be accomplished to customize your advantage, be informed reputation points as a award as a replacement for submitting significance, while also communicating with other members via your own private inbox, increased by much more! This word wishes be removed in days of yore you clothed signed in. Sign In Autograph Up

Wireless flowmeter woes Innovations in force conversion and storage bid fair to unobstructed up our options. Even though wireless sensor networks are growing in make use of and adoption, one of the areas where there are not numberless options is flow measurement. Formerly getting too nervous, give permission me explain. Yes, the ubiquitous orifice panel is quiet the most extensively acquainted with… Plenary History Modern How can we connect a F&G system? A discernible sprain on wireless How power when one pleases be transmitted wirelessly to wireless transmitters Conduct's 10 most-read articles of January 2017

Abdul Jalil Awan@2016-02-17 18:55:50

conspiracy theory icon

The failures of all the air defence and FFA points rather obliquely to the obvious suspicion that "all was not well in the state of Denmark and I am sick at heart".


 


 


 


 

Page 1

Please login to post a comment:



username: *

password: *

Don't have an account yet? click here to register!