It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Nevertheless, the Pentagon is working hard to develop better games. One new approach is to use real people in the war simulations, as a way to more accurately model human behavior in a real war. By electronically linking troops out on a field exercise with a computer war game back at a headquarters, real ships at sea can pick up computer-generated aircraft on radar, and pilots flying real planes can collaborate with colleagues in simulators. This technique lets real troops interact with weapons that do not yet exist, or fight out the key battle in an otherwise virtual war, thus injecting human variability into the computer models.
Civilian Pilots Provide Target Practice
As his watch ticks toward midnight, Paul Gardella checks the oil on the small Cessna 182 parked on a cold, dark airstrip in Fairfax County. He knows what he soon could be facing: Coast Guard helicopters chasing him. F-16s intercepting him. Ground-to-air missiles tracking his every turn.
That's because Gardella -- a software engineer and former military officer -- is taking on a new role.
Enemy of the U.S. government.
"In the Navy, I was on the other side. I was on the side of the ones that were shooting," he muses.
Gardella, 50, is among a group of pilots who pose as nighttime intruders, penetrating restricted airspace over Washington in drills that take place every few weeks. While area residents slumber, the volunteers allow the U.S. military to practice intercepting them -- or worse.
It is well known that al-Qaeda is extremely watchful and patient in target probing and attack selection. Osama bin Laden himself has stressed the prerequisites of reconnaissance, surveillance and rehearsal for an attack by its professional cadre. Al-Qaeda is careful to observe signs of target hardening, which might thwart an attack. In playing the al-Qaeda war game, the offensive Red Team should seek to identify and play the best theoretical move allowed by the defensive Blue Team of Homeland Security. Pre-emptive counter-terrorist action restricts the choice of moves. The available moves may involve taking targets of opportunity, rather than targets of maximum impact.
6:30am At Boston's Logan Airport, an argument breaks out over a parking space involving five middle easterners and an unidentified man. When he reports the incident later, police discover a car rented by lead hijacker Mohammed Atta. It contains a pass allowing access to a restricted area of the airport from which two of the hijacked aircraft took off from.
originally posted by Sr911
Are civilians used in war games...
Nevertheless, the Pentagon is working hard to develop better games. One new approach is to use real people in the war simulations, as a way to more accurately model human behavior in a real war. By electronically linking troops out on a field exercise with a computer war game back at a headquarters, real ships at sea can pick up computer-generated aircraft on radar, and pilots flying real planes can collaborate with colleagues in simulators. This technique lets real troops interact with weapons that do not yet exist, or fight out the key battle in an otherwise virtual war, thus injecting human variability into the computer models.
originally posted by eyewitness86
in all four cases, that all eight pilots were overwhelmed before even ONE could pres the button and key the mike.
Most pilots would try and throw highjackers around as an instinct, but this happens NOT ONCE among the four jets.
Originally posted by eyewitness86
There is not a shred of evidence at all that suggest that anything was sprayed anywhere. It is all conjecture, just like the boxcutters. I have heard people claim that the highjackers possessed gas masks and mace and guns and bombs and God knows what else..but no evidence of this has ever been shown or even alleged in a rational way.
Why would highjackers, presumably WITHOUT gas masks ( remember that quite a few of them were singled out for close inspection before boarding, and likley had NOTHING whatsoever on them ) spray some substance around that they too would have to breathe? you would not overcome the pilots with gas unlesss you had gas masks, the real kind,,and there is no evidence that they did. So assuming that the highjackers did NOT have full gas masks, we can safely assume that no gas was used, as it would affect everyone in close quarters, which is everywhere on a plane, and especially in a fight or confrontation at the cockpit.
So, we are left with Betty NOT saying that some guys overcame the cockpit..she says that the cockpit will not answer. The highjackers must have been super swift...so fast and so efficient, in all four cases, that all eight pilots were overwhelmed before even ONE could pres the button and key the mike. Imagine that! Thats some fancy cockpit breach and kill operation and body hauling job, I'll tell you!! Pilots sit forward in seats that slide forward with their body mass down low and forward..it would have been very hard for two highjackers to lift a man, alive and kicking or dead and dripping with blood, out of his position in the cockpit without the plane being knocked of course or some violent motion.
