The Kentroversy Papers $10,000 9/11 Challenge!
NOTICE: Anyone who is able to collect on the KENTROVERSY PAPERS $10,000 9/11 CHALLENGE will not receive a $10,000 bill, as pictured above. It is shown merely to indicate the amount of the challenge award.
THE KENTROVERSY PAPERS $10,000 9/11 CHALLENGE!
Here is ONE THING that bothers me about 9/11 ...
On December 11, 2005 I wrote an article entitled National Security Code Access and 9/11 This short document printed the ONE QUESTION that I have been asking people about 9/11, which is as follows:
There is one aspect of 9/11 that alone proves that it was an INSIDE JOB.
Those carrying out these attacks would have had to contend with NATIONAL SECURITY CODES that are changed daily, and some are changed hourly. Arabs in a cave in Afghanistan would have had to deal with these codes to access the NATIONAL SECURITY, NSA, and NORTHCOM computer networks. The ONLY WAY that they could have had access to this HIGHLY SENSITIVE DATA is by a mole inside providing this information.
Such a person would have to have been on the level of the JOINT CHIEFS and the NSA to have access to the CORRECT DATA.
Additionally, they would have had to have had full access to the Air-Traffic Control network and the grid that overlays the entire USA. These perpetraitors would also had to have had access to the communications from the towers in numerous cities and the computer networks of the airlines.
These Neo-Nazi-Cons were bold enough to suggest that a small handful of insurgent terrorists were controlling these attacks from a cave half a world away, using a laptop computer.
Are you $&*$!@# kidding me?!
By the way, for a close-up view of how NATIONAL SECURITY CODES are used and implemented, please see the 1985 film THE FALCON AND THE SNOWMAN, starring Timothy Hutton and Sean Penn.
NOTE: If any reader can explain how outsiders could have defeated such inside networks and codes WITHOUT internal complicity, I am all ears ...
SO, HERE'S THE CHALLENGE ...
All a person has to do is provide evidence or documentation that PROVES that the so-called 'Arab Terrorists' were able to bypass NATIONAL SECURITY CLEARANCES AND PASSWORDS without the knowledge or assistance of anyone inside the federal government of the United States of AmeriKa.
Remember the following when attempting to answer the challenge:
- National Security Clearances and access to passwords which change daily is one thing the 'terrorists' would have to contend with. HOW could they gain access to these systems WITHOUT inside help?
- The federal government of the United States uses a level of computer network encryption that is NOT available to the public. HOW could these 'terrorists' gain access to these NATIONAL SECURITY NETWORKS without the requisite encryption UNLOCK key?
- Pulling off 9/11 would have required access to MULTIPLE COMPUTER NETWORKS; among them are the computer systems of the following: NSA, CIA, FBI, NORTHCOM, and the computer networks of American and United Airlines, as well as access to the National Federal Aviation Administration's Air-Traffic Control network. Finally, they would have also needed to gain access to voice recognition and editing software, which would have been required to mimic the voices of the various passengers in the faked cell phone calls which were allegedly placed from the planes. Lastly, the 'terrorists' would have had to gain access also to the cell phone companies that were infiltrated to place the faked calls, making them appear to have originated from the doomed planes.
Could these 'terrorists' who were supposedly sitting in a cave in Afghanistan, with nothing more than a notebook computer, hacked into ALL of these systems WITHOUT inside help?
SO, HERE IS HOW TO WIN $10,000 FROM THE KENTROVERSY PAPERS:
All anyone needs to do is supply me with evidence and irrefutable proof that every system named above could be hacked WITHOUT inside help. The funds in the amount of $10,000 are on deposit and just waiting for YOUR PROOF.
Your entries may be sent to me via my e-mail address, which can be found on the front page of this site, in the section entitled CONTACTING KENTROVERSY.
If there are any entries that appear to have the ANSWER without inside help, it will be examined to determine if the money can be rightfully claimed based on your submitted proof.
That's ALL there is to it!
© 2006 Kentroversy Papers
All rights reserved. Used with permission.
Sources:
The following sources were used in the creation of this Kentroversy Paper . . .
National Security Code Access and 9/11 (December 11, 2005)
Scholars For 9/11 Truth
9/11
9 Comments:
This comment has been removed by a blog administrator.
Ok, editing comments doesn't work. Let's try again.
Those carrying out these attacks would have had to contend with NATIONAL SECURITY CODES that are changed daily, and some are changed hourly
I'm trying to understand what you are talking about. What do these National Security Codes do? How would these codes have prevented those airliners from hitting buildings?
There are 10's of thousands of commercial airliners in the skys of the USA during any given day. Are you suggesting that all of them (and their pilots) have super secret access to a bunch of special codes in order to fly?
Do pilots have to change their "squawk" every hour or be shot down? I can tell you that airliners only squawk IFF mode 3 and Charlie. Mode 3 is used by almost every commericial aircraft on earth and is set at the request of the ATC which allows them to be tracked and controlled by whatever tower has them. Mode Charlie indicates altitude.
Mode 3 can be set to certain codes to indicate emergencies. 7500, for instance is a hijacking. Nothing encrypted there.
So, please explain what these secret codes the hijacker pilots needed to know but didn't, that every pilot over the USA would know. Please explain how such secret codes are disseminated, maintaining two person integrity that is required for SECRET and above codes.
If you can explain what all that is about, maybe I can demonstrate how the terrorists didn't need it.
Greetings:
To begin, I said NOTHING about pilots in my $10,000 9/11 CHALLENGE.
I don't know where you thought I mentioned PILOTS.
The information provided by our own government claims that a group of terrorists in a cave in Afghanistan pulled this off with nothing more than a simple laptop/notebook computer.
