Readers’ Blog

Electronically Hijacking the WTC Attack Aircraft

Viewed 917 times 2016-10-10 22:39 |Personal category:for discussion|System category:Others| article, problem, before, little, target

Electronically Hijacking the WTC Attack Aircraft



14 December 2006.



On Sept. 10 2001, just 24 hours before the WTC attack, The Washington Times ran an article quoting intelligence sources who described Israel's Mossad as "Wildcard. Ruthless and cunning. Has capability to target US forces and make it look like a Palestinian/Arab act." Moreover, they said, it was generally known in the intelligence community that the Mossad had penetrated every Muslim organization and would have little problem in finding any number of fanatics to carry out a suicide mission in the belief they were serving Allah. Ed.

In the mid-seventies America faced a new and escalating crisis, with US commercial jets being hijacked for geopolitical reasons. Determined to gain the upper hand in this new form of aerial warfare, two American multinationals collaborated with the Defense Advanced Projects Agency (DARPA) on a project designed to facilitate the remote recovery of hijacked American aircraft. Brilliant both in concept and operation, "Home Run" (not its real code name) allowed specialist ground controllers to listen in to cockpit conversations on the target aircraft, then take absolute control of its computerized flight control system by remote means. From that point onwards, regardless of the wishes of the hijackers or flight deck crew, the hijacked aircraft could be recovered and landed automatically at an airport of choice, with no more difficulty than flying a radio-controlled model plane. The engineers had no idea that almost thirty years after its initial design, Home Run's top secret computer codes would be broken, and the system used to facilitate direct ground control of the four aircraft used in the high-profile attacks on New York and Washington on 11th September 2001.

Before moving on to the New York and Washington attacks, we first need to look at the ways in which an aircraft is normally controlled by its pilot, because without this basic knowledge, Home Run would make no sense. In order to control an aircraft in three-dimensional space, the pilot uses the control yoke (joystick) in front of him, rudder pedals under his feet, and a bank of engine throttles located at his side. Without engine thrust the aircraft would not fly at all, so the throttles are largely self explanatory: For more speed or altitude increase throttle, for less speed or altitude decrease throttle.

In order to raise or lower the nose of the aircraft, the pilot pulls or pushes on the control yoke, which in turn raises or lowers the elevators on the horizontal tailplane. To bank the aircraft left or right, the pilot moves the control yoke to the left or right, which in turn operates the ailerons on the outer wings. Lastly, to turn left or right at low speed or "balance" turns at high speed, the pilot presses the left or right rudder pedals as required, which in turn move the rudder on the vertical stabilizer.

Back in the early days of flight, the control yoke and rudder pedals were connected to the various flight control surfaces by thin cables, meaning the pilot had direct physical control over every movement the aircraft made. This was no great problem for an average man flying a small biplane, but as aircraft grew ever bigger, heavier and faster over the years, the loadings on the control yoke and rudder pedals became huge, certainly well beyond the ability of a single pilot to handle unaided.

By the late fifties we were well into the age of hydraulics, where just like the power steering on your automobile, hydraulic rams were placed in line between the pilot's control cables and each individual control surface. Now when the pilot moved the control yoke, the cables activated sensors, which in turn activated one or more hydraulic rams, which in turn moved one or more control surfaces. For the first time since Bleriot and the Wright brothers, pilots were of necessity being steadily distanced from direct control of their own aircraft.

When the multinationals and DARPA finally came on the scene in the mid-seventies, aircraft systems were even more advanced, with computers controlling onboard autopilots, which in turn were capable of controlling all of the onboard hydraulics. In combination these multiple different functions were now known as the "Flight Control System" or FCS, in turn integrated with sophisticated avionics capable of automatically landing the aircraft in zero visibility conditions. In summary, by the mid-seventies most of the large jets were capable of effectively navigating hundreds of miles and then making automatic landings at a selected airport in zero-zero fog conditions. All of this could be accomplished unaided, but in theory at least, still under the watchful eyes of the flight deck crews.

In order to make Home Run truly effective, it had to be completely integrated with all onboard systems, and this could only be accomplished with a new aircraft design, several of which were on the drawing boards at that time. Under cover of extreme secrecy, the multinationals and DARPA went ahead on this basis and built "back doors" into the new computer designs. There were two very obvious hard requirements at this stage, the first a primary control channel for use in taking over the flight control system and flying the aircraft back to an airfield of choice, and secondly a covert audio channel for monitoring flight deck conversations. Once the primary channel was activated, all aircraft functions came under direct ground control, permanently removing the hijackers and pilots from the control loop.

Remember here, this was not a system designed to "undermine" the authority of the flight crews, but was put in place as a "doomsday" device in the event the hijackers started to shoot passengers or crew members, possibly including the pilots. Using the perfectly reasonable assumption that hijackers only carry a limited number of bullets, and many aircraft nowadays carry in excess of 300 passengers, Home Run could be used to fly all of the survivors to a friendly airport for a safe auto landing. So the system started out in life for the very best of reasons, but finally fell prey to security leaks, and eventually to compromised computer codes. In light of recent high-profile CIA and FBI spying trials, these leaks and compromised codes should come as no great surprise to anyone.