Most pilots would try and throw highjackers around as an instinct, but this happens NOT ONCE among the four jets. Perfect entries, perfect killings and haulings..superhuman strength and speed and luck...OR a remote highjacking. Take your pick. Betty was OBVIOUSLY reading from a script and being coached by someone in the background,,just like the guy who was quoted as asking " This is your son " and giving his last name..that guy,,well, he also was hesitating and turning away from the phone and listening to someone, and when he would come back, he would say " You believe me, don't you Mom "? He asked that several times. WHY in the hell would a highjacked passenger not only give his last name to the woman who birthed him, but also repeatedly asks if she believes him..as if he is telling some incredible tale that is unworthy of belief.
Hoglan: I was staying with my brother Vaughan on the morning of September 11th, and, uh, the phone rang.
Bingham (reconstruction): Mom... Mom, this is Mark Bingham.
Hoglan: Once in a while he would say that. He would call up, and he was, he was a young businessman, and used to, used to introduce himself on phone as Mark Bingham, and he was trying to be, uh, strong, and level-headed, and, and strictly business. "Mom, this is Mark Bingham".
When Seeing and Hearing Isn't Believing
By William M. Arkin
Special to washingtonpost.com
Monday, Feb. 1, 1999
"Gentlemen! We have called you together to inform you that we are going to overthrow the United States government." So begins a statement being delivered by Gen. Carl W. Steiner, former Commander-in-chief, U.S. Special Operations Command.
At least the voice sounds amazingly like him.
But it is not Steiner. It is the result of voice "morphing" technology developed at the Los Alamos National Laboratory in New Mexico.
By taking just a 10-minute digital recording of Steiner's voice, scientist George Papcun is able, in near real time, to clone speech patterns and develop an accurate facsimile. Steiner was so impressed, he asked for a copy of the tape.
Steiner was hardly the first or last victim to be spoofed by Papcun's team members. To refine their method, they took various high quality recordings of generals and experimented with creating fake statements. One of the most memorable is Colin Powell stating "I am being treated well by my captors."
"They chose to have him say something he would never otherwise have said," chuckled one of Papcun's colleagues.
A Box of Chocolates is Like War
--------------------------------------------------------------------------------
Most Americans were introduced to the tricks of the digital age in the movie Forrest Gump, when the character played by Tom Hanks appeared to shake hands with President Kennedy.
For Hollywood, it is special effects. For covert operators in the U.S. military and intelligence agencies, it is a weapon of the future.
"Once you can take any kind of information and reduce it into ones and zeros, you can do some pretty interesting things," says Daniel T. Kuehl, chairman of the Information Operations department of the National Defense University in Washington, the military's school for information warfare.
--------------------------------------------------------------------------------
PSYOPS seeks to exploit human vulnerabilities in enemy governments, militaries and populations.
--------------------------------------------------------------------------------
Digital morphing — voice, video, and photo — has come of age, available for use in psychological operations. PSYOPS, as the military calls it, seek to exploit human vulnerabilities in enemy governments, militaries and populations to pursue national and battlefield objectives.
To some, PSYOPS is a backwater military discipline of leaflet dropping and radio propaganda. To a growing group of information war technologists, it is the nexus of fantasy and reality. Being able to manufacture convincing audio or video, they say, might be the difference in a successful military operation or coup.
Allah on the Holodeck
--------------------------------------------------------------------------------
Pentagon planners started to discuss digital morphing after Iraq's invasion of Kuwait in 1990. Covert operators kicked around the idea of creating a computer-faked videotape of Saddam Hussein crying or showing other such manly weaknesses, or in some sexually compromising situation. The nascent plan was for the tapes to be flooded into Iraq and the Arab world.
The tape war never proceeded, killed, participants say, by bureaucratic fights over jurisdiction, skepticism over the technology, and concerns raised by Arab coalition partners.
--------------------------------------------------------------------------------
What if the U.S. projected a holographic image of Allah floating over Baghdad?
