posted on Jun, 21 2010 @ 04:39 AM
supporting evidence = common sense.
The military was not exactly hiding the fact that there was an exercise.
the exercise coincided with the cryptic information that was encoded into the website.
the counter (if given that it was phase 1 and phase 2, making the counter end in 2009) would coincide with the strikes on american soil as planned by
the exercise.
the events that were released (as well as the video and image of the control) were only privy to someone who was part of the exercise operations.
the codes were changing in response to active blog/forums. the photoshop jobs of the images were poorly done, and the images were from google images.
not the surveilance images that you would find from some secret squirrel snoop and poop society.
the most common opsec failures come from lower enlisted individuals looking for fame or money. why have the website expire months before the warned
event?
the image/video released displayed airforce personell as well as some civilians. most of the computers in the room had red stickers with red banners
across the top of the screen, notating the machines as high side, or secret. (if it was top secret they would be orange, green is unclass, and blue is
confidential...). this photo would not be released by any public affairs office, because of the sticker itself. no matter what was on the screen.
put it all together and the most likely and common sense answer is....
like i said, a lower enlisted person with a bit of computer knowledge (probably an IT tech or something similar) who was able to put together a few
images and information to release for a cheap thrill.
it happens more often than you would think.