Activating the primary Home Run channel proved to be easy. Most readers will have heard of a "transponder", prominent in most news reports immediately following the attacks on New York and Washington. Technically a transponder is a combined radio transmitter and receiver which operates automatically, in this case relaying data between the four aircraft and air traffic control on the ground. The signals sent provide a unique "identity" for each aircraft, essential in crowded airspace to avoid mid-air collisions, and equally essential for Home Run controllers trying to lock onto the correct aircraft. Once it has located the correct aircraft, Home Run "piggy backs" a data transmission onto the transponder channel and takes direct control from the ground.

This explains why none of the aircraft sent a special "I have been hijacked" transponder code, despite multiple activation points on all four aircraft. Because the transponder frequency had already been piggy backed by Home Run, transmission of the special hijack code was rendered impossible. This was the first hard proof that the target aircraft had been hijacked electronically from the ground, rather than by [FBI-inspired] motley crews of Arabs toting penknives.

The Home Run listening device on the flight deck utilizes the cockpit microphones that normally feed the Cockpit Voice Recorder (CVR), one of two black boxes armored to withstand heavy impact and thereby later give investigators significant clues to why the aircraft crashed.

However, once hooked into Home Run, the CVRs are bypassed and voice transmissions are no longer recorded on the 30-minute endless loop recording tape. If Home Run is active for more than thirty minutes, there will therefore be no audible data on the Cockpit Voice Recorders. To date, crash investigators have recovered the CVRs from the Pentagon and Pittsburg aircraft, and publicly confirmed that both are completely blank. The only possible reason for this, is data capture by Home Run, providing the final hard proof that the attack aircraft were hijacked electronically from the ground, rather than by "Arab terrorists".

Many readers might by now be indignant; convinced this is incorrect or misleading information because of "those telephone calls from the hijacked aircraft". Which telephone calls exactly? There are no records of any such calls, and the emotional claptrap the media fed you in the aftermath of the attack was in all cases third-person. We had the media's invisible "contact" at an airline who "said" a hostess called to report a hijacking, and we had a priest (?) who "said" he received a call from a man asking him in turn to call his wife and tell her he loved her. Presumably this man would have had his wife's name filed in his cellphone, and faced with imminent death would have called her direct. The FAA helped out by claiming that it had "overheard" a heated argument from a cockpit where the radio transmit switch had been left in the "on" position. When push came to shove, the FAA was forced to retract, and admit that the mythical argument was not on the tapes at all.


CONTINUED  >>>>>>>>>


http://www.thetruthseeker.co.uk/?p=306



(Opinions of the writer in this blog don't represent those of China Daily.)


Passing

Eggs

Flowers

Shake hands

Ray
Like 0 Share
8.03K

Report

Comment (0 comments)

facelist doodle Doodle board

You need to login to comment Login | register


dragon8

Year of the Dragon starts on 23 January 2012. People born under the Dragon are passionate, brave and self-assured. At their best they are pioneering spirits; at their worst, they epitomize the old adage: Fools rush in where angels fear to tread. Dragons are generous with their resources, a tendency that at its most negative can reflect a foolhardy attitude towards money. But Dragons in general are blessed with good fortune. They are smart, enterprising and have a wicked sense of humor. They have a natural flair for fashion and are the people to consult if you want to catch up on the latest trends. This Chinese New Year 2012 ushers in the Water Dragon. Water exerts a calming influence on the Dragon’s innate fire. Water Dragons are more open to other people’s opinions than other Dragons which gives them the ability to channel their personal charisma into real leadership qualities. The Dragon and Love Dragons are passionate. They fall in love quickly – and out of love just as quickly. Their charisma and charm is an immense draw to people of the opposite sex whose attention and admiration they crave. Though they have a tendency to treat love like a game, they can settle down when they meet the right partner, someone who’s strong enough not to be bowled over by the Dragon’s flamboyant, independent and stubborn personality. The Dragon’s ideal partners are the Rat, the Monkey, and the Rooster: The Rat is practical, observant and resourceful, able to help the Dragon when extravagant promises have backed the Dragon into a corner. The Monkey is just as popular as the Dragon, curious, intellectual and fun-loving, one of the few personalities the Dragon doesn’t mind sharing the spotlight with. The Rooster can give the Dragon a run for the money on the fashion-forward front; attractive, well-groomed, fiercely loyal and committed to honesty, the Rooster serves as the Dragon’s reality check, keeping the Dragon from making promises that he or she can’t keep. The Dragon and Wealth Dragon years are lucky for anyone thinking of starting a business or initiating a new project of any sort because money is easier to come by for everyone, whether it’s earned, borrowed or received as a gift. Consequently we can expect the economic downturn to ease up a bit in the coming year. Fortunes can be made but they can also be lost: Keep in mind like all good things, the Year of the Dragon will come to an end and you will be held accountable for unreasonable extravagances. Dragons do well in professions that give them the ability to function somewhat autonomously. They make excellent sales people, publicists, political campaigners, lawyers, real estate brokers, actors and politicians. Yes, that's me.

Album

Recent comments

Star blogger

Anming

4124

views

Maierwei

2603

views

财神

4580

views

Most Viewed

Most commented

BACK TO THE TOP
Contact us:Tel: (86)010-84883548, Email: blog@chinadaily.com.cn
Blog announcement:| We reserve the right, and you authorize us, to use content, including words, photos and videos, which you provide to our blog
platform, for non-profit purposes on China Daily media, comprising newspaper, website, iPad and other social media accounts.