Regarding the 9/11 phone calls...
David Ray Griffin explains on CBC's 'The Fifth Estate' cell-phone fakery:http://www.youtube.com/watch?v=o8Ac54Eo6ow
If even one of the alleged phone calls can be shown to be fake... then all of the calls must be suspect.
The keys to all of this are found in Carl Cameron's four part series on Israeli spying on the US:http://www.youtube.com/watch?v=JWpWc_suPWo
Those keys are the companies 'Amdocs' and 'Comverse Infosys'.
Long story short... the Israelis are tied in to the entire US phone system. They are capable of tapping into any phone at any time.
They also have access to all phone records.
If I listened to a week's worth of all of your phone calls - I could learn more than enough (and I could take notes) to pretend to be you.
All it takes is me placing a call (making it look like the call came from your phone number using 'Caller ID Spoofing' - See: http://www.fakecaller.com/
)... and using samples of your voice run through voice morphing software to pretend I am you.
I know the pet-names you called your significant other... because I've listened to and studied you talking to your significant other. I know things you are likely to say.
If your aunt answers the phone... well we know it's the aunt because we've heard your mother talk to her and we have samples of her voice, as well as vocal recognition/analysis software. We know her name... we know who she is to you.
Voice-morphing - 1999:http://www.washingtonpost.com/wp-srv/na ... 020199.htm
The supposed hijackers were (most likely) Mossad agents, traveling under the stolen/assumed passports of real Arabs & Muslims. This is something they are known for, with the most prominent recent example being the hit on a Hamas official in Dubai.
There was no need for these men to have actually boarded the planes. They were electronically guided by remote into their targets... most likely using some sort of GPS transmitters in the Twin Towers and the Pentagon. This seems to be the case because of the improbable impact destinations of all three of those planes.
The plane that hit the North Tower hit the computer room of Kroll Associates, who had been responsible for "revamping security at the World Trade Center after the 1993 terrorist bombing,"... Flight 175 hit the South Tower just below the offices of Gibbs and Hill, Raytheon
Just a quick check on Raytheon brings many interesting results. There were prominent Raytheon employees on every 9/11 flight except 93:http://www.democraticunderground.com/di ... =125x57477
... And Raytheon is involved in remote controlled aircraft technology, such as Global Hawk, etc:http://www.bushstole04.com/911/911_guidance.htm
The plane that hit the Pentagon 'just happened' to kill accountants which were busily trying to figure out where the missing 2.3 (since upped to 2.6) trillion dollars had gone which Donald Rumsfeld announced on Sept 10/2001 that the Pentagon was unable to account for.
I also see no need for them to have had 'gassed' the passengers.
The pilots, passengers and crew were helpless to do anything at all to stop what was happening. Once the plane is taken over electronically, all cockpit controls (including communications) become completely useless.
The whole thing (including 'Rabbi' Dov Zackheim and his connections to Raytheon & remote flight systems) is discussed here:http://www.iamthewitness.com/listeners/ ... e.sure.htm
SYSTEMS PLANNING CORPORATION
Dr. Dov Zakheim was the former CEO of Systems Planning Corporation, a company that designs and manufactures extremely sophisticated control/guidance technology that enables an external operator to fly, and land, aircraft by remote control. One of the company's principal products is the Command Transmitter System (CTS), a fully redundant, self-contained, solid-state platform capable of providing totally programmable remote flight control capability, including high-precision electronic navigation.
The company's parallel product, the Flight Termination System (FTS), enables system-equipped aircraft to be safely landed on any suitable runway in the world-regardless of the availability of ground-based navigational or landing aids (VOR, ILS, MLS, etc.).
Such total independence in all flight regimes is achieved through a variety of ultra-sophisticated space-based technologies, including Mil-spec DGPS (Differential GPS, using extremely precise encrypted military "P" Code transmissions), and is accurate to within one foot of the runway centerline during landing.
The CTS/FTS remote-control system is capable of controlling up to 8 airborne vehicles-including airliners-simultaneously from ground-based or airborne (AWACS) positions.
"Coincidence": Operation Vigilant Guardian, one of five NORAD "war game exercises" underway on the morning of 9/11 and orchestrated byDick Cheney, involved the simulated hijacking of commercial airliners. At one point during the exercises, while the four "real" hijacked aircraft were airborne, as many as TWENTY-TWO independent radar blips representing "hijacked" aircraft were simultaneously displayed on FAA radar screens along the Eastern seaboard. This, obviously, created total pandemonium. Air traffic controllers who had been advised beforehand by NORAD of the "simulated hijackings", began frantically calling NORAD to determine which of the twenty-two targets were "real" and which were "exercise." All indications are that whatever it was that happened to the four real "hijacked" airliners occurred during this purposefully orchestrated melee while the order was given for the US Air Force to "stand down".