--------------------------------------------------------------------------------
But the "strategic" PSYOPS scheming didn't die. What if the U.S. projected a holographic image of Allah floating over Baghdad urging the Iraqi people and Army to rise up against Saddam, a senior Air Force officer asked in 1990?
According to a military physicist given the task of looking into the hologram idea, the feasibility had been established of projecting large, three-dimensional objects that appeared to float in the air.
But doing so over the skies of Iraq? To project such a hologram over Baghdad on the order of several hundred feet, they calculated, would take a mirror more than a mile square in space, as well as huge projectors and power sources.
And besides, investigators came back, what does Allah look like?
The Gulf War hologram story might be dismissed were it not the case that washingtonpost.com has learned that a super secret program was established in 1994 to pursue the very technology for PSYOPS application. The "Holographic Projector" is described in a classified Air Force document as a system to "project information power from space ... for special operations deception missions."
War is Like a Box of Chocolates
--------------------------------------------------------------------------------
Voice-morphing? Fake video? Holographic projection? They sound more like Mission Impossible and Star Trek gimmicks than weapons. Yet for each, there are corresponding and growing research efforts as the technologies improve and offensive information warfare expands.
Whereas early voice morphing required cutting and pasting speech to put letters or words together to make a composite, Papcun's software developed at Los Alamos can far more accurately replicate the way one actually speaks. Eliminated are the robotic intonations.
The irony is that after Papcun finished his speech cloning research, there were no takers in the military. Luckily for him, Hollywood is interested: The promise of creating a virtual Clark Gable is mightier than the sword.
Video and photo manipulation has already raised profound questions of authenticity for the journalistic world. With audio joining the mix, it is not only journalists but also privacy advocates and the conspiracy-minded who will no doubt ponder the worrisome mischief that lurks in the not too distant future.
"We already know that seeing isn't necessarily believing," says Dan Kuehl, "now I guess hearing isn't either."
originally posted by manticore
2. This would need confirmation from Betty Ong's family to confirm if that is actually her voice.
Source.
With the help of Sen. Ed Kennedy from Massachusetts where Betty had lived, the Ong family was finally able to listen to the tape in January 2002 in a conference room at the San Francisco airport.
"I didn't know what to expect. When I heard her words, it was very comforting. We're very proud of her. She was sweet, she would give her heart to you ... but she also had an attitude of don't-mess-with-me. She showed this courage when called upon," said Cathie.
This was a senior crew," she said. "They've been around. A lot of them usually do that flight – go out on Flight 11 and come back on Flight 12 [from Los Angeles]. We all knew them really well."
In fact, a couple of the stewardesses were married to American gate agents at Logan, she says.
"You know, I said goodbye to that crew at the gate," the American employee said. "I was up there talking to the girls who were doing the flight, and the crew walks by and gives us all a wave. They said, 'See you later, we're coming back on [Flight] 12.'
Also, the fact that on flight 93 the terrorist hijackers took the time to all put red bandannas on seemed odd until you factor that they possibly put them on to represent the "red team" or the offense, while the "blue team" would be the defense or "good guys"
Source. Found at wtc7lies.googlepages.com
I originally developed the technology of voice morphing, the technology by which it is possible to make someone seem to say something they did not say (see www.washingtonpost.com/wp-srv/national/dotmil/arkin020199.htm ) and coined the phrase. Therefore, I know what would have been required to create such bogus calls. Practical considerations preclude making counterfeit telephone calls in this situation. For example, it is necessary to have samples of the voices of the people to be imitated. In situations like this, where the goal is to participate in an unconstrained conversation, the voice sample must be extensive. I cannot imagine how I might have obtained extensive samples of the voices of the passengers on Flight 93, especially not knowing which of them would call home. Additionally, in this situation it would be necessary to know what someone would say to his or her loved ones under such circumstances. What pet names would be used? What references would be made to children and other loved ones? Do believers actually suppose that the government (or I) listens in to everyone’s pillow talk? In a separate essay, I will cover the technical aspects of voice morphing, which will further demonstrate the implausibility of the scenario set forth by the purveyors of conspiracy theories.