Those in that cave needed to do all of the following:
1) They needed to shut off the camera system at Boston's Logan airport. This is because no photos of them actually passing through the gate has been offered as evidence. The single photo that they HAVE presented was taken in Maine earlier that morning.
2) They would have had to access NORTHCOM to issue STAND-DOWN orders across the entire northeast quadrant of the country.
3) They needed to access the computer systems of AMERICAN AIRLINES and UNITED AIRLINES to fake the cell phone calls. It has been PROVEN through PROJECT ACHILLES that cell phone calls at the altitudes they were flying at are IMPOSSIBLE. Here, they also needed voice synthesizing software to replicate the voices of those who allegedly called their loved ones from the doomed planes, calls that are IMPOSSIBLE.
In order to gain access to this system of voice synthesizor software, they would also have to access either the ESCHELON or CARNIVORE systems, both of which would require access to passwords that they could only get from an INSIDER.
4) They needed access to NATIONAL SECURITY CODES, which protect our entire nation's infrastructure. These codes are changed daily.
HOW could they have infiltrated such systems, especially seeing as the federal government has a level of encryption that is NOT available to the public?
If you or anyone else can address ALL of these systems issues, I will be quite happy to write you a check for $10,000.
Kentroversy
Buffalo, NY USA
might me a lame answer.. but:
If the programmers were corrupt, they could very well have oppend a backdoor from start in both the NSA codes, the airline codes, and the Northcom codes.
Greetings:
The programmers would not have had access to the secure computer systems once their project was complete. Once they set up the system with what I might call 'the first password' -- the operators of the systems have been known to change these codes on a daily basis.
Besides, I know a couple of computer programmers from the military who had been working on 9/11 itself, and they have told me that there is NO WAY that any outside computers could hack into the system without being detected.
This is the central thesis from which I am working here.
If we begin with the WHAT-IF's -- and try to piece together a situation in which this MIGHT BE DONE -- we are once again pointed in the direction of inside complicity on the part of the Bush Jr. regime.
Also, the same codes would NOT work with the NSA, NORTHCOM, and the airlines' computer systems -- as they are a minimum of FOUR separate computer systems, e.g. NSA, NORTHCOM, AA, and UNITED.
Warmest Regards,
Kentroversy
Buffalo, NY USA
Hi Kentroversy,
Now I am rather inclined to side with you on 911 being an inside job, but I do feel that you misunderstand what a backdoor to a computer program/system is. This is a hard coded entry point to access any of a programs functions and features, which bypasses the normal login & security measures. This has nothing to do with any initial setup or installation passwords for a program.
An example of this is theso-called secret NSA doorway that exists in the Microsofts Windows98 operating system. If I recall correctly, I believe that it was the hacker group "cult of the dead cow" which had discovered this. Anyway, anyone that knows the correct access port and password could easily access any computer running that OS.
However, despite the possibility of there being a backdoor in any one of these computer systems, we must remember that these systems are run on very highly secured networks. As such, they know who you are the moment that you access that network, way before one could reach the correct system/program. Remember that those networking systems that had evolved to become the world wide net were developed by the DoD.
So back to your original premise, accessing these systems would be impossible without inside help. In fact, with these separate systems it would be safe to say that this would require multiple inside contacts at high levels. I think that your $10,000 is rather safe...well, that is if one doesn't condider the banking system.
Regards,
jvastine
Greetings, Jeff:
Thanks for your comments.
However, I am an expert computer user and a former software tester for Microsoft. I worked on the Win95, WinNT, and Win98 operating systems prior to their release to the public.
As far as backdoors, password encryption, etc. I have full knowledge of these systems as well.
If you read over my comments again, you will see that what I am saying is that these systems could ONLY be hacked into WITH INSIDE HELP. PERIOD.
Also, the federal government uses a level of encryption that is unavailable to the public.
These systems CANNOT be accessed by the "laptop in the cave" b.s. story we have been given. Please do not forget that THIS is the premise here. This was picked by the members of the federal government, in the proffering of the OFFICIAL-FICTION of 9/11.
I hope that this clarifies things a bit more ...
Warmest Regards,
Kentroversy
Buffalo, NY USA
http://www.theinquirer.net/gb/inquirer/news/2007/12/20/nsa-0wnz-popular-firewalls
If the government uses the same type of firewalls that the average person does then the passwords would only be changed every few days or weeks as an update is necessary.
So then if you could crack the NSA backdoors once, you would have a good bit of time to attack, until the software is updated.
Also, if the NSA backdoor was utilized, then other intelligence agencies might identify the intrusion as typical NSA business, as it is an NSA created protocol.
This could also explain complacency within the NSA regarding this type of intrusion, because it could be viewed as a local and friendly process.
But that's assuming that they do use the same firewalls as the public do. Probably not though.
Due to the compartmentalization that occurs in these organizations, I'd imagine that employess would have backdoors installed on their computers(that they are not aware of) so they could be monitored just as a safety precaution.
It would be structured hierarchically, obviously... and a compromised computer, higher up in the chain could be used to access all lower computers effortlessly.
I also recall a story that appeared on a new site a few weeks ago about hacking (cnn I think...)
They interviewed two chinese hackers that said ANY network can be hacked. They also told of how they hacked the pentagon and other government websites effortlessly...
anyway...
I know this doesn't really prove anything butthat's all I can come up with..
:)
Dear 'Freedom:'
The government uses a level of software encryption NOT AVAILABLE to the general public. The NSA, CIA, and NORAD are IMPOSSIBLE to hack into by an outsider, such as you or I.
Likewise, knowledge of any BACKDOORS would NOT be accessible to anyone OUTSIDE of the NSA, CIA, or NORAD.
Warmest Regards,
Kentroversy
Buffalo, NY USA
Post a Comment
<< Home