The CTS/FTS system (subsequently improved, tested and implemented by Raytheon) allows specialist ground controllers to listen-in on cockpit conversations on the target aircraft, then take absolute control of its computerized flight control system by remote means and safely land the aircraft at any airport within range.
In other words, this technology was designed to empower "law enforcement agencies" to hijack hijackers.
[NB: The ground station technology for CTS/FTS was developed by Raytheon under an Air Force contract for the Joint Precision Approach and Landings System (JPALS) program. A government-industry team accomplished the first precision approach/auto-land by a civil aircraft using this system on August 25, 2001 at Holloman AFB, NM. A FedEx Express 727-200 aircraft demonstrated hundred percent system proficiency by executing six full auto-lands using the JPALS ground station.]
In partnership with Raytheon, System Planning Corporation also supplies CTS/FTS technology to commercial airplane manufacturers for installation in airliners (Boeing: confirmed; Airbus: undetermined, but highly probable given the consortium's connection to BAE, a US military contractor.)
It has been reported that DARPA's codename for the CTS/FTS system was "Home Run". Former German Secretary of Defense Andreas Von Buelow may have alluded to foreknowledge of Home Run technology in an interview he gave the German daily "Tagesspiegel" on January 13th, 2002:
"There is also the theory of one British flight engineer: according to this, the steering of the planes was perhaps taken out of the pilots' hands, from outside. The Americans had developed a method in the 1970s, whereby they could rescue hijacked planes by intervening into the computer piloting [automatic pilot system]. This theory says this technique was abused in this case [9/11]..."
Upon deeper scrutiny this may not appear quite so much a "theory" as might first seem. It's been reported that the German national carrier Lufthansa, seriously concerned that one of its own aircraft might be "rescued" by the Americans without its authority, had every one of its Home Run-equipped Boeing aircraft stripped of the American flight control computers. It's reasonable to presume that Herr Von Buelow—the Secretary of Defense and Minister of Science and Technology at the time—would have known all about this mammoth but secretive task (how very clever-and discreet of Von Buelow to "drop" the information into the middle of an interview about the 9/11 attacks). Lufthansa aircraft (and possibly others) are now effectively impervious to Home Run take-overs, but that is more than can be said for the American aircraft fleet.
In order to make Home Run truly effective, it had to be completely integrated with all onboard systems, and this could only be accomplished with a new aircraft design, several of which were on the drawing boards at that time. Under cover of extreme secrecy, the multinationals and DARPA went ahead on this basis and built "back doors" into the new computerized flight control systems.
There were two very obvious hard requirements at this stage:
a primary control channel for use in taking over the flight control system and flying the aircraft back to an airfield of choice, and
a covert audio channel for monitoring flight deck conversations.
Once the primary channel was activated, all aircraft functions came under direct ground (or AWACS) control, permanently removing the hijackers and pilots from the control loop.
It needs mention that this was not a system designed to "undermine" the authority of the flight crews, but rather, implemented as a "doomsday" device in the event the hijackers began to shoot passengers or crew members, possibly including the pilots. Based on the reasonable assumption that hijackers only carry a limited number of rounds of ammunition, and many modern airliners carry in excess of 300 passengers, Home Run was envisaged as a system that could be used to fly all the survivors to a friendly airport for a safe landing.
Activating the primary Home Run channel is reportedly fairly straightforward. A transponder, as many readers know, is a combined radio transmitter and receiver which operates automatically-in the case of 9/11, relaying data between the four aircraft and air traffic controllers on the ground. The transmitted signals represent a unique "identity" for each aircraft, essential in crowded airspace to avoid midair collisions—and equally essential for Home Run controllers trying to lock onto the correct aircraft.
Once the correct target aircraft is located by radar, the Home Run duplex data bus "piggy backs" the transponder channel and assumes direct control from the ground. This could explain why NONE of the four aircraft sent the special "I have been hijacked" transponder code (7500), despite multiple activation points for this distress transmission on all four aircraft—and despite being flown by combat-hardened ex-fighter pilots. Because the transponder frequency had already been piggy-backed by Home Run, transmission of the special hijack code was rendered impossible. This was the first hard proof that the target aircraft had been hijacked electronically from the ground, rather than by Arab patsies toting box-cutters.
The Home Run listening device on the flight deck utilizes the cockpit microphones that normally feed the Cockpit Voice Recorder (CVR), one of two black boxes armored to withstand heavy impact and thereby later provide investigators significant clues to why the aircraft crashed. However, once plugged into Home Run, the CVRs are bypassed, and voice transmissions are no longer recorded on the 30minute continuous-loop recording tape.
If Home Run is active for more than thirty minutes, there will therefore be no audible data on the Cockpit Voice Recorders. Crash investigators are said to have recovered the CVRs from the Pentagon and Pittsburg aircraft, and publicly confirmed that both are completely blank. The only possible reason for this is data capture by Home Run, providing the final hard proof that the attack aircraft were hijacked electronically from the ground, rather than by "Arab terrorists".